Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/85852?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/85852?format=api", "purl": "pkg:ebuild/media-libs/openjpeg@2.1.1_p20160922", "type": "ebuild", "namespace": "media-libs", "name": "openjpeg", "version": "2.1.1_p20160922", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "2.3.0", "latest_non_vulnerable_version": "2.5.0", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62380?format=api", "vulnerability_id": "VCID-9ezw-mty9-z3cv", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8871.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8871.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8871", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80371", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.8033", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80131", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80138", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80158", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80146", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80175", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80183", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80202", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80187", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80179", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80208", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80211", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80238", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80247", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80262", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80278", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80301", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80317", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80313", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8871" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1335770", "reference_id": "1335770", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1335770" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=800149", "reference_id": "800149", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=800149" }, { "reference_url": "https://security.gentoo.org/glsa/201612-26", "reference_id": "GLSA-201612-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-26" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85852?format=api", "purl": "pkg:ebuild/media-libs/openjpeg@2.1.1_p20160922", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/openjpeg@2.1.1_p20160922" } ], "aliases": [ "CVE-2015-8871" ], "risk_score": 1.8, "exploitability": "0.5", "weighted_severity": "3.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9ezw-mty9-z3cv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62381?format=api", "vulnerability_id": "VCID-dvse-ce3w-p7da", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1923.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1923.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1923", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64469", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64635", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.6468", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64652", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64674", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64522", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64552", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.6451", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64558", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64575", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64591", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64578", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.6455", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64584", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64596", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64581", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64602", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64615", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64612", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64589", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.71055", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1923" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1923", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1923" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujul2020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/01/18/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/01/18/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/01/18/7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/01/18/7" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299767", "reference_id": "1299767", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299767" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818399", "reference_id": "818399", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818399" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:2.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:uclouvain:openjpeg:2.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:2.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1923", "reference_id": "CVE-2016-1923", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1923" }, { "reference_url": "https://security.gentoo.org/glsa/201612-26", "reference_id": "GLSA-201612-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-26" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85852?format=api", "purl": "pkg:ebuild/media-libs/openjpeg@2.1.1_p20160922", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/openjpeg@2.1.1_p20160922" } ], "aliases": [ "CVE-2016-1923" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dvse-ce3w-p7da" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62382?format=api", "vulnerability_id": "VCID-jwrz-ypan-9bg6", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1924.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1924.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1924", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.76209", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.76145", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.7616", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.75952", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.75955", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.75987", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.75966", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.75999", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.76014", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.76039", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.76015", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.7601", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.7605", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.76053", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.76037", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.76076", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.76086", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.76097", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.76106", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.76136", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00925", "scoring_system": "epss", "scoring_elements": "0.76157", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujul2020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3665", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3665" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/01/18/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/01/18/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/01/18/7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/01/18/7" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299772", "reference_id": "1299772", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299772" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818399", "reference_id": "818399", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818399" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1924", "reference_id": "CVE-2016-1924", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1924" }, { "reference_url": "https://security.gentoo.org/glsa/201612-26", "reference_id": "GLSA-201612-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-26" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85852?format=api", "purl": "pkg:ebuild/media-libs/openjpeg@2.1.1_p20160922", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/openjpeg@2.1.1_p20160922" } ], "aliases": [ "CVE-2016-1924" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jwrz-ypan-9bg6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62383?format=api", "vulnerability_id": "VCID-rv8p-cz94-6ue9", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3181.