Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/371606?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "type": "alpm", "namespace": "archlinux", "name": "lib32-libtiff", "version": "4.0.7-1", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "4.0.7-3", "latest_non_vulnerable_version": "4.3.0-2", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84705?format=api", "vulnerability_id": "VCID-g2kq-ch6c-nubm", "summary": "libtiff: Stack-based buffer overflow in _TIFFVGetField", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10095.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10095.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10095", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00561", "scoring_system": "epss", "scoring_elements": "0.68218", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00561", "scoring_system": "epss", "scoring_elements": "0.68368", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00561", "scoring_system": "epss", "scoring_elements": "0.68311", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00561", "scoring_system": "epss", "scoring_elements": "0.68355", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00561", "scoring_system": "epss", "scoring_elements": "0.68363", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00561", "scoring_system": "epss", "scoring_elements": "0.68239", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00561", "scoring_system": "epss", "scoring_elements": "0.68258", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00561", "scoring_system": "epss", "scoring_elements": "0.68234", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00561", "scoring_system": "epss", "scoring_elements": "0.68284", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00561", "scoring_system": "epss", "scoring_elements": "0.683", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00561", "scoring_system": "epss", "scoring_elements": "0.68325", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00561", "scoring_system": "epss", "scoring_elements": "0.68313", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00561", "scoring_system": "epss", "scoring_elements": "0.6828", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00561", "scoring_system": "epss", "scoring_elements": "0.6832", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00561", "scoring_system": "epss", "scoring_elements": "0.68331", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10095" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10095", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10095" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1410063", "reference_id": "1410063", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1410063" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850316", "reference_id": "850316", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850316" }, { "reference_url": "https://security.archlinux.org/ASA-201707-17", "reference_id": "ASA-201707-17", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201707-17" }, { "reference_url": "https://security.archlinux.org/ASA-201707-18", "reference_id": "ASA-201707-18", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201707-18" }, { "reference_url": "https://security.archlinux.org/AVG-5", "reference_id": "AVG-5", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-5" }, { "reference_url": "https://security.archlinux.org/AVG-87", "reference_id": "AVG-87", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-87" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371607?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-hbvy-33n2-vqdz" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.8-1" } ], "aliases": [ "CVE-2016-10095" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g2kq-ch6c-nubm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60979?format=api", "vulnerability_id": "VCID-nyjs-ay8u-13gx", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00078.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00078.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00081.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00081.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00100.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00100.html" }, { "reference_url": "http://packetstormsecurity.com/files/135078/libtiff-4.0.6-Invalid-Write.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/135078/libtiff-4.0.6-Invalid-Write.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1546.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1546.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1547.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1547.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7554.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7554.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7554", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01587", "scoring_system": "epss", "scoring_elements": "0.8155", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01587", "scoring_system": "epss", "scoring_elements": "0.81693", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01587", "scoring_system": "epss", "scoring_elements": "0.81652", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01587", "scoring_system": "epss", "scoring_elements": "0.81656", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01587", "scoring_system": "epss", "scoring_elements": "0.8168", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01587", "scoring_system": "epss", "scoring_elements": "0.81689", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01587", "scoring_system": "epss", "scoring_elements": "0.81562", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01587", "scoring_system": "epss", "scoring_elements": "0.81584", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01587", "scoring_system": "epss", "scoring_elements": "0.81582", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01587", "scoring_system": "epss", "scoring_elements": "0.81609", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01587", "scoring_system": "epss", "scoring_elements": "0.81614", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01587", "scoring_system": "epss", "scoring_elements": "0.81635", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01587", "scoring_system": "epss", "scoring_elements": "0.81622", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7554" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7554", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7554" }, { "reference_url": "http://seclists.org/fulldisclosure/2015/Dec/119", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2015/Dec/119" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2015/12/26/7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2015/12/26/7" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/537205/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/537205/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/79699", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/79699" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1294417", "reference_id": "1294417", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1294417" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809066", "reference_id": "809066", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809066" }, { "reference_url": "https://security.archlinux.org/ASA-201707-17", "reference_id": "ASA-201707-17", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201707-17" }, { "reference_url": "https://security.archlinux.org/ASA-201707-18", "reference_id": "ASA-201707-18", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201707-18" }, { "reference_url": "https://security.archlinux.org/AVG-5", "reference_id": "AVG-5", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-5" }, { "reference_url": "https://security.archlinux.org/AVG-87", "reference_id": "AVG-87", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-87" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:4.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libtiff:libtiff:4.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:4.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7554", "reference_id": "CVE-2015-7554", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7554" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1546", "reference_id": "RHSA-2016:1546", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1546" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1547", "reference_id": "RHSA-2016:1547", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1547" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" }, { "reference_url": "https://usn.ubuntu.com/3212-3/", "reference_id": "USN-3212-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371607?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-hbvy-33n2-vqdz" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.8-1" } ], "aliases": [ "CVE-2015-7554" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nyjs-ay8u-13gx" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61008?format=api", "vulnerability_id": "VCID-1cjh-zx12-2fh2", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5318.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5318.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5318", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74774", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74764", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74771", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74648", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74652", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74678", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74685", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74699", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74723", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74702", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74694", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74731", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74739", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74729", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5318" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344068", "reference_id": "1344068", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344068" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://usn.ubuntu.com/3606-1/", "reference_id": "USN-3606-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3606-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-5318" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1cjh-zx12-2fh2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47125?format=api", "vulnerability_id": "VCID-1dhy-s5x3-fuf7", "summary": "Multiple vulnerabilities in libTIFF could result in execution of\n arbitrary code or Denial of Service.", "references": [ { "reference_url": "http://bugzilla.maptools.org/show_bug.cgi?id=2209", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugzilla.maptools.org/show_bug.cgi?id=2209" }, { "reference_url": "http://marc.info/?l=oss-security&m=127731610612908&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127731610612908&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2596.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2596.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2596", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00999", "scoring_system": "epss", "scoring_elements": "0.77066", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00999", "scoring_system": "epss", "scoring_elements": "0.77046", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00999", "scoring_system": "epss", "scoring_elements": "0.77053", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00999", "scoring_system": "epss", "scoring_elements": "0.76913", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00999", "scoring_system": "epss", "scoring_elements": "0.76919", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00999", "scoring_system": "epss", "scoring_elements": "0.76949", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00999", "scoring_system": "epss", "scoring_elements": "0.76931", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00999", "scoring_system": "epss", "scoring_elements": "0.76963", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00999", "scoring_system": "epss", "scoring_elements": "0.76974", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00999", "scoring_system": "epss", "scoring_elements": "0.77002", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00999", "scoring_system": "epss", "scoring_elements": "0.76981", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00999", "scoring_system": "epss", "scoring_elements": "0.76976", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00999", "scoring_system": "epss", "scoring_elements": "0.77017", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00999", "scoring_system": "epss", "scoring_elements": "0.77019", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00999", "scoring_system": "epss", "scoring_elements": "0.77011", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2596" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=583081", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=583081" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2596" }, { "reference_url": "http://secunia.com/advisories/40422", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40422" }, { "reference_url": "http://secunia.com/advisories/50726", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/50726" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201209-02.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201209-02.xml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=610759", "reference_id": "610759", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=610759" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:3.9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libtiff:libtiff:3.9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:3.9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:3.9.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libtiff:libtiff:3.9.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:3.9.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2596", "reference_id": "CVE-2010-2596", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2596" }, { "reference_url": "https://security.gentoo.org/glsa/201209-02", "reference_id": "GLSA-201209-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201209-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0222", "reference_id": "RHSA-2014:0222", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0222" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2010-2596" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1dhy-s5x3-fuf7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60992?format=api", "vulnerability_id": "VCID-1pbp-smgt-duey", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3623.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3623.