{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","type":"deb","namespace":"debian","name":"openjpeg2","version":"2.5.3-2.1~deb13u1","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"2.5.3-2.1","latest_non_vulnerable_version":"2.5.4-1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60061?format=json","vulnerability_id":"VCID-1fdm-wd1v-4yf2","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which may allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14164.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14164.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14164","reference_id":"","reference_type":"","scores":[{"value":"0.00789","scoring_system":"epss","scoring_elements":"0.73814","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00789","scoring_system":"epss","scoring_elements":"0.73823","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00789","scoring_system":"epss","scoring_elements":"0.73847","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00789","scoring_system":"epss","scoring_elements":"0.73817","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00789","scoring_system":"epss","scoring_elements":"0.73852","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00789","scoring_system":"epss","scoring_elements":"0.73865","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00789","scoring_system":"epss","scoring_elements":"0.73887","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00789","scoring_system":"epss","scoring_elements":"0.73869","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00789","scoring_system":"epss","scoring_elements":"0.7386","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00789","scoring_system":"epss","scoring_elements":"0.73902","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00832","scoring_system":"epss","scoring_elements":"0.74612","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00832","scoring_system":"epss","scoring_elements":"0.74603","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00832","scoring_system":"epss","scoring_elements":"0.74639","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00832","scoring_system":"epss","scoring_elements":"0.74645","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00832","scoring_system":"epss","scoring_elements":"0.74647","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14164"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1489836","reference_id":"1489836","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1489836"},{"reference_url":"https://security.gentoo.org/glsa/201710-26","reference_id":"GLSA-201710-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-26"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933742?format=json","purl":"pkg:deb/debian/openjpeg2@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2017-14164"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1fdm-wd1v-4yf2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82455?format=json","vulnerability_id":"VCID-1z5a-aa47-dyft","summary":"openjpeg: out-of-bounds read in functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c leads to denial of service","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20846.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20846.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20846","reference_id":"","reference_type":"","scores":[{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63784","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63924","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63914","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63926","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63845","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63872","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63829","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.6388","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63897","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.6391","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63896","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63863","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63898","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63908","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63899","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20846"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20846","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20846"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1728513","reference_id":"1728513","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1728513"},{"reference_url":"https://security.archlinux.org/AVG-1390","reference_id":"AVG-1390","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1390"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933744?format=json","purl":"pkg:deb/debian/openjpeg2@2.3.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2018-20846"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1z5a-aa47-dyft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40226?format=json","vulnerability_id":"VCID-2272-j2kp-x3du","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12973.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12973.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-12973","reference_id":"","reference_type":"","scores":[{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16276","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16531","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16492","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16434","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16374","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16393","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16431","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16323","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16321","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16747","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16845","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16902","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16917","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16974","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16758","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-12973"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12973","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12973"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1732270","reference_id":"1732270","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1732270"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931292","reference_id":"931292","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931292"},{"reference_url":"https://security.archlinux.org/ASA-202012-21","reference_id":"ASA-202012-21","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202012-21"},{"reference_url":"https://security.archlinux.org/AVG-1339","reference_id":"AVG-1339","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1339"},{"reference_url":"https://security.gentoo.org/glsa/202101-29","reference_id":"GLSA-202101-29","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202101-29"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4251","reference_id":"RHSA-2021:4251","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4251"},{"reference_url":"https://usn.ubuntu.com/4497-1/","reference_id":"USN-4497-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4497-1/"},{"reference_url":"https://usn.ubuntu.com/USN-4782-1/","reference_id":"USN-USN-4782-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4782-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933745?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2019-12973"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2272-j2kp-x3du"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80758?format=json","vulnerability_id":"VCID-2ad2-5t5w-d7ew","summary":"openjpeg: global-buffer-overflow read in opj_dwt_calc_explicit_stepsizes()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27824.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27824.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27824","reference_id":"","reference_type":"","scores":[{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35003","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35403","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.3535","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35114","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35092","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.5088","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50895","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50892","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50934","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50912","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50933","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50798","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50854","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50837","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27824"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1905723","reference_id":"1905723","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1905723"},{"reference_url":"https://security.archlinux.org/ASA-202012-21","reference_id":"ASA-202012-21","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202012-21"},{"reference_url":"https://security.archlinux.org/AVG-1339","reference_id":"AVG-1339","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1339"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-27824","reference_id":"CVE-2020-27824","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-27824"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4251","reference_id":"RHSA-2021:4251","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4251"},{"reference_url":"https://usn.ubuntu.com/4685-1/","reference_id":"USN-4685-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4685-1/"},{"reference_url":"https://usn.ubuntu.com/4686-1/","reference_id":"USN-4686-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4686-1/"},{"reference_url":"https://usn.ubuntu.com/4880-1/","reference_id":"USN-4880-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4880-1/"},{"reference_url":"https://usn.ubuntu.com/5952-1/","reference_id":"USN-5952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5952-1/"},{"reference_url":"https://usn.ubuntu.com/USN-5664-1/","reference_id":"USN-USN-5664-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-5664-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933745?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2020-27824"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2ad2-5t5w-d7ew"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40238?format=json","vulnerability_id":"VCID-3r1m-53dp-yff2","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27842.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27842.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27842","reference_id":"","reference_type":"","scores":[{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29845","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29457","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29634","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.2952","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.2989","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29938","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.2975","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29812","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29847","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29856","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.2981","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.2976","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29779","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29758","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29714","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1907513","reference_id":"1907513","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1907513"},{"reference_url":"https://security.archlinux.org/ASA-202012-21","reference_id":"ASA-202012-21","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202012-21"},{"reference_url":"https://security.archlinux.org/AVG-1339","reference_id":"AVG-1339","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1339"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-27842","reference_id":"CVE-2020-27842","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-27842"},{"reference_url":"https://security.gentoo.org/glsa/202101-29","reference_id":"GLSA-202101-29","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202101-29"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4251","reference_id":"RHSA-2021:4251","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4251"},{"reference_url":"https://usn.ubuntu.com/4685-1/","reference_id":"USN-4685-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4685-1/"},{"reference_url":"https://usn.ubuntu.com/4686-1/","reference_id":"USN-4686-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4686-1/"},{"reference_url":"https://usn.ubuntu.com/5952-1/","reference_id":"USN-5952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5952-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933745?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2020-27842"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3r1m-53dp-yff2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85178?format=json","vulnerability_id":"VCID-454c-fk3j-g7aa","summary":"openjpeg: Heap buffer overflow in function color_cmyk_to_rgb in color.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4796.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4796.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4796","reference_id":"","reference_type":"","scores":[{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48908","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48945","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48971","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48925","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48979","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48976","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48993","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48967","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48974","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.4902","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.49017","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48978","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48966","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48975","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48929","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4796"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4796","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4796"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1335482","reference_id":"1335482","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1335482"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933733?format=json","purl":"pkg:deb/debian/openjpeg2@2.1.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2016-4796"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-454c-fk3j-g7aa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40236?format=json","vulnerability_id":"VCID-4hbk-qsje-63fd","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27841.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27841.