Lookup for vulnerable packages by Package URL.

GET /api/packages/371609?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/371609?format=api",
    "purl": "pkg:alpm/archlinux/libtiff@4.0.6-2",
    "type": "alpm",
    "namespace": "archlinux",
    "name": "libtiff",
    "version": "4.0.6-2",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "4.0.7-1",
    "latest_non_vulnerable_version": "4.1.0-1",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61008?format=api",
            "vulnerability_id": "VCID-1cjh-zx12-2fh2",
            "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5318.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5318.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5318",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00839",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74774",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00839",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74764",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00839",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74771",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00839",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74648",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00839",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74652",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00839",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74678",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00839",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74685",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00839",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74699",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00839",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74723",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00839",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74702",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00839",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74694",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00839",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74731",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00839",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74739",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00839",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74729",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5318"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5318",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5318"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344068",
                    "reference_id": "1344068",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344068"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-16",
                    "reference_id": "GLSA-201701-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-16"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3606-1/",
                    "reference_id": "USN-3606-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3606-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-5318"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1cjh-zx12-2fh2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47125?format=api",
            "vulnerability_id": "VCID-1dhy-s5x3-fuf7",
            "summary": "Multiple vulnerabilities in libTIFF could result in execution of\n    arbitrary code or Denial of Service.",
            "references": [
                {
                    "reference_url": "http://bugzilla.maptools.org/show_bug.cgi?id=2209",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://bugzilla.maptools.org/show_bug.cgi?id=2209"
                },
                {
                    "reference_url": "http://marc.info/?l=oss-security&m=127731610612908&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=oss-security&m=127731610612908&w=2"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2596.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2596.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2596",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00999",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77066",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00999",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77046",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00999",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77053",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00999",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76913",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00999",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76919",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00999",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76949",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00999",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76931",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00999",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76963",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00999",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76974",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00999",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77002",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00999",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76981",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00999",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76976",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00999",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77017",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00999",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77019",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00999",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77011",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2596"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=583081",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=583081"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2596",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2596"
                },
                {
                    "reference_url": "http://secunia.com/advisories/40422",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/40422"
                },
                {
                    "reference_url": "http://secunia.com/advisories/50726",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/50726"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201209-02.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-201209-02.xml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=610759",
                    "reference_id": "610759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=610759"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:3.9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:libtiff:libtiff:3.9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:3.9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:3.9.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:libtiff:libtiff:3.9.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:3.9.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2596",
                    "reference_id": "CVE-2010-2596",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2596"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-02",
                    "reference_id": "GLSA-201209-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:0222",
                    "reference_id": "RHSA-2014:0222",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:0222"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2010-2596"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1dhy-s5x3-fuf7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60992?format=api",
            "vulnerability_id": "VCID-1pbp-smgt-duey",
            "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3623.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3623.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01585",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81677",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01585",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81663",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01585",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81672",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01585",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81533",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01585",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81545",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01585",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81567",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01585",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81565",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01585",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81592",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01585",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81598",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01585",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81618",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01585",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81605",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01585",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81635",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01585",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81636",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01585",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81639",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1325089",
                    "reference_id": "1325089",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1325089"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-16",
                    "reference_id": "GLSA-201701-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-16"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-1/",
                    "reference_id": "USN-3212-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-3/",
                    "reference_id": "USN-3212-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-3623"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1pbp-smgt-duey"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60988?format=api",
            "vulnerability_id": "VCID-255p-pm39-1bb3",
            "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3619.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3619.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00955",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76508",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00955",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76489",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00955",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76496",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00955",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76364",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00955",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76368",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00955",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76398",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00955",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76379",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00955",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76412",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00955",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76426",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00955",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76452",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00955",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7643",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00955",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76425",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00955",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76466",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00955",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7647",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00955",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76456",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3619"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1316569",
                    "reference_id": "1316569",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1316569"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820362",
                    "reference_id": "820362",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820362"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-16",
                    "reference_id": "GLSA-201701-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-16"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-3619"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-255p-pm39-1bb3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60997?format=api",
            "vulnerability_id": "VCID-28t9-d8gb-b3h9",
            "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3633.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3633.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3633",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63799",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63789",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63802",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6366",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6372",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63745",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63706",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63758",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63775",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63788",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63773",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63739",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63785",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3633"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3633",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3633"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326255",
                    "reference_id": "1326255",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326255"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842046",
                    "reference_id": "842046",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842046"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-16",
                    "reference_id": "GLSA-201701-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-16"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-3633"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-28t9-d8gb-b3h9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60994?format=api",
            "vulnerability_id": "VCID-2a5b-7k5n-73fx",