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3623", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01585", "scoring_system": "epss", "scoring_elements": "0.81677", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01585", "scoring_system": "epss", "scoring_elements": "0.81663", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01585", "scoring_system": "epss", "scoring_elements": "0.81672", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01585", "scoring_system": "epss", "scoring_elements": "0.81533", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01585", "scoring_system": "epss", "scoring_elements": "0.81545", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01585", "scoring_system": "epss", "scoring_elements": "0.81567", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01585", "scoring_system": "epss", "scoring_elements": "0.81565", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01585", "scoring_system": "epss", "scoring_elements": "0.81592", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01585", "scoring_system": "epss", "scoring_elements": "0.81598", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01585", "scoring_system": "epss", "scoring_elements": "0.81618", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01585", "scoring_system": "epss", "scoring_elements": "0.81605", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01585", "scoring_system": "epss", "scoring_elements": "0.81635", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01585", "scoring_system": "epss", "scoring_elements": "0.81636", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01585", "scoring_system": "epss", "scoring_elements": "0.81639", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1325089", "reference_id": "1325089", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1325089" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" }, { "reference_url": "https://usn.ubuntu.com/3212-3/", "reference_id": "USN-3212-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-3623" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1pbp-smgt-duey" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60988?format=api", "vulnerability_id": "VCID-255p-pm39-1bb3", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3619.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3619.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3619", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00955", "scoring_system": "epss", "scoring_elements": "0.76508", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00955", "scoring_system": "epss", "scoring_elements": "0.76489", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00955", "scoring_system": "epss", "scoring_elements": "0.76496", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00955", "scoring_system": "epss", "scoring_elements": "0.76364", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00955", "scoring_system": "epss", "scoring_elements": "0.76368", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00955", "scoring_system": "epss", "scoring_elements": "0.76398", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00955", "scoring_system": "epss", "scoring_elements": "0.76379", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00955", "scoring_system": "epss", "scoring_elements": "0.76412", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00955", "scoring_system": "epss", "scoring_elements": "0.76426", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00955", "scoring_system": "epss", "scoring_elements": "0.76452", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00955", "scoring_system": "epss", "scoring_elements": "0.7643", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00955", "scoring_system": "epss", "scoring_elements": "0.76425", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00955", "scoring_system": "epss", "scoring_elements": "0.76466", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00955", "scoring_system": "epss", "scoring_elements": "0.7647", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00955", "scoring_system": "epss", "scoring_elements": "0.76456", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3619" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3619", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3619" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1316569", "reference_id": "1316569", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1316569" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820362", "reference_id": "820362", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820362" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-3619" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-255p-pm39-1bb3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60997?format=api", "vulnerability_id": "VCID-28t9-d8gb-b3h9", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3633.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3633.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3633", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63799", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63789", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63802", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.6366", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.6372", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63745", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63706", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63758", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63775", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63788", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63773", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63739", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63785", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3633" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3633", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3633" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326255", "reference_id": "1326255", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326255" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842046", "reference_id": "842046", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842046" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-3633" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-28t9-d8gb-b3h9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60994?format=api", "vulnerability_id": "VCID-2a5b-7k5n-73fx", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3625.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3625.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3625", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00636", "scoring_system": "epss", "scoring_elements": "0.70506", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00636", "scoring_system": "epss", "scoring_elements": "0.70446", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00636", "scoring_system": "epss", "scoring_elements": "0.70497", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00636", "scoring_system": "epss", "scoring_elements": "0.70352", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00636", "scoring_system": "epss", "scoring_elements": "0.70364", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00636", "scoring_system": "epss", "scoring_elements": "0.70381", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00636", "scoring_system": "epss", "scoring_elements": "0.7036", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00636", "scoring_system": "epss", "scoring_elements": "0.70406", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00636", "scoring_system": "epss", "scoring_elements": "0.70421", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00636", "scoring_system": "epss", "scoring_elements": "0.70445", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00636", "scoring_system": "epss", "scoring_elements": "0.7043", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00636", "scoring_system": "epss", "scoring_elements": "0.70416", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00636", "scoring_system": "epss", "scoring_elements": "0.70458", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00636", "scoring_system": "epss", "scoring_elements": "0.70466", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3625" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3625", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3625" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1325091", "reference_id": "1325091", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1325091" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-3625" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2a5b-7k5n-73fx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60993?format=api", "vulnerability_id": "VCID-36t6-pnx8-xugd", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3624.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3624.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3624", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.80042", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.8002", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.80026", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.79912", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.79919", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.7994", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.79928", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.79957", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.79966", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.79986", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.7997", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.79961", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.79989", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.79991", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1325090", "reference_id": "1325090", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1325090" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" }, { "reference_url": "https://usn.ubuntu.com/3212-3/", "reference_id": "USN-3212-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-3624" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-36t6-pnx8-xugd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81325?format=api", "vulnerability_id": "VCID-45tr-e5rv-6uch", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9540.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9540.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9540", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.6175", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61915", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61926", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61906", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61923", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61824", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61854", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61825", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61874", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61889", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.6191", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61899", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61878", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61922", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9540" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397768", "reference_id": "1397768", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397768" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0225", "reference_id": "RHSA-2017:0225", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0225" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-9540" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-45tr-e5rv-6uch" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61006?format=api", "vulnerability_id": "VCID-4e6e-nkkd-j3ef", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5316.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5316.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5316", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00858", "scoring_system": "epss", "scoring_elements": "0.75072", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00858", "scoring_system": "epss", "scoring_elements": "0.75065", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00858", "scoring_system": "epss", "scoring_elements": "0.75069", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00858", "scoring_system": "epss", "scoring_elements": "0.7495", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00858", "scoring_system": "epss", "scoring_elements": "0.74953", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00858", "scoring_system": "epss", "scoring_elements": "0.74982", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00858", "scoring_system": "epss", "scoring_elements": "0.74957", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00858", "scoring_system": "epss", "scoring_elements": "0.74991", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00858", "scoring_system": "epss", "scoring_elements": "0.75003", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00858", "scoring_system": "epss", "scoring_elements": "0.75025", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00858", "scoring_system": "epss", "scoring_elements": "0.75004", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00858", "scoring_system": "epss", "scoring_elements": "0.74993", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00858", "scoring_system": "epss", "scoring_elements": "0.75029", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00858", "scoring_system": "epss", "scoring_elements": "0.75037", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00858", "scoring_system": "epss", "scoring_elements": "0.75026", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346690", "reference_id": "1346690", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346690" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=830700", "reference_id": "830700", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=830700" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-5316" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4e6e-nkkd-j3ef" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60981?format=api", "vulnerability_id": "VCID-5h29-wne5-gbd7", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "http://packetstormsecurity.com/files/135080/libtiff-4.0.6-Heap-Overflow.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/135080/libtiff-4.0.6-Heap-Overflow.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1546.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1546.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1547.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1547.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8668.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8668.