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27841","reference_id":"","reference_type":"","scores":[{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30361","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.2995","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30141","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30025","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.3039","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30436","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30247","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30307","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30341","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30345","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30301","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30253","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30268","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.3025","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30205","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27841"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1907510","reference_id":"1907510","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1907510"},{"reference_url":"https://security.archlinux.org/ASA-202012-21","reference_id":"ASA-202012-21","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202012-21"},{"reference_url":"https://security.archlinux.org/AVG-1339","reference_id":"AVG-1339","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1339"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-27841","reference_id":"CVE-2020-27841","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-27841"},{"reference_url":"https://security.gentoo.org/glsa/202101-29","reference_id":"GLSA-202101-29","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202101-29"},{"reference_url":"https://usn.ubuntu.com/4685-1/","reference_id":"USN-4685-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4685-1/"},{"reference_url":"https://usn.ubuntu.com/4686-1/","reference_id":"USN-4686-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4686-1/"},{"reference_url":"https://usn.ubuntu.com/4880-1/","reference_id":"USN-4880-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4880-1/"},{"reference_url":"https://usn.ubuntu.com/5952-1/","reference_id":"USN-5952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5952-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933745?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2020-27841"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4hbk-qsje-63fd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92688?format=json","vulnerability_id":"VCID-4qgw-3tgj-4kas","summary":"Double free vulnerability in the j2k_read_ppm_v3 function in OpenJPEG before r2997, as used in PDFium in Google Chrome, allows remote attackers to cause a denial of service (process crash) via a crafted PDF.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-1239","reference_id":"","reference_type":"","scores":[{"value":"0.00828","scoring_system":"epss","scoring_elements":"0.74588","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00828","scoring_system":"epss","scoring_elements":"0.74553","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00828","scoring_system":"epss","scoring_elements":"0.74581","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00828","scoring_system":"epss","scoring_elements":"0.74587","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00828","scoring_system":"epss","scoring_elements":"0.74462","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00828","scoring_system":"epss","scoring_elements":"0.74466","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00828","scoring_system":"epss","scoring_elements":"0.74492","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00828","scoring_system":"epss","scoring_elements":"0.74498","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00828","scoring_system":"epss","scoring_elements":"0.74514","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00828","scoring_system":"epss","scoring_elements":"0.74535","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00828","scoring_system":"epss","scoring_elements":"0.74516","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00828","scoring_system":"epss","scoring_elements":"0.74508","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00828","scoring_system":"epss","scoring_elements":"0.74545","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-1239"},{"reference_url":"https://bugs.chromium.org/p/chromium/issues/detail?id=430891","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.chromium.org/p/chromium/issues/detail?id=430891"},{"reference_url":"https://bugs.chromium.org/p/chromium/issues/detail?id=457493","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.chromium.org/p/chromium/issues/detail?id=457493"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1239","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1239"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00025.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00025.html"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:pdfium:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:pdfium:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:pdfium:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-1239","reference_id":"CVE-2015-1239","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-1239"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933733?format=json","purl":"pkg:deb/debian/openjpeg2@2.1.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2015-1239"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4qgw-3tgj-4kas"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81622?format=json","vulnerability_id":"VCID-5x4u-vqvr-bfhw","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8332.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8332.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8332","reference_id":"","reference_type":"","scores":[{"value":"0.01168","scoring_system":"epss","scoring_elements":"0.78593","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01168","scoring_system":"epss","scoring_elements":"0.786","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01168","scoring_system":"epss","scoring_elements":"0.78631","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01168","scoring_system":"epss","scoring_elements":"0.78612","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01168","scoring_system":"epss","scoring_elements":"0.78637","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01168","scoring_system":"epss","scoring_elements":"0.78644","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01168","scoring_system":"epss","scoring_elements":"0.78669","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01168","scoring_system":"epss","scoring_elements":"0.7865","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01168","scoring_system":"epss","scoring_elements":"0.78643","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01168","scoring_system":"epss","scoring_elements":"0.78672","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01168","scoring_system":"epss","scoring_elements":"0.7867","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01168","scoring_system":"epss","scoring_elements":"0.78667","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01168","scoring_system":"epss","scoring_elements":"0.78698","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01168","scoring_system":"epss","scoring_elements":"0.78705","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01168","scoring_system":"epss","scoring_elements":"0.78722","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8332"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8332","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8332"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1381268","reference_id":"1381268","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1381268"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933738?format=json","purl":"pkg:deb/debian/openjpeg2@2.1.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2016-8332"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5x4u-vqvr-bfhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58975?format=json","vulnerability_id":"VCID-6fte-2hrw-z3eb","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5158.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5158.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5158","reference_id":"","reference_type":"","scores":[{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73166","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73177","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73197","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73171","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73208","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73221","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73246","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73228","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73263","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73273","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73265","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73299","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73313","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73311","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5148","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5148"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5149","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5149"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5150","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5150"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5151","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5151"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5153","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5153"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5154","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5154"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5155","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5155"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5156","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5156"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5157","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5157"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5160","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5160"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5161","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5161"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5162","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5162"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5163","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5163"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5164","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5164"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5165","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5165"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5167","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5167"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8332","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8332"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1372219","reference_id":"1372219","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1372219"},{"reference_url":"https://security.gentoo.org/glsa/201610-09","reference_id":"GLSA-201610-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1854","reference_id":"RHSA-2016:1854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0559","reference_id":"RHSA-2017:0559","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0559"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0838","reference_id":"RHSA-2017:0838","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0838"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933738?format=json","purl":"pkg:deb/debian/openjpeg2@2.1.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2016-5158"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6fte-2hrw-z3eb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60044?format=json","vulnerability_id":"VCID-6m6f-5tup-pbay","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which may allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10506.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10506.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10506","reference_id":"","reference_type":"","scores":[{"value":"0.04295","scoring_system":"epss","scoring_elements":"0.88813","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04295","scoring_system":"epss","scoring_elements":"0.88822","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04295","scoring_system":"epss","scoring_elements":"0.88838","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04295","scoring_system":"epss","scoring_elements":"0.8884","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04295","scoring_system":"epss","scoring_elements":"0.88858","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04295","scoring_system":"epss","scoring_elements":"0.88863","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04295","scoring_system":"epss","scoring_elements":"0.88875","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04295","scoring_system":"epss","scoring_elements":"0.8887","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04295","scoring_system":"epss","scoring_elements":"0.88869","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04295","scoring_system":"epss","scoring_elements":"0.88883","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04295","scoring_system":"epss","scoring_elements":"0.88881","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04295","scoring_system":"epss","scoring_elements":"0.88878","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04295","scoring_system":"epss","scoring_elements":"0.88894","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04295","scoring_system":"epss","scoring_elements":"0.88901","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10506"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10506","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10506"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487376","reference_id":"1487376","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487376"},{"reference_url":"https://security.gentoo.org/glsa/201710-26","reference_id":"GLSA-201710-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-26"},{"reference_url":"https://usn.ubuntu.com/USN-4782-1/","reference_id":"USN-USN-4782-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4782-1/"},{"reference_url":"https://usn.ubuntu.com/USN-5664-1/","reference_id":"USN-USN-5664-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-5664-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933737?format=json","purl":"pkg:deb/debian/openjpeg2@2.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.2.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2016-10506"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6m6f-5tup-pbay"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81676?format=json","vulnerability_id":"VCID-7ath-fa35-5uca","summary":"openjpeg: Heap-based buffer overflow in opj_t1_clbl_decode_processor()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6851.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6851.