            "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3625.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3625.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3625",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00636",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70506",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00636",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70446",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00636",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70497",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00636",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70352",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00636",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70364",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00636",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70381",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00636",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7036",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00636",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70406",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00636",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70421",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00636",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70445",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00636",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7043",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00636",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70416",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00636",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70458",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00636",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70466",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3625"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3625",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3625"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1325091",
                    "reference_id": "1325091",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1325091"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-16",
                    "reference_id": "GLSA-201701-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-16"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-3625"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2a5b-7k5n-73fx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60993?format=api",
            "vulnerability_id": "VCID-36t6-pnx8-xugd",
            "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3624.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3624.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80042",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8002",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80026",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79912",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79919",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7994",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79928",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79957",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79966",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79986",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7997",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79961",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79989",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79991",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3624"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1325090",
                    "reference_id": "1325090",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1325090"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-16",
                    "reference_id": "GLSA-201701-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-16"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-1/",
                    "reference_id": "USN-3212-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-3/",
                    "reference_id": "USN-3212-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-3624"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-36t6-pnx8-xugd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81325?format=api",
            "vulnerability_id": "VCID-45tr-e5rv-6uch",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9540.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9540.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9540",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6175",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61915",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61926",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61906",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61923",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61824",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61854",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61825",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61874",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61889",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6191",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61899",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61878",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61922",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9540"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397768",
                    "reference_id": "1397768",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397768"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0225",
                    "reference_id": "RHSA-2017:0225",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0225"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-1/",
                    "reference_id": "USN-3212-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-9540"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-45tr-e5rv-6uch"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61006?format=api",
            "vulnerability_id": "VCID-4e6e-nkkd-j3ef",
            "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5316.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5316.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75072",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75065",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75069",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7495",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74953",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74982",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74957",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74991",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75003",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75025",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75004",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74993",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75029",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75037",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75026",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346690",
                    "reference_id": "1346690",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346690"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=830700",
                    "reference_id": "830700",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=830700"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-16",
                    "reference_id": "GLSA-201701-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-16"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-1/",
                    "reference_id": "USN-3212-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-5316"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4e6e-nkkd-j3ef"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60981?format=api",
            "vulnerability_id": "VCID-5h29-wne5-gbd7",
            "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "http://packetstormsecurity.com/files/135080/libtiff-4.0.6-Heap-Overflow.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://packetstormsecurity.com/files/135080/libtiff-4.0.6-Heap-Overflow.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1546.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1546.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1547.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1547.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8668.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8668.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8668",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0671",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91289",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0671",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91279",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0671",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91278",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0671",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91281",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0671",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91291",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.07386",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91688",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.07386",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91697",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07386",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91702",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07386",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9171",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07386",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91723",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07386",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91729",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.07386",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91732",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.07386",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91734",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.07386",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9173",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8668"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8668",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8668"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/537208/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/537208/100/0/threaded"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1294425",
                    "reference_id": "1294425",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1294425"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842046",
                    "reference_id": "842046",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842046"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_server:3.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:vm_server:3.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_server:3.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_server:3.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:vm_server:3.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_server:3.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8668",
                    "reference_id": "CVE-2015-8668",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8668"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-16",
                    "reference_id": "GLSA-201701-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-16"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1546",
                    "reference_id": "RHSA-2016:1546",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1546"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1547",
                    "reference_id": "RHSA-2016:1547",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1547"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-1/",
                    "reference_id": "USN-3212-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-3/",
                    "reference_id": "USN-3212-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2015-8668"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5h29-wne5-gbd7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61019?format=api",
            "vulnerability_id": "VCID-7dzd-xznd-jug7",
            "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9297.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9297.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9297",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00589",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69096",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00589",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69258",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00589",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6919",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00589",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69241",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00589",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6925",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00589",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69112",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00589",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69134",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00589",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69115",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00589",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69165",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00589",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69184",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00589",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69206",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00589",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69191",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00589",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69162",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00589",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69202",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00589",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6921",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9297"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395264",
                    "reference_id": "1395264",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395264"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=844226",
                    "reference_id": "844226",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=844226"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-16",
                    "reference_id": "GLSA-201701-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-16"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-1/",
                    "reference_id": "USN-3212-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-9297"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7dzd-xznd-jug7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81321?format=api",
