{"url":"http://public2.vulnerablecode.io/api/packages/85852?format=json","purl":"pkg:ebuild/media-libs/openjpeg@2.1.1_p20160922","type":"ebuild","namespace":"media-libs","name":"openjpeg","version":"2.1.1_p20160922","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"2.3.0","latest_non_vulnerable_version":"2.5.0","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62380?format=json","vulnerability_id":"VCID-9ezw-mty9-z3cv","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8871.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8871.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8871","reference_id":"","reference_type":"","scores":[{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80377","published_at":"2026-05-16T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80374","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80131","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80138","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80158","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80146","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80175","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80183","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80202","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80187","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80179","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80208","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80211","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80238","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80247","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80262","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80278","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80301","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80317","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80313","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.8033","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80371","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8871"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1335770","reference_id":"1335770","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1335770"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=800149","reference_id":"800149","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=800149"},{"reference_url":"https://security.gentoo.org/glsa/201612-26","reference_id":"GLSA-201612-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-26"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85852?format=json","purl":"pkg:ebuild/media-libs/openjpeg@2.1.1_p20160922","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/openjpeg@2.1.1_p20160922"}],"aliases":["CVE-2015-8871"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9ezw-mty9-z3cv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62381?format=json","vulnerability_id":"VCID-dvse-ce3w-p7da","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1923.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1923.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1923","reference_id":"","reference_type":"","scores":[{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64469","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64612","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64589","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64635","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.6468","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64652","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64674","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64522","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64552","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.6451","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64558","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64575","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64591","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64578","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.6455","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64584","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64596","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64581","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64602","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64615","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.71079","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.71055","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.71066","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1923"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1923","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1923"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/01/18/4","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/01/18/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/01/18/7","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/01/18/7"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1299767","reference_id":"1299767","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1299767"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818399","reference_id":"818399","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818399"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:2.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:uclouvain:openjpeg:2.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:2.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1923","reference_id":"CVE-2016-1923","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1923"},{"reference_url":"https://security.gentoo.org/glsa/201612-26","reference_id":"GLSA-201612-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-26"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85852?format=json","purl":"pkg:ebuild/media-libs/openjpeg@2.1.1_p20160922","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/openjpeg@2.1.1_p20160922"}],"aliases":["CVE-2016-1923"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dvse-ce3w-p7da"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62382?format=json","vulnerability_id":"VCID-jwrz-ypan-9bg6","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1924.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1924.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1924","reference_id":"","reference_type":"","scores":[{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76231","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76209","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76222","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.75952","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.75955","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.75987","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.75966","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.75999","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76014","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76039","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76015","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.7601","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.7605","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76053","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76037","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76076","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76086","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76097","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76106","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76136","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76157","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76145","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.7616","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"reference_url":"http://www.debian.org/security/2016/dsa-3665","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3665"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/01/18/4","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/01/18/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/01/18/7","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/01/18/7"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1299772","reference_id":"1299772","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1299772"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818399","reference_id":"818399","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818399"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1924","reference_id":"CVE-2016-1924","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1924"},{"reference_url":"https://security.gentoo.org/glsa/201612-26","reference_id":"GLSA-201612-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-26"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85852?format=json","purl":"pkg:ebuild/media-libs/openjpeg@2.1.1_p20160922","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/openjpeg@2.1.1_p20160922"}],"aliases":["CVE-2016-1924"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jwrz-ypan-9bg6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62383?format=json","vulnerability_id":"VCID-rv8p-cz94-6ue9","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3181.