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6851","reference_id":"","reference_type":"","scores":[{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.80621","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.80757","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.80739","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.80743","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.80629","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.80651","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.80646","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.80674","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.80684","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.807","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.80687","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.80679","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.80713","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.80716","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1790511","reference_id":"1790511","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1790511"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950000","reference_id":"950000","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950000"},{"reference_url":"https://security.archlinux.org/ASA-202012-21","reference_id":"ASA-202012-21","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202012-21"},{"reference_url":"https://security.archlinux.org/AVG-1339","reference_id":"AVG-1339","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1339"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-6851","reference_id":"CVE-2020-6851","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-6851"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0262","reference_id":"RHSA-2020:0262","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0262"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0274","reference_id":"RHSA-2020:0274","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0274"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0296","reference_id":"RHSA-2020:0296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0296"},{"reference_url":"https://usn.ubuntu.com/4497-1/","reference_id":"USN-4497-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4497-1/"},{"reference_url":"https://usn.ubuntu.com/4686-1/","reference_id":"USN-4686-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4686-1/"},{"reference_url":"https://usn.ubuntu.com/5952-1/","reference_id":"USN-5952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5952-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933745?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2020-6851"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7ath-fa35-5uca"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63485?format=json","vulnerability_id":"VCID-7vw2-fcqu-8bae","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14152.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14152.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14152","reference_id":"","reference_type":"","scores":[{"value":"0.01089","scoring_system":"epss","scoring_elements":"0.77874","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01089","scoring_system":"epss","scoring_elements":"0.77882","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01089","scoring_system":"epss","scoring_elements":"0.77909","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01089","scoring_system":"epss","scoring_elements":"0.77891","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01089","scoring_system":"epss","scoring_elements":"0.77918","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01089","scoring_system":"epss","scoring_elements":"0.77923","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01089","scoring_system":"epss","scoring_elements":"0.77949","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01089","scoring_system":"epss","scoring_elements":"0.77933","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01089","scoring_system":"epss","scoring_elements":"0.77932","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01089","scoring_system":"epss","scoring_elements":"0.77967","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01089","scoring_system":"epss","scoring_elements":"0.77966","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01089","scoring_system":"epss","scoring_elements":"0.7796","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01089","scoring_system":"epss","scoring_elements":"0.77992","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01089","scoring_system":"epss","scoring_elements":"0.78","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01089","scoring_system":"epss","scoring_elements":"0.78013","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487389","reference_id":"1487389","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487389"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874431","reference_id":"874431","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874431"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933741?format=json","purl":"pkg:deb/debian/openjpeg2@2.3.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2017-14152"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7vw2-fcqu-8bae"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80952?format=json","vulnerability_id":"VCID-8ruh-x3eq-rffk","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7163.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7163.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7163","reference_id":"","reference_type":"","scores":[{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66148","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66295","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66257","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66281","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66189","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66216","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66185","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66233","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66246","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66267","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66253","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66223","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66258","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66273","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7163"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1374329","reference_id":"1374329","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1374329"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837604","reference_id":"837604","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837604"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0559","reference_id":"RHSA-2017:0559","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0559"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0838","reference_id":"RHSA-2017:0838","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0838"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933738?format=json","purl":"pkg:deb/debian/openjpeg2@2.1.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2016-7163"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"4.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8ruh-x3eq-rffk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62380?format=json","vulnerability_id":"VCID-9ezw-mty9-z3cv","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8871.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8871.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8871","reference_id":"","reference_type":"","scores":[{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80262","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80247","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80131","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80138","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80158","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80146","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80175","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80183","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80202","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80187","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80179","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80208","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80211","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80238","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8871"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1335770","reference_id":"1335770","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1335770"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=800149","reference_id":"800149","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=800149"},{"reference_url":"https://security.gentoo.org/glsa/201612-26","reference_id":"GLSA-201612-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-26"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933733?format=json","purl":"pkg:deb/debian/openjpeg2@2.1.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2015-8871"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9ezw-mty9-z3cv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80951?format=json","vulnerability_id":"VCID-9f84-54j5-abbf","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6581.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6581.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-6581","reference_id":"","reference_type":"","scores":[{"value":"0.02349","scoring_system":"epss","scoring_elements":"0.84822","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02349","scoring_system":"epss","scoring_elements":"0.84837","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02349","scoring_system":"epss","scoring_elements":"0.84855","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02349","scoring_system":"epss","scoring_elements":"0.84857","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02349","scoring_system":"epss","scoring_elements":"0.84879","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02349","scoring_system":"epss","scoring_elements":"0.84886","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02349","scoring_system":"epss","scoring_elements":"0.84905","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02349","scoring_system":"epss","scoring_elements":"0.84903","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02349","scoring_system":"epss","scoring_elements":"0.84898","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02349","scoring_system":"epss","scoring_elements":"0.84919","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02349","scoring_system":"epss","scoring_elements":"0.8492","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02349","scoring_system":"epss","scoring_elements":"0.84918","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02349","scoring_system":"epss","scoring_elements":"0.84942","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02349","scoring_system":"epss","scoring_elements":"0.84951","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-6581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1267983","reference_id":"1267983","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1267983"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=800453","reference_id":"800453","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=800453"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933733?format=json","purl":"pkg:deb/debian/openjpeg2@2.1.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2015-6581"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9f84-54j5-abbf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85283?format=json","vulnerability_id":"VCID-9sk8-qkrw-5bdj","summary":"openjpeg: Division-by-zero in function opj_tcd_init_tile in tcd.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4797.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4797.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4797","reference_id":"","reference_type":"","scores":[{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51823","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51866","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51774","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51824","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.5185","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51812","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51867","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51865","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51917","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.519","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51884","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51927","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51933","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51914","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.5186","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4797"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1335483","reference_id":"1335483","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1335483"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933733?format=json","purl":"pkg:deb/debian/openjpeg2@2.1.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2016-4797"],"risk_score":1.3,"exploitability":"0.5","weighted_severity":"2.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9sk8-qkrw-5bdj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68436?format=json","vulnerability_id":"VCID-9y97-hpnp-yya8","summary":"openjpeg: OpenJPEG OOB heap memory write","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-54874.json","reference_id":"","reference_type":"","scores":[{"value":"8.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-54874.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-54874","reference_id":"","reference_type":"","scores":[{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21905","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21801","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21958","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21724","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21858","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22079","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22071","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22179","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22139","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22078","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26193","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26251","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26244","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26321","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-54874"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110443","reference_id":"1110443","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110443"},{"reference_url":"https://github.com/uclouvain/openjpeg/pull/1573","reference_id":"1573","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-01-22T04:55:47Z/"}],"url":"https://github.com/uclouvain/openjpeg/pull/1573"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386543","reference_id":"2386543","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386543"},{"reference_url":"https://github.com/uclouvain/openjpeg/commit/f809b80c67717c152a5ad30bf06774f00da4fd2d","reference_id":"f809b80c67717c152a5ad30bf06774f00da4fd2d","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-01-22T04:55:47Z/"}],"url":"https://github.com/uclouvain/openjpeg/commit/f809b80c67717c152a5ad30bf06774f00da4fd2d"},{"reference_url":"https://securitylab.github.com/advisories/GHSL-2025-057_OpenCV","reference_id":"GHSL-2025-057_OpenCV","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-01-22T04:55:47Z/"}],"url":"https://securitylab.github.com/advisories/GHSL-2025-057_OpenCV"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13944","reference_id":"RHSA-2025:13944","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13944"},{"reference_url":"https://usn.ubuntu.com/7757-1/","reference_id":"USN-7757-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7757-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933742?format=json","purl":"pkg:deb/debian/openjpeg2@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933752?