            "vulnerability_id": "VCID-7xr6-sn1k-t7cw",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9534.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9534.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9534",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63449",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6359",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63563",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63582",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63595",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63509",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63536",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.635",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63552",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63569",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63585",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6357",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63572",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63579",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9534"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:A/AC:H/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397751",
                    "reference_id": "1397751",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397751"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0225",
                    "reference_id": "RHSA-2017:0225",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0225"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-1/",
                    "reference_id": "USN-3212-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-3/",
                    "reference_id": "USN-3212-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-9534"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7xr6-sn1k-t7cw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60982?format=api",
            "vulnerability_id": "VCID-81ew-t25a-f7gq",
            "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1546.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1546.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1547.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1547.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8683.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8683.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8683",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43074",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42972",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43196",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43186",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43118",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43053",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43055",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43132",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43159",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43098",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43151",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43163",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43184",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43136",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8683"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8665",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8665"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8683",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8683"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8781"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8782",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8782"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8783",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8783"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8784",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8784"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3467",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3467"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/12/25/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/12/25/1"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/12/26/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/12/26/1"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/79718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/79718"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1035508",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1035508"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2939-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2939-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1294427",
                    "reference_id": "1294427",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1294427"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809021",
                    "reference_id": "809021",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809021"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:4.0.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:libtiff:libtiff:4.0.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:4.0.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8683",
                    "reference_id": "CVE-2015-8683",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8683"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-16",
                    "reference_id": "GLSA-201701-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-16"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1546",
                    "reference_id": "RHSA-2016:1546",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1546"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1547",
                    "reference_id": "RHSA-2016:1547",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1547"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2939-1/",
                    "reference_id": "USN-2939-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2939-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2015-8683"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-81ew-t25a-f7gq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60999?format=api",
            "vulnerability_id": "VCID-83hb-ksrb-yyb5",
            "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3658.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3658.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3658",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00951",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76459",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00951",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76438",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00951",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76445",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00951",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76316",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00951",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76319",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00951",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76349",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00951",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76329",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00951",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76361",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00951",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76375",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00951",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76401",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00951",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76379",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00951",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76373",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00951",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76413",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00951",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7642",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00951",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76404",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3658"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10266",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10266"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10267",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10267"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10269",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10269"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10270",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10270"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3658",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3658"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9535",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9535"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5225",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5225"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7592",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7592"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7593",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7593"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7594",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7594"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7595",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7595"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7596",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7596"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7597",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7597"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7598",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7598"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7599",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7599"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7600",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7600"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7601",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7601"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7602"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326257",
                    "reference_id": "1326257",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326257"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-16",
                    "reference_id": "GLSA-201701-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-16"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-1/",
                    "reference_id": "USN-3212-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-3658"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-83hb-ksrb-yyb5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61013?format=api",
            "vulnerability_id": "VCID-98zm-dbqt-g3eg",
            "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5323.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5323.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78029",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78167",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78114",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78147",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78153",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78038",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78067",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7805",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78076",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7808",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78106",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78089",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78086",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78121",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7812",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346696",
                    "reference_id": "1346696",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346696"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-16",
                    "reference_id": "GLSA-201701-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-16"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-1/",
                    "reference_id": "USN-3212-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-5323"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-98zm-dbqt-g3eg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81350?format=api",
            "vulnerability_id": "VCID-a1hq-fqkv-u7d9",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9535.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9535.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9535",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00604",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69514",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00604",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69675",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00604",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69609",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00604",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69661",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00604",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6967",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00604",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69525",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00604",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6954",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00604",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6952",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00604",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6957",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00604",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69586",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00604",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69608",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00604",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69593",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00604",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69579",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00604",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69619",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00604",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69628",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9535"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10266",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10266"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10267",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10267"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10269",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10269"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10270",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10270"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3658",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3658"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9535",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9535"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5225",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5225"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7592",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7592"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7593",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7593"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7594",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7594"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7595",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7595"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7596",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7596"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7597",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7597"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7598",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7598"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7599",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7599"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7600",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7600"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7601",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7601"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7602"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397755",