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8668", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0671", "scoring_system": "epss", "scoring_elements": "0.91289", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0671", "scoring_system": "epss", "scoring_elements": "0.91279", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0671", "scoring_system": "epss", "scoring_elements": "0.91278", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0671", "scoring_system": "epss", "scoring_elements": "0.91281", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0671", "scoring_system": "epss", "scoring_elements": "0.91291", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.07386", "scoring_system": "epss", "scoring_elements": "0.91688", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07386", "scoring_system": "epss", "scoring_elements": "0.91697", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07386", "scoring_system": "epss", "scoring_elements": "0.91702", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07386", "scoring_system": "epss", "scoring_elements": "0.9171", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07386", "scoring_system": "epss", "scoring_elements": "0.91723", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07386", "scoring_system": "epss", "scoring_elements": "0.91729", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07386", "scoring_system": "epss", "scoring_elements": "0.91732", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07386", "scoring_system": "epss", "scoring_elements": "0.91734", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07386", "scoring_system": "epss", "scoring_elements": "0.9173", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8668" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8668", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8668" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/537208/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/537208/100/0/threaded" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1294425", "reference_id": "1294425", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1294425" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842046", "reference_id": "842046", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842046" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_server:3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:vm_server:3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_server:3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_server:3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:vm_server:3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_server:3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8668", "reference_id": "CVE-2015-8668", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8668" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1546", "reference_id": "RHSA-2016:1546", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1546" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1547", "reference_id": "RHSA-2016:1547", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1547" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" }, { "reference_url": "https://usn.ubuntu.com/3212-3/", "reference_id": "USN-3212-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2015-8668" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5h29-wne5-gbd7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61019?format=api", "vulnerability_id": "VCID-7dzd-xznd-jug7", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9297.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9297.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9297", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00589", "scoring_system": "epss", "scoring_elements": "0.69096", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00589", "scoring_system": "epss", "scoring_elements": "0.69258", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00589", "scoring_system": "epss", "scoring_elements": "0.6919", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00589", "scoring_system": "epss", "scoring_elements": "0.69241", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00589", "scoring_system": "epss", "scoring_elements": "0.6925", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00589", "scoring_system": "epss", "scoring_elements": "0.69112", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00589", "scoring_system": "epss", "scoring_elements": "0.69134", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00589", "scoring_system": "epss", "scoring_elements": "0.69115", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00589", "scoring_system": "epss", "scoring_elements": "0.69165", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00589", "scoring_system": "epss", "scoring_elements": "0.69184", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00589", "scoring_system": "epss", "scoring_elements": "0.69206", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00589", "scoring_system": "epss", "scoring_elements": "0.69191", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00589", "scoring_system": "epss", "scoring_elements": "0.69162", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00589", "scoring_system": "epss", "scoring_elements": "0.69202", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00589", "scoring_system": "epss", "scoring_elements": "0.6921", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9297" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395264", "reference_id": "1395264", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395264" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=844226", "reference_id": "844226", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=844226" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-9297" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7dzd-xznd-jug7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81321?format=api", "vulnerability_id": "VCID-7xr6-sn1k-t7cw", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9534.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9534.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9534", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63449", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.6359", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63563", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63582", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63595", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63509", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63536", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.635", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63552", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63569", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63585", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.6357", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63572", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63579", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9534" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397751", "reference_id": "1397751", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397751" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0225", "reference_id": "RHSA-2017:0225", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0225" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" }, { "reference_url": "https://usn.ubuntu.com/3212-3/", "reference_id": "USN-3212-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-9534" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7xr6-sn1k-t7cw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60982?format=api", "vulnerability_id": "VCID-81ew-t25a-f7gq", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1546.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1546.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1547.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1547.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8683.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8683.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8683", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43074", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.42972", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43196", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43186", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43118", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43053", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43055", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43132", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43159", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43098", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43151", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43163", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43184", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43136", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8683" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8665", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8665" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8683", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8683" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8781", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8781" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8782", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8782" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8783", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8783" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8784", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8784" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3467", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3467" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2015/12/25/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2015/12/25/1" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2015/12/26/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2015/12/26/1" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "reference_url": "http://www.securityfocus.com/bid/79718", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/79718" }, { "reference_url": "http://www.securitytracker.com/id/1035508", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035508" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2939-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2939-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1294427", "reference_id": "1294427", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1294427" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809021", "reference_id": "809021", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809021" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:4.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libtiff:libtiff:4.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:4.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8683", "reference_id": "CVE-2015-8683", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8683" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1546", "reference_id": "RHSA-2016:1546", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1546" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1547", "reference_id": "RHSA-2016:1547", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1547" }, { "reference_url": "https://usn.ubuntu.com/2939-1/", "reference_id": "USN-2939-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2939-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2015-8683" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-81ew-t25a-f7gq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60999?format=api", "vulnerability_id": "VCID-83hb-ksrb-yyb5", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3658.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3658.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3658", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00951", "scoring_system": "epss", "scoring_elements": "0.76459", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00951", "scoring_system": "epss", "scoring_elements": "0.76438", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00951", "scoring_system": "epss", "scoring_elements": "0.76445", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00951", "scoring_system": "epss", "scoring_elements": "0.76316", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00951", "scoring_system": "epss", "scoring_elements": "0.76319", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00951", "scoring_system": "epss", "scoring_elements": "0.76349", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00951", "scoring_system": "epss", "scoring_elements": "0.76329", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00951", "scoring_system": "epss", "scoring_elements": "0.76361", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00951", "scoring_system": "epss", "scoring_elements": "0.76375", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00951", "scoring_system": "epss", "scoring_elements": "0.76401", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00951", "scoring_system": "epss", "scoring_elements": "0.76379", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00951", "scoring_system": "epss", "scoring_elements": "0.76373", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00951", "scoring_system": "epss", "scoring_elements": "0.76413", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00951", "scoring_system": "epss", "scoring_elements": "0.7642", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00951", "scoring_system": "epss", "scoring_elements": "0.76404", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10266", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10266" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10267", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10267" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10269", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10269" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10270", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10270" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9535", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9535" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5225", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5225" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7592", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7592" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7593", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7594", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7594" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7595", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7595" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7596" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7597", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7597" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7598", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7598" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7602" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326257", "reference_id": "1326257", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326257" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-3658" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-83hb-ksrb-yyb5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61013?format=api", "vulnerability_id": "VCID-98zm-dbqt-g3eg", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5323.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5323.