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2025-54874"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9y97-hpnp-yya8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/13138?format=json","vulnerability_id":"VCID-an46-hxt9-57e1","summary":"Out-of-bounds Write\nA heap-based buffer overflow was found in openjpeg in color.c:379:42 in sycc420_to_rgb when decompressing a crafted .j2k file. An attacker could use this to execute arbitrary code with the permissions of the application compiled against openjpeg.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3575.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3575.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3575","reference_id":"","reference_type":"","scores":[{"value":"0.0033","scoring_system":"epss","scoring_elements":"0.5588","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0033","scoring_system":"epss","scoring_elements":"0.55884","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0033","scoring_system":"epss","scoring_elements":"0.55887","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0033","scoring_system":"epss","scoring_elements":"0.55907","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0033","scoring_system":"epss","scoring_elements":"0.55991","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0033","scoring_system":"epss","scoring_elements":"0.56013","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0033","scoring_system":"epss","scoring_elements":"0.56042","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0033","scoring_system":"epss","scoring_elements":"0.56045","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0033","scoring_system":"epss","scoring_elements":"0.56056","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0033","scoring_system":"epss","scoring_elements":"0.56036","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0033","scoring_system":"epss","scoring_elements":"0.56018","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0033","scoring_system":"epss","scoring_elements":"0.56054","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0033","scoring_system":"epss","scoring_elements":"0.56057","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0033","scoring_system":"epss","scoring_elements":"0.5596","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3575"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1957616","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1957616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3575","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3575"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/uclouvain/openjpeg/issues/1347","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/uclouvain/openjpeg/issues/1347"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989775","reference_id":"989775","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989775"},{"reference_url":"https://security.archlinux.org/AVG-2850","reference_id":"AVG-2850","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2850"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3575","reference_id":"CVE-2021-3575","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3575"},{"reference_url":"https://ubuntu.com/security/CVE-2021-3575","reference_id":"CVE-2021-3575","reference_type":"","scores":[],"url":"https://ubuntu.com/security/CVE-2021-3575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4251","reference_id":"RHSA-2021:4251","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4251"},{"reference_url":"https://usn.ubuntu.com/7083-1/","reference_id":"USN-7083-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7083-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933747?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933748?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933749?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2021-3575"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-an46-hxt9-57e1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58973?format=json","vulnerability_id":"VCID-bxq4-958j-gybu","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5157.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5157.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5157","reference_id":"","reference_type":"","scores":[{"value":"0.06592","scoring_system":"epss","scoring_elements":"0.91117","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06592","scoring_system":"epss","scoring_elements":"0.91123","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06592","scoring_system":"epss","scoring_elements":"0.91131","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06592","scoring_system":"epss","scoring_elements":"0.91139","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06592","scoring_system":"epss","scoring_elements":"0.91152","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06592","scoring_system":"epss","scoring_elements":"0.91158","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06592","scoring_system":"epss","scoring_elements":"0.91165","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06592","scoring_system":"epss","scoring_elements":"0.91167","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06592","scoring_system":"epss","scoring_elements":"0.91191","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06592","scoring_system":"epss","scoring_elements":"0.91194","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06592","scoring_system":"epss","scoring_elements":"0.91207","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06592","scoring_system":"epss","scoring_elements":"0.91206","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06592","scoring_system":"epss","scoring_elements":"0.91203","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5157"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5148","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5148"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5149","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5149"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5150","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5150"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5151","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5151"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5153","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5153"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5154","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5154"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5155","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5155"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5156","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5156"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5157","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5157"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5160","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5160"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5161","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5161"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5162","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5162"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5163","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5163"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5164","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5164"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5165","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5165"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5167","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5167"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1372218","reference_id":"1372218","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1372218"},{"reference_url":"https://security.gentoo.org/glsa/201610-09","reference_id":"GLSA-201610-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1854","reference_id":"RHSA-2016:1854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1854"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933738?format=json","purl":"pkg:deb/debian/openjpeg2@2.1.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2016-5157"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bxq4-958j-gybu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60056?format=json","vulnerability_id":"VCID-c6g2-dknk-u3cy","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which may allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9573.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9573.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9573","reference_id":"","reference_type":"","scores":[{"value":"0.01059","scoring_system":"epss","scoring_elements":"0.77565","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01059","scoring_system":"epss","scoring_elements":"0.77572","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01059","scoring_system":"epss","scoring_elements":"0.77599","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01059","scoring_system":"epss","scoring_elements":"0.7758","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01059","scoring_system":"epss","scoring_elements":"0.77608","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01059","scoring_system":"epss","scoring_elements":"0.77615","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01059","scoring_system":"epss","scoring_elements":"0.77642","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01059","scoring_system":"epss","scoring_elements":"0.77626","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01059","scoring_system":"epss","scoring_elements":"0.77624","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01059","scoring_system":"epss","scoring_elements":"0.77662","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01059","scoring_system":"epss","scoring_elements":"0.7766","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01059","scoring_system":"epss","scoring_elements":"0.77654","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01059","scoring_system":"epss","scoring_elements":"0.77684","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01059","scoring_system":"epss","scoring_elements":"0.77693","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01059","scoring_system":"epss","scoring_elements":"0.77708","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8332","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8332"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1402711","reference_id":"1402711","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1402711"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851422","reference_id":"851422","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851422"},{"reference_url":"https://security.gentoo.org/glsa/201710-26","reference_id":"GLSA-201710-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-26"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0838","reference_id":"RHSA-2017:0838","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0838"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933740?format=json","purl":"pkg:deb/debian/openjpeg2@2.1.2-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2016-9573"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c6g2-dknk-u3cy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60045?format=json","vulnerability_id":"VCID-cgjw-v1jx-1qg3","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which may allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10507.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10507.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10507","reference_id":"","reference_type":"","scores":[{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59113","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59148","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59128","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59108","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59126","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00653","scoring_system":"epss","scoring_elements":"0.70861","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00653","scoring_system":"epss","scoring_elements":"0.7088","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00653","scoring_system":"epss","scoring_elements":"0.70895","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00653","scoring_system":"epss","scoring_elements":"0.70919","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00653","scoring_system":"epss","scoring_elements":"0.70903","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00653","scoring_system":"epss","scoring_elements":"0.70887","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00653","scoring_system":"epss","scoring_elements":"0.70933","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00653","scoring_system":"epss","scoring_elements":"0.70829","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00653","scoring_system":"epss","scoring_elements":"0.70843","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00653","scoring_system":"epss","scoring_elements":"0.70836","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10507"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10507","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10507"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487377","reference_id":"1487377","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487377"},{"reference_url":"https://security.gentoo.org/glsa/201710-26","reference_id":"GLSA-201710-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-26"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933738?format=json","purl":"pkg:deb/debian/openjpeg2@2.1.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2016-10507"],"risk_score":1.7,"exploitability":"0.5","weighted_severity":"3.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cgjw-v1jx-1qg3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72596?format=json","vulnerability_id":"VCID-cgvq-jt8a-4yba","summary":"openjpeg: heap buffer overflow in bin/common/color.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56826.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56826.