                    "reference_id": "1397755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397755"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0225",
                    "reference_id": "RHSA-2017:0225",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0225"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-1/",
                    "reference_id": "USN-3212-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-9535"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a1hq-fqkv-u7d9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61005?format=api",
            "vulnerability_id": "VCID-baha-p74p-rff4",
            "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5315.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5315.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6178",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61775",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61769",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61615",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6169",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6172",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61691",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6174",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61755",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61776",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61764",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61745",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61787",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61792",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5315"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346694",
                    "reference_id": "1346694",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346694"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=830700",
                    "reference_id": "830700",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=830700"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-16",
                    "reference_id": "GLSA-201701-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-16"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-1/",
                    "reference_id": "USN-3212-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-5315"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-baha-p74p-rff4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61014?format=api",
            "vulnerability_id": "VCID-bf8s-peku-2uht",
            "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5652.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5652.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90982",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91065",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.06401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91058",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.06401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91071",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.06401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91069",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.06401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90987",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90996",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91007",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91019",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91025",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91033",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91057",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.06401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91055",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5652"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389222",
                    "reference_id": "1389222",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389222"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842361",
                    "reference_id": "842361",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842361"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-16",
                    "reference_id": "GLSA-201701-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-16"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0225",
                    "reference_id": "RHSA-2017:0225",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0225"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-1/",
                    "reference_id": "USN-3212-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-5652"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bf8s-peku-2uht"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60995?format=api",
            "vulnerability_id": "VCID-ceb4-e5mz-4fbp",
            "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3631.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3631.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3631",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73961",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73926",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73953",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73827",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73837",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73862",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73832",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73867",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7388",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73902",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73884",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73875",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73918",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3631"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3631",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3631"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1316872",
                    "reference_id": "1316872",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1316872"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820366",
                    "reference_id": "820366",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820366"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-16",
                    "reference_id": "GLSA-201701-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-16"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-3631"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ceb4-e5mz-4fbp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61016?format=api",
            "vulnerability_id": "VCID-cswr-9c4x-xyg8",
            "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6223.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6223.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6223",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79184",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79312",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79254",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79288",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79294",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79191",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79214",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.792",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79225",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79232",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79256",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79241",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79229",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79255",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79252",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6223"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356867",
                    "reference_id": "1356867",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356867"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842270",
                    "reference_id": "842270",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842270"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-16",
                    "reference_id": "GLSA-201701-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-16"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-1/",
                    "reference_id": "USN-3212-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-6223"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cswr-9c4x-xyg8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61020?format=api",
            "vulnerability_id": "VCID-czyn-snja-skba",
            "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9448.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9448.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.839",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84033",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83996",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84023",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8403",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83915",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83932",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83934",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83958",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83964",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8398",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83974",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8397",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83993",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83995",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9448"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397734",
                    "reference_id": "1397734",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397734"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-16",
                    "reference_id": "GLSA-201701-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-16"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-1/",
                    "reference_id": "USN-3212-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-9448"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-czyn-snja-skba"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60989?format=api",
            "vulnerability_id": "VCID-dxtf-qzfj-k3aq",
            "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3620.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3620.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77182",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77161",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77168",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77032",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77038",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77067",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77048",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7708",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7709",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77118",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77098",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77093",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77134",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77136",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77127",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3620"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1316859",
                    "reference_id": "1316859",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1316859"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820363",
                    "reference_id": "820363",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820363"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-16",
                    "reference_id": "GLSA-201701-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-16"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-3620"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dxtf-qzfj-k3aq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61021?format=api",
            "vulnerability_id": "VCID-fc93-fu34-37cx",
            "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9453.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9453.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9453",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6167",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61833",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6184",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61844",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61827",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61822",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61744",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61774",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61792",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61808",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61828",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61816",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61796",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9453"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397723",
                    "reference_id": "1397723",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397723"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-16",
                    "reference_id": "GLSA-201701-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-16"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-1/",
                    "reference_id": "USN-3212-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-3/",
                    "reference_id": "USN-3212-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-9453"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fc93-fu34-37cx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60987?format=api",
            "vulnerability_id": "VCID-gg7k-u39a-kqbw",