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5323", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01105", "scoring_system": "epss", "scoring_elements": "0.78029", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01105", "scoring_system": "epss", "scoring_elements": "0.78167", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01105", "scoring_system": "epss", "scoring_elements": "0.78114", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01105", "scoring_system": "epss", "scoring_elements": "0.78147", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01105", "scoring_system": "epss", "scoring_elements": "0.78153", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01105", "scoring_system": "epss", "scoring_elements": "0.78038", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01105", "scoring_system": "epss", "scoring_elements": "0.78067", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01105", "scoring_system": "epss", "scoring_elements": "0.7805", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01105", "scoring_system": "epss", "scoring_elements": "0.78076", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01105", "scoring_system": "epss", "scoring_elements": "0.7808", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01105", "scoring_system": "epss", "scoring_elements": "0.78106", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01105", "scoring_system": "epss", "scoring_elements": "0.78089", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01105", "scoring_system": "epss", "scoring_elements": "0.78086", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01105", "scoring_system": "epss", "scoring_elements": "0.78121", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01105", "scoring_system": "epss", "scoring_elements": "0.7812", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346696", "reference_id": "1346696", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346696" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-5323" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-98zm-dbqt-g3eg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81350?format=api", "vulnerability_id": "VCID-a1hq-fqkv-u7d9", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9535.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9535.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9535", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69514", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69675", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69609", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69661", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.6967", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69525", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.6954", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.6952", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.6957", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69586", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69608", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69593", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69579", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69619", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69628", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9535" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10266", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10266" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10267", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10267" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10269", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10269" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10270", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10270" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9535", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9535" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5225", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5225" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7592", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7592" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7593", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7594", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7594" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7595", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7595" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7596" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7597", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7597" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7598", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7598" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7602" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397755", "reference_id": "1397755", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397755" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0225", "reference_id": "RHSA-2017:0225", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0225" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-9535" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a1hq-fqkv-u7d9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61005?format=api", "vulnerability_id": "VCID-baha-p74p-rff4", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5315.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5315.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5315", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.6178", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.61775", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.61769", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.61615", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.6169", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.6172", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.61691", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.6174", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.61755", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.61776", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.61764", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.61745", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.61787", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.61792", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346694", "reference_id": "1346694", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346694" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=830700", "reference_id": "830700", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=830700" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-5315" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-baha-p74p-rff4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61014?format=api", "vulnerability_id": "VCID-bf8s-peku-2uht", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5652.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5652.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5652", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06401", "scoring_system": "epss", "scoring_elements": "0.90982", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06401", "scoring_system": "epss", "scoring_elements": "0.91065", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.06401", "scoring_system": "epss", "scoring_elements": "0.91058", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.06401", "scoring_system": "epss", "scoring_elements": "0.91071", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.06401", "scoring_system": "epss", "scoring_elements": "0.91069", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.06401", "scoring_system": "epss", "scoring_elements": "0.90987", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06401", "scoring_system": "epss", "scoring_elements": "0.90996", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06401", "scoring_system": "epss", "scoring_elements": "0.91007", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06401", "scoring_system": "epss", "scoring_elements": "0.91019", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06401", "scoring_system": "epss", "scoring_elements": "0.91025", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06401", "scoring_system": "epss", "scoring_elements": "0.91033", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06401", "scoring_system": "epss", "scoring_elements": "0.91057", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.06401", "scoring_system": "epss", "scoring_elements": "0.91055", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389222", "reference_id": "1389222", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389222" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842361", "reference_id": "842361", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842361" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0225", "reference_id": "RHSA-2017:0225", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0225" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-5652" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bf8s-peku-2uht" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60995?format=api", "vulnerability_id": "VCID-ceb4-e5mz-4fbp", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3631.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3631.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3631", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0079", "scoring_system": "epss", "scoring_elements": "0.73961", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0079", "scoring_system": "epss", "scoring_elements": "0.73926", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0079", "scoring_system": "epss", "scoring_elements": "0.73953", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0079", "scoring_system": "epss", "scoring_elements": "0.73827", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0079", "scoring_system": "epss", "scoring_elements": "0.73837", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0079", "scoring_system": "epss", "scoring_elements": "0.73862", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0079", "scoring_system": "epss", "scoring_elements": "0.73832", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0079", "scoring_system": "epss", "scoring_elements": "0.73867", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0079", "scoring_system": "epss", "scoring_elements": "0.7388", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0079", "scoring_system": "epss", "scoring_elements": "0.73902", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0079", "scoring_system": "epss", "scoring_elements": "0.73884", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0079", "scoring_system": "epss", "scoring_elements": "0.73875", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0079", "scoring_system": "epss", "scoring_elements": "0.73918", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3631" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3631", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3631" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1316872", "reference_id": "1316872", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1316872" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820366", "reference_id": "820366", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820366" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-3631" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ceb4-e5mz-4fbp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61016?format=api", "vulnerability_id": "VCID-cswr-9c4x-xyg8", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6223.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6223.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6223", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01239", "scoring_system": "epss", "scoring_elements": "0.79184", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01239", "scoring_system": "epss", "scoring_elements": "0.79312", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01239", "scoring_system": "epss", "scoring_elements": "0.79254", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01239", "scoring_system": "epss", "scoring_elements": "0.79288", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01239", "scoring_system": "epss", "scoring_elements": "0.79294", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01239", "scoring_system": "epss", "scoring_elements": "0.79191", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01239", "scoring_system": "epss", "scoring_elements": "0.79214", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01239", "scoring_system": "epss", "scoring_elements": "0.792", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01239", "scoring_system": "epss", "scoring_elements": "0.79225", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01239", "scoring_system": "epss", "scoring_elements": "0.79232", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01239", "scoring_system": "epss", "scoring_elements": "0.79256", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01239", "scoring_system": "epss", "scoring_elements": "0.79241", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01239", "scoring_system": "epss", "scoring_elements": "0.79229", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01239", "scoring_system": "epss", "scoring_elements": "0.79255", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01239", "scoring_system": "epss", "scoring_elements": "0.79252", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356867", "reference_id": "1356867", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356867" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842270", "reference_id": "842270", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842270" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-6223" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cswr-9c4x-xyg8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61020?format=api", "vulnerability_id": "VCID-czyn-snja-skba", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9448.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9448.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9448", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02076", "scoring_system": "epss", "scoring_elements": "0.839", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02076", "scoring_system": "epss", "scoring_elements": "0.84033", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02076", "scoring_system": "epss", "scoring_elements": "0.83996", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02076", "scoring_system": "epss", "scoring_elements": "0.84023", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02076", "scoring_system": "epss", "scoring_elements": "0.8403", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02076", "scoring_system": "epss", "scoring_elements": "0.83915", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02076", "scoring_system": "epss", "scoring_elements": "0.83932", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02076", "scoring_system": "epss", "scoring_elements": "0.83934", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02076", "scoring_system": "epss", "scoring_elements": "0.83958", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02076", "scoring_system": "epss", "scoring_elements": "0.83964", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02076", "scoring_system": "epss", "scoring_elements": "0.8398", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02076", "scoring_system": "epss", "scoring_elements": "0.83974", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02076", "scoring_system": "epss", "scoring_elements": "0.8397", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02076", "scoring_system": "epss", "scoring_elements": "0.83993", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02076", "scoring_system": "epss", "scoring_elements": "0.83995", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9448" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397734", "reference_id": "1397734", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397734" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-9448" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-czyn-snja-skba" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60989?format=api", "vulnerability_id": "VCID-dxtf-qzfj-k3aq", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3620.