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-56826","reference_id":"","reference_type":"","scores":[{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09447","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09472","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09525","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09489","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10484","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10325","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10351","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10443","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10511","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10371","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10444","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10509","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10539","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10506","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-56826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56826"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1092675","reference_id":"1092675","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1092675"},{"reference_url":"https://github.com/uclouvain/openjpeg/issues/1563","reference_id":"1563","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T15:40:54Z/"}],"url":"https://github.com/uclouvain/openjpeg/issues/1563"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2335172","reference_id":"2335172","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T15:40:54Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2335172"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10","reference_id":"cpe:/o:redhat:enterprise_linux:10","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2024-56826","reference_id":"CVE-2024-56826","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T15:40:54Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2024-56826"},{"reference_url":"https://github.com/uclouvain/openjpeg/commit/e492644fbded4c820ca55b5e50e598d346e850e8","reference_id":"e492644fbded4c820ca55b5e50e598d346e850e8","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T15:40:54Z/"}],"url":"https://github.com/uclouvain/openjpeg/commit/e492644fbded4c820ca55b5e50e598d346e850e8"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7309","reference_id":"RHSA-2025:7309","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T15:40:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7309"},{"reference_url":"https://usn.ubuntu.com/7223-1/","reference_id":"USN-7223-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7223-1/"},{"reference_url":"https://usn.ubuntu.com/7623-1/","reference_id":"USN-7623-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7623-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933747?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933748?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933749?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2024-56826"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cgvq-jt8a-4yba"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58950?format=json","vulnerability_id":"VCID-cmhu-2x4c-pqfk","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5139.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5139.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5139","reference_id":"","reference_type":"","scores":[{"value":"0.01487","scoring_system":"epss","scoring_elements":"0.80971","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01487","scoring_system":"epss","scoring_elements":"0.8098","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01487","scoring_system":"epss","scoring_elements":"0.81004","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01487","scoring_system":"epss","scoring_elements":"0.81002","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01487","scoring_system":"epss","scoring_elements":"0.81031","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01487","scoring_system":"epss","scoring_elements":"0.81037","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01487","scoring_system":"epss","scoring_elements":"0.81054","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01487","scoring_system":"epss","scoring_elements":"0.81041","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01487","scoring_system":"epss","scoring_elements":"0.81033","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01487","scoring_system":"epss","scoring_elements":"0.81071","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01487","scoring_system":"epss","scoring_elements":"0.81072","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01487","scoring_system":"epss","scoring_elements":"0.81069","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01487","scoring_system":"epss","scoring_elements":"0.81092","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01487","scoring_system":"epss","scoring_elements":"0.811","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01487","scoring_system":"epss","scoring_elements":"0.81108","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5139"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5139","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5139"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5140","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5140"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5141","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5141"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5142","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5142"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5146","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5146"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1363982","reference_id":"1363982","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1363982"},{"reference_url":"https://security.gentoo.org/glsa/201610-09","reference_id":"GLSA-201610-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1580","reference_id":"RHSA-2016:1580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0559","reference_id":"RHSA-2017:0559","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0559"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0838","reference_id":"RHSA-2017:0838","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0838"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933738?format=json","purl":"pkg:deb/debian/openjpeg2@2.1.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2016-5139"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cmhu-2x4c-pqfk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58966?format=json","vulnerability_id":"VCID-drgt-8maa-xqgv","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5152.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5152.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5152","reference_id":"","reference_type":"","scores":[{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.76934","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.7694","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.7697","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.76952","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.76984","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.76995","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.77023","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.77002","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.76996","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.77037","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.77039","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.77032","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.77067","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.77073","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.77087","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5148","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5148"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5149","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5149"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5150","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5150"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5151","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5151"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5153","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5153"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5154","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5154"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5155","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5155"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5156","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5156"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5157","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5157"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5160","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5160"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5161","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5161"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5162","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5162"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5163","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5163"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5164","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5164"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5165","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5165"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5167","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5167"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1372213","reference_id":"1372213","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1372213"},{"reference_url":"https://security.gentoo.org/glsa/201610-09","reference_id":"GLSA-201610-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1854","reference_id":"RHSA-2016:1854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1854"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933739?format=json","purl":"pkg:deb/debian/openjpeg2@2.1.2-1.2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2016-5152"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-drgt-8maa-xqgv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62381?format=json","vulnerability_id":"VCID-dvse-ce3w-p7da","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1923.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1923.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1923","reference_id":"","reference_type":"","scores":[{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64612","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64602","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64615","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64469","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64522","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64552","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.6451","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64558","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64575","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64591","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64578","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.6455","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64584","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64596","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64581","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1923"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1923","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1923"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/01/18/4","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/01/18/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/01/18/7","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/01/18/7"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1299767","reference_id":"1299767","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1299767"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818399","reference_id":"818399","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818399"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:2.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:uclouvain:openjpeg:2.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:2.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1923","reference_id":"CVE-2016-1923","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1923"},{"reference_url":"https://security.gentoo.org/glsa/201612-26","reference_id":"GLSA-201612-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-26"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933733?format=json","purl":"pkg:deb/debian/openjpeg2@2.1.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2016-1923"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dvse-ce3w-p7da"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60046?format=json","vulnerability_id":"VCID-e76r-pz11-yfhu","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which may allow remote attackers to execute arbitrary code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00119.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00119.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0241.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0241.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1626.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1626.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1626","reference_id":"","reference_type":"","scores":[{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70577","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70568","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70423","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70436","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70454","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70432","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70477","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70492","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70516","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70501","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70487","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.7053","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70538","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70517","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1626"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=571480","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=571480"},{"reference_url":"https://codereview.chromium.org/1583233008","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/1583233008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152"},{"reference_url":"http://www.debian.org/security/2016/dsa-3486","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3486"},{"reference_url":"http://www.securityfocus.com/bid/83125","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/83125"},{"reference_url":"http://www.securitytracker.com/id/1035183","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035183"},{"reference_url":"http://www.zerodayinitiative.com/advisories/ZDI-16-171","reference_id":"","reference_type":"","scores":[],"url":"http://www.zerodayinitiative.com/advisories/ZDI-16-171"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1306156","reference_id":"1306156","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1306156"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:48.0.2564.103:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:48.0.2564.103:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:48.0.2564.103:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1626","reference_id":"CVE-2016-1626","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1626"},{"reference_url":"https://security.gentoo.org/glsa/201603-09","reference_id":"GLSA-201603-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-09"},{"reference_url":"https://security.gentoo.org/glsa/201710-26","reference_id":"GLSA-201710-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-26"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0241","reference_id":"RHSA-2016:0241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0241"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933739?format=json","purl":"pkg:deb/debian/openjpeg2@2.1.2-1.2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2016-1626"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e76r-pz11-yfhu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60048?format=json","vulnerability_id":"VCID-eavm-6anm-nfgu","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which may allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9112.