            "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-04/msg00064.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-04/msg00064.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-04/msg00075.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-04/msg00075.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3186.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3186.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3186",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00766",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73546",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00766",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7351",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00766",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73504",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00766",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73537",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00766",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73549",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00766",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7341",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00766",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73418",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00766",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73442",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00766",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73413",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00766",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73451",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00766",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73464",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00766",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73488",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00766",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73468",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00766",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7346",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00766",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73502",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3186"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1319503",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1319503"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3186",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3186"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1035442",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1035442"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1319666",
                    "reference_id": "1319666",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1319666"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=819972",
                    "reference_id": "819972",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=819972"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:4.0.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:libtiff:libtiff:4.0.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:4.0.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3186",
                    "reference_id": "CVE-2016-3186",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3186"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-16",
                    "reference_id": "GLSA-201701-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-16"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:2053",
                    "reference_id": "RHSA-2019:2053",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:2053"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3606-1/",
                    "reference_id": "USN-3606-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3606-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-3186"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gg7k-u39a-kqbw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60980?format=api",
            "vulnerability_id": "VCID-gp1w-v49g-j3aw",
            "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1546.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1546.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1547.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1547.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8665.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8665.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8665",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43179",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43078",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43298",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43287",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43223",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43157",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43158",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43235",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43264",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43201",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43253",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43265",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43286",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43238",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8665"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8665",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8665"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8683",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8683"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8781"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8782",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8782"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8783",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8783"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8784",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8784"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3467",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3467"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/12/24/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/12/24/2"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/12/24/4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/12/24/4"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/79728",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/79728"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1035508",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1035508"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2939-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2939-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1294444",
                    "reference_id": "1294444",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1294444"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808968",
                    "reference_id": "808968",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808968"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:4.0.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:libtiff:libtiff:4.0.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:4.0.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8665",
                    "reference_id": "CVE-2015-8665",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8665"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-16",
                    "reference_id": "GLSA-201701-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-16"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1546",
                    "reference_id": "RHSA-2016:1546",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1546"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1547",
                    "reference_id": "RHSA-2016:1547",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1547"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2939-1/",
                    "reference_id": "USN-2939-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2939-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2015-8665"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gp1w-v49g-j3aw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61009?format=api",
            "vulnerability_id": "VCID-hfrr-s8ge-z7hx",
            "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5319.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5319.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5319",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75382",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75373",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75377",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75248",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75251",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75283",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75261",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75304",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75314",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75335",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75313",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75302",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75342",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75348",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75338",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5319"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5319",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5319"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344069",
                    "reference_id": "1344069",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344069"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842046",
                    "reference_id": "842046",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842046"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-16",
                    "reference_id": "GLSA-201701-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-16"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-5319"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hfrr-s8ge-z7hx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84847?format=api",
            "vulnerability_id": "VCID-jr5v-vzng-nbcb",
            "summary": "libtiff: Out-of-bounds read in readContigTilesIntoBuffer()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9539.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9539.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9539",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61605",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61768",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61782",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61764",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61759",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61679",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6171",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61681",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6173",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61745",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61767",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61754",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61735",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61776",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9539"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9539",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9539"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397767",
                    "reference_id": "1397767",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397767"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-1/",
                    "reference_id": "USN-3212-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-9539"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jr5v-vzng-nbcb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61015?format=api",
            "vulnerability_id": "VCID-k8zk-je18-wbb8",
            "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5875.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5875.json"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389228",
                    "reference_id": "1389228",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389228"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-16",
                    "reference_id": "GLSA-201701-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-16"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-1/",
                    "reference_id": "USN-3212-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-5875"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k8zk-je18-wbb8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60991?format=api",
            "vulnerability_id": "VCID-m7mp-g37h-p3g9",
            "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3622.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3622.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75933",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75913",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75922",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75792",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75796",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75828",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75806",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75839",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75851",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75874",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75855",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75849",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75886",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7589",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75875",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1324823",
                    "reference_id": "1324823",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1324823"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820365",
                    "reference_id": "820365",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820365"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-16",
                    "reference_id": "GLSA-201701-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-16"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-1/",
                    "reference_id": "USN-3212-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-3622"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m7mp-g37h-p3g9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61000?format=api",
            "vulnerability_id": "VCID-mqad-tkgf-r3ag",
            "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3945.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3945.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36541",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36229",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36569",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36345",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36315",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36712",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36744",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36581",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36634",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36651",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3666",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36625",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.366",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36645",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36628",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1325093",
                    "reference_id": "1325093",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1325093"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-16",