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3620.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3620", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0101", "scoring_system": "epss", "scoring_elements": "0.77182", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0101", "scoring_system": "epss", "scoring_elements": "0.77161", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0101", "scoring_system": "epss", "scoring_elements": "0.77168", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0101", "scoring_system": "epss", "scoring_elements": "0.77032", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0101", "scoring_system": "epss", "scoring_elements": "0.77038", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0101", "scoring_system": "epss", "scoring_elements": "0.77067", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0101", "scoring_system": "epss", "scoring_elements": "0.77048", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0101", "scoring_system": "epss", "scoring_elements": "0.7708", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0101", "scoring_system": "epss", "scoring_elements": "0.7709", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0101", "scoring_system": "epss", "scoring_elements": "0.77118", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0101", "scoring_system": "epss", "scoring_elements": "0.77098", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0101", "scoring_system": "epss", "scoring_elements": "0.77093", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0101", "scoring_system": "epss", "scoring_elements": "0.77134", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0101", "scoring_system": "epss", "scoring_elements": "0.77136", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0101", "scoring_system": "epss", "scoring_elements": "0.77127", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3620" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3620", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3620" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1316859", "reference_id": "1316859", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1316859" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820363", "reference_id": "820363", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820363" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-3620" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dxtf-qzfj-k3aq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61021?format=api", "vulnerability_id": "VCID-fc93-fu34-37cx", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9453.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9453.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9453", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.6167", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.61833", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.6184", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.61844", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.61827", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.61822", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.61744", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.61774", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.61792", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.61808", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.61828", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.61816", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.61796", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9453" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397723", "reference_id": "1397723", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397723" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" }, { "reference_url": "https://usn.ubuntu.com/3212-3/", "reference_id": "USN-3212-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-9453" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fc93-fu34-37cx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60987?format=api", "vulnerability_id": "VCID-gg7k-u39a-kqbw", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-04/msg00064.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-04/msg00064.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-04/msg00075.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-04/msg00075.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3186.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3186.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3186", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00766", "scoring_system": "epss", "scoring_elements": "0.73546", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00766", "scoring_system": "epss", "scoring_elements": "0.7351", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00766", "scoring_system": "epss", "scoring_elements": "0.73504", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00766", "scoring_system": "epss", "scoring_elements": "0.73537", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00766", "scoring_system": "epss", "scoring_elements": "0.73549", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00766", "scoring_system": "epss", "scoring_elements": "0.7341", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00766", "scoring_system": "epss", "scoring_elements": "0.73418", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00766", "scoring_system": "epss", "scoring_elements": "0.73442", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00766", "scoring_system": "epss", "scoring_elements": "0.73413", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00766", "scoring_system": "epss", "scoring_elements": "0.73451", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00766", "scoring_system": "epss", "scoring_elements": "0.73464", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00766", "scoring_system": "epss", "scoring_elements": "0.73488", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00766", "scoring_system": "epss", "scoring_elements": "0.73468", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00766", "scoring_system": "epss", "scoring_elements": "0.7346", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00766", "scoring_system": "epss", "scoring_elements": "0.73502", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3186" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1319503", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1319503" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3186", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3186" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1035442", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035442" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1319666", "reference_id": "1319666", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1319666" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=819972", "reference_id": "819972", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=819972" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:4.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libtiff:libtiff:4.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:4.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3186", "reference_id": "CVE-2016-3186", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3186" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2053", "reference_id": "RHSA-2019:2053", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2053" }, { "reference_url": "https://usn.ubuntu.com/3606-1/", "reference_id": "USN-3606-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3606-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-3186" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gg7k-u39a-kqbw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60980?format=api", "vulnerability_id": "VCID-gp1w-v49g-j3aw", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1546.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1546.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1547.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1547.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8665.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8665.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8665", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43179", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43078", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43298", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43287", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43223", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43157", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43158", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43235", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43264", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43201", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43253", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43265", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43286", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43238", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8665" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8665", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8665" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8683", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8683" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8781", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8781" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8782", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8782" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8783", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8783" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8784", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8784" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3467", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3467" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2015/12/24/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2015/12/24/2" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2015/12/24/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2015/12/24/4" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "reference_url": "http://www.securityfocus.com/bid/79728", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/79728" }, { "reference_url": "http://www.securitytracker.com/id/1035508", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035508" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2939-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2939-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1294444", "reference_id": "1294444", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1294444" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808968", "reference_id": "808968", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808968" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:4.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libtiff:libtiff:4.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:4.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8665", "reference_id": "CVE-2015-8665", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8665" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1546", "reference_id": "RHSA-2016:1546", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1546" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1547", "reference_id": "RHSA-2016:1547", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1547" }, { "reference_url": "https://usn.ubuntu.com/2939-1/", "reference_id": "USN-2939-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2939-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2015-8665" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gp1w-v49g-j3aw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61009?format=api", "vulnerability_id": "VCID-hfrr-s8ge-z7hx", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5319.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5319.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5319", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00877", "scoring_system": "epss", "scoring_elements": "0.75382", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00877", "scoring_system": "epss", "scoring_elements": "0.75373", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00877", "scoring_system": "epss", "scoring_elements": "0.75377", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00877", "scoring_system": "epss", "scoring_elements": "0.75248", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00877", "scoring_system": "epss", "scoring_elements": "0.75251", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00877", "scoring_system": "epss", "scoring_elements": "0.75283", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00877", "scoring_system": "epss", "scoring_elements": "0.75261", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00877", "scoring_system": "epss", "scoring_elements": "0.75304", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00877", "scoring_system": "epss", "scoring_elements": "0.75314", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00877", "scoring_system": "epss", "scoring_elements": "0.75335", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00877", "scoring_system": "epss", "scoring_elements": "0.75313", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00877", "scoring_system": "epss", "scoring_elements": "0.75302", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00877", "scoring_system": "epss", "scoring_elements": "0.75342", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00877", "scoring_system": "epss", "scoring_elements": "0.75348", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00877", "scoring_system": "epss", "scoring_elements": "0.75338", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5319" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344069", "reference_id": "1344069", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344069" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842046", "reference_id": "842046", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842046" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-5319" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hfrr-s8ge-z7hx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84847?format=api", "vulnerability_id": "VCID-jr5v-vzng-nbcb", "summary": "libtiff: Out-of-bounds read in readContigTilesIntoBuffer()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9539.