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9112.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9112","reference_id":"","reference_type":"","scores":[{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73677","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73686","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.7371","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73682","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73717","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.7373","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73752","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73734","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73725","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73767","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73776","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.738","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.7381","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9112"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9112","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9112"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1418147","reference_id":"1418147","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1418147"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=844551","reference_id":"844551","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=844551"},{"reference_url":"https://security.gentoo.org/glsa/201710-26","reference_id":"GLSA-201710-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-26"},{"reference_url":"https://usn.ubuntu.com/4497-1/","reference_id":"USN-4497-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4497-1/"},{"reference_url":"https://usn.ubuntu.com/USN-5664-1/","reference_id":"USN-USN-5664-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-5664-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933739?format=json","purl":"pkg:deb/debian/openjpeg2@2.1.2-1.2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2016-9112"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eavm-6anm-nfgu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82453?format=json","vulnerability_id":"VCID-ecez-3pwt-pudf","summary":"openjpeg: division-by-zero in functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20845.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20845.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20845","reference_id":"","reference_type":"","scores":[{"value":"0.00609","scoring_system":"epss","scoring_elements":"0.69659","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00609","scoring_system":"epss","scoring_elements":"0.69671","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00609","scoring_system":"epss","scoring_elements":"0.69687","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00609","scoring_system":"epss","scoring_elements":"0.69664","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00609","scoring_system":"epss","scoring_elements":"0.69714","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00609","scoring_system":"epss","scoring_elements":"0.69731","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00609","scoring_system":"epss","scoring_elements":"0.69752","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00609","scoring_system":"epss","scoring_elements":"0.69737","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00609","scoring_system":"epss","scoring_elements":"0.69724","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00609","scoring_system":"epss","scoring_elements":"0.69764","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00609","scoring_system":"epss","scoring_elements":"0.69773","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00609","scoring_system":"epss","scoring_elements":"0.69754","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00609","scoring_system":"epss","scoring_elements":"0.69805","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00609","scoring_system":"epss","scoring_elements":"0.69813","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00609","scoring_system":"epss","scoring_elements":"0.69818","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20845"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1728505","reference_id":"1728505","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1728505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4251","reference_id":"RHSA-2021:4251","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4251"},{"reference_url":"https://usn.ubuntu.com/USN-4782-1/","reference_id":"USN-USN-4782-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4782-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933744?format=json","purl":"pkg:deb/debian/openjpeg2@2.3.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2018-20845"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ecez-3pwt-pudf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83807?format=json","vulnerability_id":"VCID-fc33-x3z3-tyde","summary":"openjpeg: Stack-buffer overflow in the pgxtoimage function","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17479.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17479.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-17479","reference_id":"","reference_type":"","scores":[{"value":"0.05391","scoring_system":"epss","scoring_elements":"0.90079","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05391","scoring_system":"epss","scoring_elements":"0.9015","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05391","scoring_system":"epss","scoring_elements":"0.90122","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05391","scoring_system":"epss","scoring_elements":"0.90139","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05391","scoring_system":"epss","scoring_elements":"0.90136","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05391","scoring_system":"epss","scoring_elements":"0.90151","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05391","scoring_system":"epss","scoring_elements":"0.90082","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05391","scoring_system":"epss","scoring_elements":"0.90094","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05391","scoring_system":"epss","scoring_elements":"0.90098","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05391","scoring_system":"epss","scoring_elements":"0.90114","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05391","scoring_system":"epss","scoring_elements":"0.9012","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05391","scoring_system":"epss","scoring_elements":"0.90128","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05391","scoring_system":"epss","scoring_elements":"0.90127","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-17479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17479"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/uclouvain/openjpeg/issues/1044","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/uclouvain/openjpeg/issues/1044"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1525086","reference_id":"1525086","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1525086"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:2.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:uclouvain:openjpeg:2.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:2.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-17479","reference_id":"CVE-2017-17479","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-17479"},{"reference_url":"https://usn.ubuntu.com/USN-5664-1/","reference_id":"USN-USN-5664-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-5664-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933743?format=json","purl":"pkg:deb/debian/openjpeg2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2017-17479"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fc33-x3z3-tyde"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60060?format=json","vulnerability_id":"VCID-fq9r-fneu-1fhu","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which may allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14039.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14039.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14039","reference_id":"","reference_type":"","scores":[{"value":"0.00644","scoring_system":"epss","scoring_elements":"0.70575","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00644","scoring_system":"epss","scoring_elements":"0.70667","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00644","scoring_system":"epss","scoring_elements":"0.70605","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00644","scoring_system":"epss","scoring_elements":"0.70583","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00644","scoring_system":"epss","scoring_elements":"0.70628","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00644","scoring_system":"epss","scoring_elements":"0.70644","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00644","scoring_system":"epss","scoring_elements":"0.70652","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00644","scoring_system":"epss","scoring_elements":"0.70638","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00644","scoring_system":"epss","scoring_elements":"0.70683","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00644","scoring_system":"epss","scoring_elements":"0.70588","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00678","scoring_system":"epss","scoring_elements":"0.71615","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00678","scoring_system":"epss","scoring_elements":"0.71603","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00678","scoring_system":"epss","scoring_elements":"0.71611","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00678","scoring_system":"epss","scoring_elements":"0.71574","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00678","scoring_system":"epss","scoring_elements":"0.71553","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14039"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487768","reference_id":"1487768","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487768"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874118","reference_id":"874118","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874118"},{"reference_url":"https://security.gentoo.org/glsa/201710-26","reference_id":"GLSA-201710-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-26"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933741?format=json","purl":"pkg:deb/debian/openjpeg2@2.3.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2017-14039"],"risk_score":1.7,"exploitability":"0.5","weighted_severity":"3.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fq9r-fneu-1fhu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83735?format=json","vulnerability_id":"VCID-hxax-t3zc-8kax","summary":"openjpeg: integer overflow in opj_t1_encode_cblks in src/lib/openjp2/t1.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5727.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5727.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5727","reference_id":"","reference_type":"","scores":[{"value":"0.00724","scoring_system":"epss","scoring_elements":"0.72503","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00724","scoring_system":"epss","scoring_elements":"0.7251","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00724","scoring_system":"epss","scoring_elements":"0.72527","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00724","scoring_system":"epss","scoring_elements":"0.72542","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00724","scoring_system":"epss","scoring_elements":"0.72554","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00724","scoring_system":"epss","scoring_elements":"0.72578","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00724","scoring_system":"epss","scoring_elements":"0.72561","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00724","scoring_system":"epss","scoring_elements":"0.72551","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00724","scoring_system":"epss","scoring_elements":"0.72594","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00724","scoring_system":"epss","scoring_elements":"0.72603","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00724","scoring_system":"epss","scoring_elements":"0.72636","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00724","scoring_system":"epss","scoring_elements":"0.72645","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00724","scoring_system":"epss","scoring_elements":"0.72642","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5727"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5727","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5727"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1536552","reference_id":"1536552","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1536552"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888532","reference_id":"888532","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888532"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4251","reference_id":"RHSA-2021:4251","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4251"},{"reference_url":"https://usn.ubuntu.com/4686-1/","reference_id":"USN-4686-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4686-1/"},{"reference_url":"https://usn.ubuntu.com/USN-4782-1/","reference_id":"USN-USN-4782-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4782-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933744?format=json","purl":"pkg:deb/debian/openjpeg2@2.3.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2018-5727"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hxax-t3zc-8kax"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70432?format=json","vulnerability_id":"VCID-j8et-rm1k-xkhg","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5785.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5785.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5785","reference_id":"","reference_type":"","scores":[{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71615","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71621","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71639","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71612","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71652","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71662","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71686","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71669","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71651","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71695","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71701","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71682","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71731","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71737","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71742","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5785"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14423","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14423"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18088","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18088"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5785","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5785"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6616"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1537758","reference_id":"1537758","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1537758"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888533","reference_id":"888533","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888533"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4251","reference_id":"RHSA-2021:4251","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4251"},{"reference_url":"https://usn.ubuntu.com/4109-1/","reference_id":"USN-4109-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4109-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933743?format=json","purl":"pkg:deb/debian/openjpeg2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2018-5785"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j8et-rm1k-xkhg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60054?format=json","vulnerability_id":"VCID-jayn-yzet-k7g5","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which may allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9118.