                    "reference_id": "GLSA-201701-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-16"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1546",
                    "reference_id": "RHSA-2016:1546",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1546"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1547",
                    "reference_id": "RHSA-2016:1547",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1547"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-1/",
                    "reference_id": "USN-3212-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-4/",
                    "reference_id": "USN-3212-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-4/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-3945"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mqad-tkgf-r3ag"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60978?format=api",
            "vulnerability_id": "VCID-mwb4-9fjj-qyfs",
            "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7313.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7313.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7313",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32461",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3281",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3266",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32545",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32824",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32955",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3299",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32812",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3286",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32889",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3289",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32852",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32827",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32868",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32846",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7313"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7313",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7313"
                },
                {
                    "reference_url": "http://seclists.org/oss-sec/2015/q3/601",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://seclists.org/oss-sec/2015/q3/601"
                },
                {
                    "reference_url": "https://security-tracker.debian.org/tracker/CVE-2015-7313",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security-tracker.debian.org/tracker/CVE-2015-7313"
                },
                {
                    "reference_url": "https://ubuntu.com/security/CVE-2015-7313",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://ubuntu.com/security/CVE-2015-7313"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/76843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/76843"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265998",
                    "reference_id": "1265998",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1265998"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=800124",
                    "reference_id": "800124",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=800124"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7313",
                    "reference_id": "CVE-2015-7313",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7313"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-16",
                    "reference_id": "GLSA-201701-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-16"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2015-7313"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mwb4-9fjj-qyfs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61012?format=api",
            "vulnerability_id": "VCID-n5xz-y6bx-myfr",
            "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5322.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5322.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39237",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39598",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39513",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39334",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39319",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39462",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39612",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39634",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39551",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39605",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3962",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3963",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39593",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39577",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39627",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3762",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2017/dsa-3762"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2016/06/15/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2016/06/15/2"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91204",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/91204"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91205",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/91205"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346683",
                    "reference_id": "1346683",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346683"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5322",
                    "reference_id": "CVE-2016-5322",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5322"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-16",
                    "reference_id": "GLSA-201701-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-16"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-1/",
                    "reference_id": "USN-3212-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-3/",
                    "reference_id": "USN-3212-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-5322"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n5xz-y6bx-myfr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60998?format=api",
            "vulnerability_id": "VCID-p9pe-czsr-9uhu",
            "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3634.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3634.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3634",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00693",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71926",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00693",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71924",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00693",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71929",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00693",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71808",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00693",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71817",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00693",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71836",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00693",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71809",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00693",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71848",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00693",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71859",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00693",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71883",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00693",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71865",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00693",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7189",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00693",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71895",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00693",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71879",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3634"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3634",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3634"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326267",
                    "reference_id": "1326267",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326267"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-16",
                    "reference_id": "GLSA-201701-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-16"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-3634"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p9pe-czsr-9uhu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61002?format=api",
            "vulnerability_id": "VCID-pczq-1huj-p7hf",
            "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3991.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3991.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3991",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00444",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63271",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00444",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63405",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00444",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63377",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00444",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63395",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00444",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63408",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00444",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63331",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00444",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63358",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00444",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63324",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00444",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63375",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00444",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63393",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00444",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6341",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00444",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63357",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00444",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63392",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00444",
                            "scoring_system": "epss",
                            "scoring_elements": "0.634",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3991"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326249",
                    "reference_id": "1326249",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326249"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-16",
                    "reference_id": "GLSA-201701-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-16"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1546",
                    "reference_id": "RHSA-2016:1546",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1546"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1547",
                    "reference_id": "RHSA-2016:1547",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1547"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-1/",
                    "reference_id": "USN-3212-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-3/",
                    "reference_id": "USN-3212-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-3991"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pczq-1huj-p7hf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58071?format=api",
            "vulnerability_id": "VCID-pf5w-eted-9kc9",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8127.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8127.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8127",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67455",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67589",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67577",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67587",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67491",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67512",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6749",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67541",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67556",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67578",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67564",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67531",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67566",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67579",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67558",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8127"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8127",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8127"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8128"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8129",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8129"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9330",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9330"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9655",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9655"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1547"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185805",
                    "reference_id": "1185805",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185805"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776185",
                    "reference_id": "776185",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776185"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-16",
                    "reference_id": "GLSA-201701-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-16"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1546",
                    "reference_id": "RHSA-2016:1546",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1546"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1547",
                    "reference_id": "RHSA-2016:1547",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1547"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2553-1/",
                    "reference_id": "USN-2553-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2553-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2014-8127"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pf5w-eted-9kc9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61010?format=api",
            "vulnerability_id": "VCID-qa3t-c5ua-mfdy",
            "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5320.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5320.json"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346687",
                    "reference_id": "1346687",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346687"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-16",