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9539.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9539", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61605", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61768", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61782", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61764", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61759", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61679", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.6171", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61681", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.6173", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61745", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61767", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61754", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61735", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61776", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9539" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9539", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9539" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397767", "reference_id": "1397767", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397767" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-9539" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jr5v-vzng-nbcb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61015?format=api", "vulnerability_id": "VCID-k8zk-je18-wbb8", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5875.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5875.json" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389228", "reference_id": "1389228", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389228" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-5875" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k8zk-je18-wbb8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60991?format=api", "vulnerability_id": "VCID-m7mp-g37h-p3g9", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3622.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3622.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3622", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75933", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75913", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75922", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75792", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75796", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75828", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75806", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75839", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75851", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75874", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75855", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75849", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75886", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.7589", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75875", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1324823", "reference_id": "1324823", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1324823" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820365", "reference_id": "820365", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820365" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-3622" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m7mp-g37h-p3g9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61000?format=api", "vulnerability_id": "VCID-mqad-tkgf-r3ag", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3945.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3945.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3945", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36541", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36229", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36569", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36345", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36315", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36712", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36744", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36581", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36634", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36651", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.3666", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36625", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.366", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36645", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36628", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1325093", "reference_id": "1325093", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1325093" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1546", "reference_id": "RHSA-2016:1546", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1546" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1547", "reference_id": "RHSA-2016:1547", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1547" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" }, { "reference_url": "https://usn.ubuntu.com/3212-4/", "reference_id": "USN-3212-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-4/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-3945" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mqad-tkgf-r3ag" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60978?format=api", "vulnerability_id": "VCID-mwb4-9fjj-qyfs", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7313.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7313.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7313", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32461", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.3281", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.3266", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32545", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32824", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32955", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.3299", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32812", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.3286", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32889", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.3289", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32852", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32827", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32868", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32846", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7313" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7313", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7313" }, { "reference_url": "http://seclists.org/oss-sec/2015/q3/601", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/oss-sec/2015/q3/601" }, { "reference_url": "https://security-tracker.debian.org/tracker/CVE-2015-7313", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security-tracker.debian.org/tracker/CVE-2015-7313" }, { "reference_url": "https://ubuntu.com/security/CVE-2015-7313", "reference_id": "", "reference_type": "", "scores": [], "url": "https://ubuntu.com/security/CVE-2015-7313" }, { "reference_url": "http://www.securityfocus.com/bid/76843", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/76843" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265998", "reference_id": "1265998", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265998" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=800124", "reference_id": "800124", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=800124" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7313", "reference_id": "CVE-2015-7313", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7313" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2015-7313" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mwb4-9fjj-qyfs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61012?format=api", "vulnerability_id": "VCID-n5xz-y6bx-myfr", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5322.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5322.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5322", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39237", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39598", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39513", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39334", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39319", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39462", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39612", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39634", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39551", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39605", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.3962", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.3963", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39593", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39577", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39627", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3762", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2017/dsa-3762" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/06/15/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/06/15/2" }, { "reference_url": "http://www.securityfocus.com/bid/91204", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/91204" }, { "reference_url": "http://www.securityfocus.com/bid/91205", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/91205" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346683", "reference_id": "1346683", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346683" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5322", "reference_id": "CVE-2016-5322", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5322" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" }, { "reference_url": "https://usn.ubuntu.com/3212-3/", "reference_id": "USN-3212-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-5322" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n5xz-y6bx-myfr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60998?format=api", "vulnerability_id": "VCID-p9pe-czsr-9uhu", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3634.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3634.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3634", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71926", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71924", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71929", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71808", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71817", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71836", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71809", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71848", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71859", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71883", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71865", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.7189", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71895", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71879", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3634" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3634", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3634" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326267", "reference_id": "1326267", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326267" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-3634" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p9pe-czsr-9uhu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61002?format=api", "vulnerability_id": "VCID-pczq-1huj-p7hf", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3991.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3991.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3991", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.63271", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.63405", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.63377", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.63395", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.63408", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.63331", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.63358", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.63324", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.63375", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.63393", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.6341", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.63357", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.63392", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.634", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326249", "reference_id": "1326249", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326249" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1546", "reference_id": "RHSA-2016:1546", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1546" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1547", "reference_id": "RHSA-2016:1547", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1547" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" }, { "reference_url": "https://usn.ubuntu.com/3212-3/", "reference_id": "USN-3212-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-3991" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pczq-1huj-p7hf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58071?format=api", "vulnerability_id": "VCID-pf5w-eted-9kc9", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8127.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8127.