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9118.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9118","reference_id":"","reference_type":"","scores":[{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67792","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67928","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67894","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67923","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67826","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67846","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67825","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67876","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.6789","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67913","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.679","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67864","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9118"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1390231","reference_id":"1390231","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1390231"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=844557","reference_id":"844557","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=844557"},{"reference_url":"https://security.archlinux.org/AVG-54","reference_id":"AVG-54","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-54"},{"reference_url":"https://security.gentoo.org/glsa/201710-26","reference_id":"GLSA-201710-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-26"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933739?format=json","purl":"pkg:deb/debian/openjpeg2@2.1.2-1.2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2016-9118"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jayn-yzet-k7g5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60055?format=json","vulnerability_id":"VCID-jpxx-3mbf-pyhe","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which may allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9572.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9572.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9572","reference_id":"","reference_type":"","scores":[{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82584","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82599","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82614","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.8261","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82636","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82644","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82662","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82656","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82651","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82688","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82689","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82692","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82714","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82723","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.8273","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8332","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8332"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1402714","reference_id":"1402714","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1402714"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851422","reference_id":"851422","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851422"},{"reference_url":"https://security.gentoo.org/glsa/201710-26","reference_id":"GLSA-201710-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-26"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933740?format=json","purl":"pkg:deb/debian/openjpeg2@2.1.2-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2016-9572"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jpxx-3mbf-pyhe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60047?format=json","vulnerability_id":"VCID-jqup-3gmb-mqbh","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which may allow remote attackers to execute arbitrary code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0241.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0241.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1628.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1628.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1628","reference_id":"","reference_type":"","scores":[{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.7586","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75849","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75715","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75718","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75749","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75727","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75761","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75773","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75797","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75778","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75772","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.7581","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75814","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75799","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75839","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1628"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=571479","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=571479"},{"reference_url":"https://codereview.chromium.org/1590593002","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/1590593002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152"},{"reference_url":"http://www.debian.org/security/2016/dsa-3486","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3486"},{"reference_url":"http://www.debian.org/security/2017/dsa-4013","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2017/dsa-4013"},{"reference_url":"http://www.securityfocus.com/bid/83125","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/83125"},{"reference_url":"http://www.securitytracker.com/id/1035183","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035183"},{"reference_url":"http://www.zerodayinitiative.com/advisories/ZDI-16-172/","reference_id":"","reference_type":"","scores":[],"url":"http://www.zerodayinitiative.com/advisories/ZDI-16-172/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1310577","reference_id":"1310577","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1310577"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1628","reference_id":"CVE-2016-1628","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1628"},{"reference_url":"https://security.gentoo.org/glsa/201603-09","reference_id":"GLSA-201603-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-09"},{"reference_url":"https://security.gentoo.org/glsa/201710-26","reference_id":"GLSA-201710-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-26"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0241","reference_id":"RHSA-2016:0241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0241"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933739?format=json","purl":"pkg:deb/debian/openjpeg2@2.1.2-1.2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2016-1628"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jqup-3gmb-mqbh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63484?format=json","vulnerability_id":"VCID-jvtx-fv51-5bbe","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14041.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14041.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14041","reference_id":"","reference_type":"","scores":[{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.75804","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01236","scoring_system":"epss","scoring_elements":"0.79206","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01236","scoring_system":"epss","scoring_elements":"0.79163","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01236","scoring_system":"epss","scoring_elements":"0.79187","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01236","scoring_system":"epss","scoring_elements":"0.79173","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01236","scoring_system":"epss","scoring_elements":"0.79198","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01236","scoring_system":"epss","scoring_elements":"0.7923","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01236","scoring_system":"epss","scoring_elements":"0.79214","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01236","scoring_system":"epss","scoring_elements":"0.79232","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01304","scoring_system":"epss","scoring_elements":"0.79784","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01304","scoring_system":"epss","scoring_elements":"0.79824","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01304","scoring_system":"epss","scoring_elements":"0.79839","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01304","scoring_system":"epss","scoring_elements":"0.79787","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01304","scoring_system":"epss","scoring_elements":"0.79817","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14041"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487347","reference_id":"1487347","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487347"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874115","reference_id":"874115","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874115"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933741?format=json","purl":"pkg:deb/debian/openjpeg2@2.3.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2017-14041"],"risk_score":1.7,"exploitability":"0.5","weighted_severity":"3.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jvtx-fv51-5bbe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62382?format=json","vulnerability_id":"VCID-jwrz-ypan-9bg6","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1924.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1924.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1924","reference_id":"","reference_type":"","scores":[{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76097","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76076","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76086","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.75952","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.75955","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.75987","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.75966","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.75999","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76014","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76039","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76015","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.7601","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.7605","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76053","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76037","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"reference_url":"http://www.debian.org/security/2016/dsa-3665","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3665"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/01/18/4","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/01/18/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/01/18/7","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/01/18/7"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1299772","reference_id":"1299772","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1299772"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818399","reference_id":"818399","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818399"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1924","reference_id":"CVE-2016-1924","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1924"},{"reference_url":"https://security.gentoo.org/glsa/201612-26","reference_id":"GLSA-201612-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-26"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933733?format=json","purl":"pkg:deb/debian/openjpeg2@2.1.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2016-1924"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jwrz-ypan-9bg6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72597?format=json","vulnerability_id":"VCID-k9dc-cxnp-nug2","summary":"openjpeg: heap buffer overflow in lib/openjp2/j2k.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56827.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56827.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-56827","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10361","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10445","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10428","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10418","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11577","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11413","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11552","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11614","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11671","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11459","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11544","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11604","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-56827"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56827","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56827"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1092676","reference_id":"1092676","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1092676"},{"reference_url":"https://github.com/uclouvain/openjpeg/issues/1564","reference_id":"1564","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T15:38:58Z/"}],"url":"https://github.com/uclouvain/openjpeg/issues/1564"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2335174","reference_id":"2335174","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T15:38:58Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2335174"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10","reference_id":"cpe:/o:redhat:enterprise_linux:10","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2024-56827","reference_id":"CVE-2024-56827","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T15:38:58Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2024-56827"},{"reference_url":"https://github.com/uclouvain/openjpeg/commit/e492644fbded4c820ca55b5e50e598d346e850e8","reference_id":"e492644fbded4c820ca55b5e50e598d346e850e8","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T15:38:58Z/"}],"url":"https://github.com/uclouvain/openjpeg/commit/e492644fbded4c820ca55b5e50e598d346e850e8"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7309","reference_id":"RHSA-2025:7309","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T15:38:58Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7309"},{"reference_url":"https://usn.ubuntu.com/7223-1/","reference_id":"USN-7223-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7223-1/"},{"reference_url":"https://usn.ubuntu.com/7623-1/","reference_id":"USN-7623-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7623-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933747?