                    "reference_id": "GLSA-201701-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-16"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1546",
                    "reference_id": "RHSA-2016:1546",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1546"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1547",
                    "reference_id": "RHSA-2016:1547",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1547"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-1/",
                    "reference_id": "USN-3212-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-5320"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qa3t-c5ua-mfdy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81320?format=api",
            "vulnerability_id": "VCID-rqmj-ns2c-jbh4",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9533.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9533.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59945",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60076",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60115",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60072",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60088",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60023",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60047",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60017",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60067",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60081",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60102",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60087",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6007",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60109",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397769",
                    "reference_id": "1397769",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397769"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0225",
                    "reference_id": "RHSA-2017:0225",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0225"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-1/",
                    "reference_id": "USN-3212-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-3/",
                    "reference_id": "USN-3212-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-9533"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rqmj-ns2c-jbh4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81323?format=api",
            "vulnerability_id": "VCID-s2xb-r3c7-7fc4",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9537.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9537.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61605",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61768",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61764",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61759",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61679",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6171",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61681",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6173",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61745",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61767",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61754",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61735",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61776",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61782",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397760",
                    "reference_id": "1397760",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397760"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0225",
                    "reference_id": "RHSA-2017:0225",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0225"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-1/",
                    "reference_id": "USN-3212-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-3/",
                    "reference_id": "USN-3212-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-9537"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s2xb-r3c7-7fc4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61011?format=api",
            "vulnerability_id": "VCID-s4k8-v3sj-23fw",
            "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5321.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5321.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4081",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4061",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.408",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40707",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40694",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40894",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40921",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40849",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40898",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40904",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40886",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40867",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40909",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40879",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346695",
                    "reference_id": "1346695",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346695"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-16",
                    "reference_id": "GLSA-201701-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-16"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-1/",
                    "reference_id": "USN-3212-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-3/",
                    "reference_id": "USN-3212-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-5321"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s4k8-v3sj-23fw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61001?format=api",
            "vulnerability_id": "VCID-s7s4-ux2t-3yc5",
            "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3990.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3990.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00444",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63405",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00444",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6341",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00444",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63357",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00444",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63392",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00444",
                            "scoring_system": "epss",
                            "scoring_elements": "0.634",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00444",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63377",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00444",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63395",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00444",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63408",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00444",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63375",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00444",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63393",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64293",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64322",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64279",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64236",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3990"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326246",
                    "reference_id": "1326246",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326246"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=836570",
                    "reference_id": "836570",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=836570"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-16",
                    "reference_id": "GLSA-201701-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-16"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1546",
                    "reference_id": "RHSA-2016:1546",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1546"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1547",
                    "reference_id": "RHSA-2016:1547",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1547"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-1/",
                    "reference_id": "USN-3212-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-3/",
                    "reference_id": "USN-3212-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-3990"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s7s4-ux2t-3yc5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81324?format=api",
            "vulnerability_id": "VCID-spqg-q1z6-pyex",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9538.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9538.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61605",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61768",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61782",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61764",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61759",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61679",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6171",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61681",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6173",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61745",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61767",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61754",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61735",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61776",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9538"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397765",
                    "reference_id": "1397765",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397765"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-1/",
                    "reference_id": "USN-3212-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-9538"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-spqg-q1z6-pyex"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60996?format=api",
            "vulnerability_id": "VCID-u1mj-pxtw-7qet",
            "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3632.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3632.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3632",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66461",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6661",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66587",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66594",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66609",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.665",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66526",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66497",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66545",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66559",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66578",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66566",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66534",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6657",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3632"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3632",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3632"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1325095",
                    "reference_id": "1325095",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1325095"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-16",
                    "reference_id": "GLSA-201701-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-16"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1546",
                    "reference_id": "RHSA-2016:1546",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1546"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1547",
                    "reference_id": "RHSA-2016:1547",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1547"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-1/",
                    "reference_id": "USN-3212-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-3/",
                    "reference_id": "USN-3212-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-3632"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u1mj-pxtw-7qet"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60977?format=api",
            "vulnerability_id": "VCID-vn6c-kuq7-k3hv",
            "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8130.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8130.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8130",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83896",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84028",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84018",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84025",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83928",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8393",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83954",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83961",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83976",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8397",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83966",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8399",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83991",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8130"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185817",
                    "reference_id": "1185817",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185817"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776185",
                    "reference_id": "776185",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776185"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-16",
                    "reference_id": "GLSA-201701-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-16"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1546",
                    "reference_id": "RHSA-2016:1546",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1546"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1547",
                    "reference_id": "RHSA-2016:1547",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1547"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2553-1/",
                    "reference_id": "USN-2553-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2553-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2014-8130"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vn6c-kuq7-k3hv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61022?format=api",
            "vulnerability_id": "VCID-wes8-vrs4-gygk",