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8127", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67455", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67589", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67577", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67587", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67491", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67512", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.6749", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67541", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67556", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67578", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67564", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67531", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67566", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67579", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67558", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8128", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8128" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8129", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8129" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9330", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9330" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9655", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9655" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1547" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185805", "reference_id": "1185805", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185805" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776185", "reference_id": "776185", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776185" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1546", "reference_id": "RHSA-2016:1546", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1546" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1547", "reference_id": "RHSA-2016:1547", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1547" }, { "reference_url": "https://usn.ubuntu.com/2553-1/", "reference_id": "USN-2553-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2553-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2014-8127" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pf5w-eted-9kc9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61010?format=api", "vulnerability_id": "VCID-qa3t-c5ua-mfdy", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5320.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5320.json" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346687", "reference_id": "1346687", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346687" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1546", "reference_id": "RHSA-2016:1546", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1546" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1547", "reference_id": "RHSA-2016:1547", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1547" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-5320" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qa3t-c5ua-mfdy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81320?format=api", "vulnerability_id": "VCID-rqmj-ns2c-jbh4", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9533.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9533.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9533", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0039", "scoring_system": "epss", "scoring_elements": "0.59945", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0039", "scoring_system": "epss", "scoring_elements": "0.60076", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0039", "scoring_system": "epss", "scoring_elements": "0.60115", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0039", "scoring_system": "epss", "scoring_elements": "0.60072", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0039", "scoring_system": "epss", "scoring_elements": "0.60088", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0039", "scoring_system": "epss", "scoring_elements": "0.60023", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0039", "scoring_system": "epss", "scoring_elements": "0.60047", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0039", "scoring_system": "epss", "scoring_elements": "0.60017", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0039", "scoring_system": "epss", "scoring_elements": "0.60067", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0039", "scoring_system": "epss", "scoring_elements": "0.60081", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0039", "scoring_system": "epss", "scoring_elements": "0.60102", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0039", "scoring_system": "epss", "scoring_elements": "0.60087", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0039", "scoring_system": "epss", "scoring_elements": "0.6007", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0039", "scoring_system": "epss", "scoring_elements": "0.60109", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397769", "reference_id": "1397769", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397769" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0225", "reference_id": "RHSA-2017:0225", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0225" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" }, { "reference_url": "https://usn.ubuntu.com/3212-3/", "reference_id": "USN-3212-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-9533" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rqmj-ns2c-jbh4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81323?format=api", "vulnerability_id": "VCID-s2xb-r3c7-7fc4", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9537.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9537.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9537", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61605", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61768", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61764", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61759", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61679", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.6171", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61681", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.6173", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61745", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61767", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61754", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61735", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61776", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61782", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397760", "reference_id": "1397760", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397760" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0225", "reference_id": "RHSA-2017:0225", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0225" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" }, { "reference_url": "https://usn.ubuntu.com/3212-3/", "reference_id": "USN-3212-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-9537" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s2xb-r3c7-7fc4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61011?format=api", "vulnerability_id": "VCID-s4k8-v3sj-23fw", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5321.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5321.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5321", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.4081", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.4061", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.408", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40707", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40694", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40894", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40921", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40849", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40898", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40904", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40886", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40867", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40909", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40879", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346695", "reference_id": "1346695", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346695" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" }, { "reference_url": "https://usn.ubuntu.com/3212-3/", "reference_id": "USN-3212-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-5321" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s4k8-v3sj-23fw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61001?format=api", "vulnerability_id": "VCID-s7s4-ux2t-3yc5", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3990.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3990.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3990", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.63405", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.6341", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.63357", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.63392", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.634", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.63377", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.63395", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.63408", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.63375", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.63393", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00464", "scoring_system": "epss", "scoring_elements": "0.64293", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00464", "scoring_system": "epss", "scoring_elements": "0.64322", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00464", "scoring_system": "epss", "scoring_elements": "0.64279", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00464", "scoring_system": "epss", "scoring_elements": "0.64236", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326246", "reference_id": "1326246", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326246" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=836570", "reference_id": "836570", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=836570" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1546", "reference_id": "RHSA-2016:1546", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1546" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1547", "reference_id": "RHSA-2016:1547", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1547" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" }, { "reference_url": "https://usn.ubuntu.com/3212-3/", "reference_id": "USN-3212-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-3990" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s7s4-ux2t-3yc5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81324?format=api", "vulnerability_id": "VCID-spqg-q1z6-pyex", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9538.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9538.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9538", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61605", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61768", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61782", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61764", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61759", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61679", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.6171", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61681", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.6173", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61745", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61767", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61754", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61735", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61776", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397765", "reference_id": "1397765", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397765" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-9538" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-spqg-q1z6-pyex" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60996?format=api", "vulnerability_id": "VCID-u1mj-pxtw-7qet", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3632.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3632.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3632", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66461", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.6661", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66587", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66594", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66609", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.665", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66526", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66497", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66545", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66559", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66578", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66566", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66534", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.6657", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3632" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3632", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3632" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1325095", "reference_id": "1325095", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1325095" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1546", "reference_id": "RHSA-2016:1546", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1546" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1547", "reference_id": "RHSA-2016:1547", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1547" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" }, { "reference_url": "https://usn.ubuntu.com/3212-3/", "reference_id": "USN-3212-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-3632" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u1mj-pxtw-7qet" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60977?format=api", "vulnerability_id": "VCID-vn6c-kuq7-k3hv", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8130.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8130.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8130", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83896", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.84028", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.84018", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.84025", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83911", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83928", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.8393", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83954", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83961", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83976", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.8397", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83966", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.8399", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83991", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185817", "reference_id": "1185817", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185817" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776185", "reference_id": "776185", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776185" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1546", "reference_id": "RHSA-2016:1546", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1546" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1547", "reference_id": "RHSA-2016:1547", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1547" }, { "reference_url": "https://usn.ubuntu.com/2553-1/", "reference_id": "USN-2553-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2553-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2014-8130" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vn6c-kuq7-k3hv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61022?format=api", "vulnerability_id": "VCID-wes8-vrs4-gygk", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9532.