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3181.json"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1317822","reference_id":"1317822","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1317822"},{"reference_url":"https://security.gentoo.org/glsa/201612-26","reference_id":"GLSA-201612-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-26"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85852?format=json","purl":"pkg:ebuild/media-libs/openjpeg@2.1.1_p20160922","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/openjpeg@2.1.1_p20160922"}],"aliases":["CVE-2016-3181"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rv8p-cz94-6ue9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62385?format=json","vulnerability_id":"VCID-t76s-q45b-9ff7","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3183.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3183.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3183","reference_id":"","reference_type":"","scores":[{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21324","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21491","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21548","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21304","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21382","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21443","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21454","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21416","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.2136","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21357","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21364","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21332","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21185","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21183","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.2116","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21062","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21129","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21216","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21192","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21214","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.28736","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.28748","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.28753","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3183"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3183","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3183"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1317821","reference_id":"1317821","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1317821"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818399","reference_id":"818399","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818399"},{"reference_url":"https://security.gentoo.org/glsa/201612-26","reference_id":"GLSA-201612-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-26"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85852?format=json","purl":"pkg:ebuild/media-libs/openjpeg@2.1.1_p20160922","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/openjpeg@2.1.1_p20160922"}],"aliases":["CVE-2016-3183"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t76s-q45b-9ff7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62386?format=json","vulnerability_id":"VCID-vt59-h7ax-7uca","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which may allow execution of arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7445","reference_id":"","reference_type":"","scores":[{"value":"0.02027","scoring_system":"epss","scoring_elements":"0.83718","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02027","scoring_system":"epss","scoring_elements":"0.83731","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02027","scoring_system":"epss","scoring_elements":"0.83745","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02027","scoring_system":"epss","scoring_elements":"0.83748","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02027","scoring_system":"epss","scoring_elements":"0.83771","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02027","scoring_system":"epss","scoring_elements":"0.83778","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02027","scoring_system":"epss","scoring_elements":"0.83794","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02027","scoring_system":"epss","scoring_elements":"0.83788","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02027","scoring_system":"epss","scoring_elements":"0.83783","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02027","scoring_system":"epss","scoring_elements":"0.83817","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02027","scoring_system":"epss","scoring_elements":"0.83818","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02027","scoring_system":"epss","scoring_elements":"0.83843","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02027","scoring_system":"epss","scoring_elements":"0.83851","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02027","scoring_system":"epss","scoring_elements":"0.83856","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02027","scoring_system":"epss","scoring_elements":"0.83879","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02027","scoring_system":"epss","scoring_elements":"0.839","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02027","scoring_system":"epss","scoring_elements":"0.83917","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02027","scoring_system":"epss","scoring_elements":"0.83916","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02027","scoring_system":"epss","scoring_elements":"0.83932","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02027","scoring_system":"epss","scoring_elements":"0.83966","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02027","scoring_system":"epss","scoring_elements":"0.83978","published_at":"2026-05-15T12:55:00Z"},{"value":"0.02027","scoring_system":"epss","scoring_elements":"0.83981","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7445"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7445","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7445"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838690","reference_id":"838690","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838690"},{"reference_url":"https://security.gentoo.org/glsa/201612-26","reference_id":"GLSA-201612-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-26"},{"reference_url":"https://usn.ubuntu.com/USN-5664-1/","reference_id":"USN-USN-5664-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-5664-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85852?format=json","purl":"pkg:ebuild/media-libs/openjpeg@2.1.1_p20160922","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/openjpeg@2.1.1_p20160922"}],"aliases":["CVE-2016-7445"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vt59-h7ax-7uca"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62384?format=json","vulnerability_id":"VCID-vxw5-nm1p-q3d5","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3182.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3182.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3182","reference_id":"","reference_type":"","scores":[{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.37889","published_at":"2026-05-16T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38046","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38023","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.37927","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.3781","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.37878","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.37891","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.37803","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.37778","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.37853","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.37866","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.54338","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.5436","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.54388","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.54364","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.54416","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.54411","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.5446","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.54443","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.54421","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.54464","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.54446","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3182"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1317826","reference_id":"1317826","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1317826"},{"reference_url":"https://security.gentoo.org/glsa/201612-26","reference_id":"GLSA-201612-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-26"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85852?format=json","purl":"pkg:ebuild/media-libs/openjpeg@2.1.1_p20160922","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/openjpeg@2.1.1_p20160922"}],"aliases":["CVE-2016-3182"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vxw5-nm1p-q3d5"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/openjpeg@2.1.1_p20160922"}