            "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9532.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9532.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00585",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68998",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00585",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69158",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00585",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69092",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00585",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69142",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00585",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6915",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00585",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69015",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00585",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69035",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00585",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69016",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00585",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69066",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00585",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69085",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00585",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69108",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00585",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69094",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00585",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69064",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00585",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69103",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00585",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69112",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9532"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397726",
                    "reference_id": "1397726",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397726"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=844057",
                    "reference_id": "844057",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=844057"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-16",
                    "reference_id": "GLSA-201701-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-16"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-1/",
                    "reference_id": "USN-3212-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-9532"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wes8-vrs4-gygk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61018?format=api",
            "vulnerability_id": "VCID-wpd2-zcyv-s7g8",
            "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9273.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9273.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77849",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77993",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77939",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77973",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7798",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77856",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77884",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77866",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77894",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77898",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77925",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77909",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77947",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77946",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9273"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395164",
                    "reference_id": "1395164",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395164"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=844013",
                    "reference_id": "844013",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=844013"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-16",
                    "reference_id": "GLSA-201701-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-16"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-1/",
                    "reference_id": "USN-3212-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-9273"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wpd2-zcyv-s7g8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61007?format=api",
            "vulnerability_id": "VCID-x91e-13q2-yked",
            "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5317.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5317.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00611",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69865",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00611",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69852",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00611",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69861",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00611",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69708",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00611",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6972",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00611",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69736",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00611",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69713",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00611",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69761",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00611",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69778",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00611",
                            "scoring_system": "epss",
                            "scoring_elements": "0.698",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00611",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69784",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00611",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6977",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00611",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69811",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00611",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69821",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00611",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69801",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346689",
                    "reference_id": "1346689",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346689"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=830700",
                    "reference_id": "830700",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=830700"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-16",
                    "reference_id": "GLSA-201701-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-16"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-1/",
                    "reference_id": "USN-3212-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-5317"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x91e-13q2-yked"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61003?format=api",
            "vulnerability_id": "VCID-xg5z-jss1-3ycp",
            "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5102.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5102.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69614",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69602",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6961",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69454",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69465",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69481",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69461",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69511",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69527",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69549",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69534",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6952",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69559",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69569",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6955",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5102"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5102"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343407",
                    "reference_id": "1343407",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343407"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-16",
                    "reference_id": "GLSA-201701-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-16"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3606-1/",
                    "reference_id": "USN-3606-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3606-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-5102"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xg5z-jss1-3ycp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81322?format=api",
            "vulnerability_id": "VCID-xg6v-katm-67et",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9536.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9536.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9536",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61605",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61768",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61782",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61764",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61759",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61679",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6171",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61681",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6173",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61745",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61767",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61754",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61735",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61776",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9536"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397758",
                    "reference_id": "1397758",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397758"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0225",
                    "reference_id": "RHSA-2017:0225",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0225"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-1/",
                    "reference_id": "USN-3212-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-3/",
                    "reference_id": "USN-3212-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-9536"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xg6v-katm-67et"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61004?format=api",
            "vulnerability_id": "VCID-xx3b-d12j-8qc4",
            "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5314.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5314.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78126",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78106",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78113",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77988",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77996",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78025",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78008",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78034",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78038",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78065",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78048",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78045",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7808",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78079",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78073",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5314"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346697",
                    "reference_id": "1346697",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346697"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=830700",
                    "reference_id": "830700",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=830700"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-16",
                    "reference_id": "GLSA-201701-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-16"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3212-1/",
                    "reference_id": "USN-3212-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3212-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-5314"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xx3b-d12j-8qc4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60990?format=api",
            "vulnerability_id": "VCID-ytpu-tcxj-guex",
            "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3621.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3621.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71656",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71647",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71651",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7153",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71536",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71554",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71527",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71567",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71578",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71601",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71585",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71612",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71616",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71597",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3621"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3621"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1324822",
                    "reference_id": "1324822",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1324822"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820364",
                    "reference_id": "820364",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820364"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-26",
                    "reference_id": "ASA-201611-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-27",
                    "reference_id": "ASA-201611-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-85",
                    "reference_id": "AVG-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-85"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-86",
                    "reference_id": "AVG-86",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-86"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-16",
                    "reference_id": "GLSA-201701-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-16"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371610?format=api",
                    "purl": "pkg:alpm/archlinux/libtiff@4.0.7-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.7-1"
                }
            ],
            "aliases": [
                "CVE-2016-3621"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ytpu-tcxj-guex"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "4.5",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libtiff@4.0.6-2"
}