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9532.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9532", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00585", "scoring_system": "epss", "scoring_elements": "0.68998", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00585", "scoring_system": "epss", "scoring_elements": "0.69158", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00585", "scoring_system": "epss", "scoring_elements": "0.69092", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00585", "scoring_system": "epss", "scoring_elements": "0.69142", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00585", "scoring_system": "epss", "scoring_elements": "0.6915", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00585", "scoring_system": "epss", "scoring_elements": "0.69015", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00585", "scoring_system": "epss", "scoring_elements": "0.69035", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00585", "scoring_system": "epss", "scoring_elements": "0.69016", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00585", "scoring_system": "epss", "scoring_elements": "0.69066", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00585", "scoring_system": "epss", "scoring_elements": "0.69085", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00585", "scoring_system": "epss", "scoring_elements": "0.69108", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00585", "scoring_system": "epss", "scoring_elements": "0.69094", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00585", "scoring_system": "epss", "scoring_elements": "0.69064", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00585", "scoring_system": "epss", "scoring_elements": "0.69103", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00585", "scoring_system": "epss", "scoring_elements": "0.69112", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397726", "reference_id": "1397726", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397726" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=844057", "reference_id": "844057", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=844057" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-9532" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wes8-vrs4-gygk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61018?format=api", "vulnerability_id": "VCID-wpd2-zcyv-s7g8", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9273.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9273.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9273", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.77849", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.77993", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.77939", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.77973", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.7798", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.77856", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.77884", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.77866", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.77894", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.77898", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.77925", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.77909", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.77947", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.77946", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9273" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395164", "reference_id": "1395164", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395164" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=844013", "reference_id": "844013", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=844013" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-9273" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wpd2-zcyv-s7g8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61007?format=api", "vulnerability_id": "VCID-x91e-13q2-yked", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5317.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5317.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5317", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00611", "scoring_system": "epss", "scoring_elements": "0.69865", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00611", "scoring_system": "epss", "scoring_elements": "0.69852", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00611", "scoring_system": "epss", "scoring_elements": "0.69861", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00611", "scoring_system": "epss", "scoring_elements": "0.69708", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00611", "scoring_system": "epss", "scoring_elements": "0.6972", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00611", "scoring_system": "epss", "scoring_elements": "0.69736", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00611", "scoring_system": "epss", "scoring_elements": "0.69713", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00611", "scoring_system": "epss", "scoring_elements": "0.69761", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00611", "scoring_system": "epss", "scoring_elements": "0.69778", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00611", "scoring_system": "epss", "scoring_elements": "0.698", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00611", "scoring_system": "epss", "scoring_elements": "0.69784", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00611", "scoring_system": "epss", "scoring_elements": "0.6977", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00611", "scoring_system": "epss", "scoring_elements": "0.69811", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00611", "scoring_system": "epss", "scoring_elements": "0.69821", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00611", "scoring_system": "epss", "scoring_elements": "0.69801", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346689", "reference_id": "1346689", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346689" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=830700", "reference_id": "830700", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=830700" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-5317" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x91e-13q2-yked" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61003?format=api", "vulnerability_id": "VCID-xg5z-jss1-3ycp", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5102.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5102.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5102", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00602", "scoring_system": "epss", "scoring_elements": "0.69614", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00602", "scoring_system": "epss", "scoring_elements": "0.69602", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00602", "scoring_system": "epss", "scoring_elements": "0.6961", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00602", "scoring_system": "epss", "scoring_elements": "0.69454", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00602", "scoring_system": "epss", "scoring_elements": "0.69465", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00602", "scoring_system": "epss", "scoring_elements": "0.69481", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00602", "scoring_system": "epss", "scoring_elements": "0.69461", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00602", "scoring_system": "epss", "scoring_elements": "0.69511", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00602", "scoring_system": "epss", "scoring_elements": "0.69527", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00602", "scoring_system": "epss", "scoring_elements": "0.69549", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00602", "scoring_system": "epss", "scoring_elements": "0.69534", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00602", "scoring_system": "epss", "scoring_elements": "0.6952", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00602", "scoring_system": "epss", "scoring_elements": "0.69559", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00602", "scoring_system": "epss", "scoring_elements": "0.69569", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00602", "scoring_system": "epss", "scoring_elements": "0.6955", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5102" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5102", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5102" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343407", "reference_id": "1343407", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343407" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://usn.ubuntu.com/3606-1/", "reference_id": "USN-3606-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3606-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-5102" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xg5z-jss1-3ycp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81322?format=api", "vulnerability_id": "VCID-xg6v-katm-67et", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9536.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9536.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9536", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61605", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61768", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61782", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61764", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61759", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61679", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.6171", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61681", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.6173", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61745", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61767", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61754", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61735", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61776", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397758", "reference_id": "1397758", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397758" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0225", "reference_id": "RHSA-2017:0225", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0225" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" }, { "reference_url": "https://usn.ubuntu.com/3212-3/", "reference_id": "USN-3212-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-9536" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xg6v-katm-67et" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61004?format=api", "vulnerability_id": "VCID-xx3b-d12j-8qc4", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5314.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5314.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5314", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.011", "scoring_system": "epss", "scoring_elements": "0.78126", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.011", "scoring_system": "epss", "scoring_elements": "0.78106", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.011", "scoring_system": "epss", "scoring_elements": "0.78113", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.011", "scoring_system": "epss", "scoring_elements": "0.77988", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.011", "scoring_system": "epss", "scoring_elements": "0.77996", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.011", "scoring_system": "epss", "scoring_elements": "0.78025", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.011", "scoring_system": "epss", "scoring_elements": "0.78008", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.011", "scoring_system": "epss", "scoring_elements": "0.78034", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.011", "scoring_system": "epss", "scoring_elements": "0.78038", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.011", "scoring_system": "epss", "scoring_elements": "0.78065", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.011", "scoring_system": "epss", "scoring_elements": "0.78048", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.011", "scoring_system": "epss", "scoring_elements": "0.78045", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.011", "scoring_system": "epss", "scoring_elements": "0.7808", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.011", "scoring_system": "epss", "scoring_elements": "0.78079", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.011", "scoring_system": "epss", "scoring_elements": "0.78073", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346697", "reference_id": "1346697", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346697" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=830700", "reference_id": "830700", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=830700" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-5314" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xx3b-d12j-8qc4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60990?format=api", "vulnerability_id": "VCID-ytpu-tcxj-guex", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3621.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3621.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3621", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71656", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71647", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71651", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.7153", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71536", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71554", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71527", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71567", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71578", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71601", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71585", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71612", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71616", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71597", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3621" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3621", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3621" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1324822", "reference_id": "1324822", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1324822" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820364", "reference_id": "820364", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820364" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371606?format=api", "purl": "pkg:alpm/archlinux/lib32-libtiff@4.0.7-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g2kq-ch6c-nubm" }, { "vulnerability": "VCID-nyjs-ay8u-13gx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" } ], "aliases": [ "CVE-2016-3621" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ytpu-tcxj-guex" } ], "risk_score": "4.5", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-libtiff@4.0.7-1" }