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3181.json" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1317822", "reference_id": "1317822", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1317822" }, { "reference_url": "https://security.gentoo.org/glsa/201612-26", "reference_id": "GLSA-201612-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-26" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85852?format=api", "purl": "pkg:ebuild/media-libs/openjpeg@2.1.1_p20160922", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/openjpeg@2.1.1_p20160922" } ], "aliases": [ "CVE-2016-3181" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rv8p-cz94-6ue9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62385?format=api", "vulnerability_id": "VCID-t76s-q45b-9ff7", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3183.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3183.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3183", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21324", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21491", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21548", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21304", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21382", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21443", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21454", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21416", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.2136", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21357", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21364", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21332", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21185", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21183", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.2116", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21062", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21129", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21216", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21192", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21214", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.28736", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3183" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3183", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3183" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1317821", "reference_id": "1317821", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1317821" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818399", "reference_id": "818399", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818399" }, { "reference_url": "https://security.gentoo.org/glsa/201612-26", "reference_id": "GLSA-201612-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-26" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85852?format=api", "purl": "pkg:ebuild/media-libs/openjpeg@2.1.1_p20160922", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/openjpeg@2.1.1_p20160922" } ], "aliases": [ "CVE-2016-3183" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t76s-q45b-9ff7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62386?format=api", "vulnerability_id": "VCID-vt59-h7ax-7uca", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7445", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02027", "scoring_system": "epss", "scoring_elements": "0.83718", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02027", "scoring_system": "epss", "scoring_elements": "0.83731", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02027", "scoring_system": "epss", "scoring_elements": "0.83745", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02027", "scoring_system": "epss", "scoring_elements": "0.83748", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02027", "scoring_system": "epss", "scoring_elements": "0.83771", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02027", "scoring_system": "epss", "scoring_elements": "0.83778", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02027", "scoring_system": "epss", "scoring_elements": "0.83794", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02027", "scoring_system": "epss", "scoring_elements": "0.83788", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02027", "scoring_system": "epss", "scoring_elements": "0.83783", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02027", "scoring_system": "epss", "scoring_elements": "0.83817", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02027", "scoring_system": "epss", "scoring_elements": "0.83818", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02027", "scoring_system": "epss", "scoring_elements": "0.83843", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02027", "scoring_system": "epss", "scoring_elements": "0.83851", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02027", "scoring_system": "epss", "scoring_elements": "0.83856", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02027", "scoring_system": "epss", "scoring_elements": "0.83879", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.02027", "scoring_system": "epss", "scoring_elements": "0.839", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.02027", "scoring_system": "epss", "scoring_elements": "0.83917", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.02027", "scoring_system": "epss", "scoring_elements": "0.83916", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.02027", "scoring_system": "epss", "scoring_elements": "0.83932", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.02027", "scoring_system": "epss", "scoring_elements": "0.83966", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7445" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7445", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7445" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838690", "reference_id": "838690", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838690" }, { "reference_url": "https://security.gentoo.org/glsa/201612-26", "reference_id": "GLSA-201612-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-26" }, { "reference_url": "https://usn.ubuntu.com/USN-5664-1/", "reference_id": "USN-USN-5664-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-5664-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85852?format=api", "purl": "pkg:ebuild/media-libs/openjpeg@2.1.1_p20160922", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/openjpeg@2.1.1_p20160922" } ], "aliases": [ "CVE-2016-7445" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vt59-h7ax-7uca" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62384?format=api", "vulnerability_id": "VCID-vxw5-nm1p-q3d5", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3182.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3182.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3182", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.38046", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.38023", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.37927", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.3781", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.37878", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.37891", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.37803", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.37778", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.37853", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00313", "scoring_system": "epss", "scoring_elements": "0.54464", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00313", "scoring_system": "epss", "scoring_elements": "0.54338", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00313", "scoring_system": "epss", "scoring_elements": "0.54446", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00313", "scoring_system": "epss", "scoring_elements": "0.5436", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00313", "scoring_system": "epss", "scoring_elements": "0.54388", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00313", "scoring_system": "epss", "scoring_elements": "0.54364", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00313", "scoring_system": "epss", "scoring_elements": "0.54416", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00313", "scoring_system": "epss", "scoring_elements": "0.54411", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00313", "scoring_system": "epss", "scoring_elements": "0.5446", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00313", "scoring_system": "epss", "scoring_elements": "0.54443", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00313", "scoring_system": "epss", "scoring_elements": "0.54421", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3182" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3182", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3182" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1317826", "reference_id": "1317826", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1317826" }, { "reference_url": "https://security.gentoo.org/glsa/201612-26", "reference_id": "GLSA-201612-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-26" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85852?format=api", "purl": "pkg:ebuild/media-libs/openjpeg@2.1.1_p20160922", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/openjpeg@2.1.1_p20160922" } ], "aliases": [ "CVE-2016-3182" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vxw5-nm1p-q3d5" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/openjpeg@2.1.1_p20160922" }