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933748?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933749?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2024-56827"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k9dc-cxnp-nug2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40229?format=json","vulnerability_id":"VCID-kq91-13ek-rkcu","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15389.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15389.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-15389","reference_id":"","reference_type":"","scores":[{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.56898","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.56951","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.5695","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.56968","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.56995","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57017","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.56994","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57045","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57047","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57058","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57037","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57013","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57041","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57039","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57016","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-15389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1852869","reference_id":"1852869","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1852869"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965220","reference_id":"965220","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965220"},{"reference_url":"https://security.archlinux.org/ASA-202012-21","reference_id":"ASA-202012-21","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202012-21"},{"reference_url":"https://security.archlinux.org/AVG-1339","reference_id":"AVG-1339","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1339"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-15389","reference_id":"CVE-2020-15389","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-15389"},{"reference_url":"https://security.gentoo.org/glsa/202101-29","reference_id":"GLSA-202101-29","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202101-29"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4251","reference_id":"RHSA-2021:4251","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4251"},{"reference_url":"https://usn.ubuntu.com/4497-1/","reference_id":"USN-4497-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4497-1/"},{"reference_url":"https://usn.ubuntu.com/4685-1/","reference_id":"USN-4685-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4685-1/"},{"reference_url":"https://usn.ubuntu.com/5952-1/","reference_id":"USN-5952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5952-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933745?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2020-15389"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kq91-13ek-rkcu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70431?format=json","vulnerability_id":"VCID-kt1c-6859-v3ej","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17480.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17480.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-17480","reference_id":"","reference_type":"","scores":[{"value":"0.03921","scoring_system":"epss","scoring_elements":"0.88252","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03921","scoring_system":"epss","scoring_elements":"0.88342","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03921","scoring_system":"epss","scoring_elements":"0.88319","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03921","scoring_system":"epss","scoring_elements":"0.88318","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03921","scoring_system":"epss","scoring_elements":"0.88336","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03921","scoring_system":"epss","scoring_elements":"0.88341","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03921","scoring_system":"epss","scoring_elements":"0.8826","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03921","scoring_system":"epss","scoring_elements":"0.88275","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03921","scoring_system":"epss","scoring_elements":"0.8828","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03921","scoring_system":"epss","scoring_elements":"0.883","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03921","scoring_system":"epss","scoring_elements":"0.88306","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03921","scoring_system":"epss","scoring_elements":"0.88317","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03921","scoring_system":"epss","scoring_elements":"0.88308","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03921","scoring_system":"epss","scoring_elements":"0.88322","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-17480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14423","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14423"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18088","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18088"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5785","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5785"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6616"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/uclouvain/openjpeg/issues/1044","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/uclouvain/openjpeg/issues/1044"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/11/msg00018.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/11/msg00018.html"},{"reference_url":"https://www.debian.org/security/2019/dsa-4405","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2019/dsa-4405"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1525088","reference_id":"1525088","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1525088"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884738","reference_id":"884738","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884738"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:2.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:uclouvain:openjpeg:2.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:2.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-17480","reference_id":"CVE-2017-17480","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-17480"},{"reference_url":"https://usn.ubuntu.com/4109-1/","reference_id":"USN-4109-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4109-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933743?format=json","purl":"pkg:deb/debian/openjpeg2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2017-17480"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kt1c-6859-v3ej"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81602?format=json","vulnerability_id":"VCID-mdhg-k4sr-3bg7","summary":"openjpeg: heap-based buffer overflow in pj_t1_clbl_decode_processor in openjp2/t1.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8112.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8112.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-8112","reference_id":"","reference_type":"","scores":[{"value":"0.01793","scoring_system":"epss","scoring_elements":"0.82691","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01793","scoring_system":"epss","scoring_elements":"0.82834","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01793","scoring_system":"epss","scoring_elements":"0.8282","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01793","scoring_system":"epss","scoring_elements":"0.82828","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01793","scoring_system":"epss","scoring_elements":"0.82708","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01793","scoring_system":"epss","scoring_elements":"0.8272","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01793","scoring_system":"epss","scoring_elements":"0.82717","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01793","scoring_system":"epss","scoring_elements":"0.82743","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01793","scoring_system":"epss","scoring_elements":"0.8275","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01793","scoring_system":"epss","scoring_elements":"0.82766","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01793","scoring_system":"epss","scoring_elements":"0.8276","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01793","scoring_system":"epss","scoring_elements":"0.82756","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01793","scoring_system":"epss","scoring_elements":"0.82795","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01793","scoring_system":"epss","scoring_elements":"0.82797","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-8112"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1800535","reference_id":"1800535","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1800535"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950184","reference_id":"950184","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950184"},{"reference_url":"https://security.archlinux.org/ASA-202012-21","reference_id":"ASA-202012-21","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202012-21"},{"reference_url":"https://security.archlinux.org/AVG-1339","reference_id":"AVG-1339","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1339"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-8112","reference_id":"CVE-2020-8112","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-8112"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0550","reference_id":"RHSA-2020:0550","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0550"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0569","reference_id":"RHSA-2020:0569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0570","reference_id":"RHSA-2020:0570","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0570"},{"reference_url":"https://usn.ubuntu.com/4497-1/","reference_id":"USN-4497-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4497-1/"},{"reference_url":"https://usn.ubuntu.com/4686-1/","reference_id":"USN-4686-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4686-1/"},{"reference_url":"https://usn.ubuntu.com/5952-1/","reference_id":"USN-5952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5952-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933745?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2020-8112"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mdhg-k4sr-3bg7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60059?format=json","vulnerability_id":"VCID-ndpq-xye2-tugw","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which may allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12982.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12982.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12982","reference_id":"","reference_type":"","scores":[{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.54366","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60838","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60832","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60845","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62179","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62177","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62227","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62244","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62262","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62252","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.6223","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62275","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62282","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62209","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70326","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12982"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12982","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12982"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487236","reference_id":"1487236","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487236"},{"reference_url":"https://security.gentoo.org/glsa/201710-26","reference_id":"GLSA-201710-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-26"},{"reference_url":"https://usn.ubuntu.com/USN-4782-1/","reference_id":"USN-USN-4782-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4782-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933741?format=json","purl":"pkg:deb/debian/openjpeg2@2.3.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2017-12982"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ndpq-xye2-tugw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34492?format=json","vulnerability_id":"VCID-pzv2-p44c-8qg4","summary":"Multiple vulnerabilities have been discovered in OpenJPEG, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29338.json","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29338.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-29338","reference_id":"","reference_type":"","scores":[{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26175","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25921","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25974","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.2597","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26256","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26297","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26067","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26134","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26182","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.2619","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26144","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26086","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26092","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.2607","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26035","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-29338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1950101","reference_id":"1950101","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1950101"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987276","reference_id":"987276","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987276"},{"reference_url":"https://security.archlinux.org/AVG-1390","reference_id":"AVG-1390","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1390"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2021-29338","reference_id":"CVE-2021-29338","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-29338"},{"reference_url":"https://security.gentoo.org/glsa/202209-04","reference_id":"GLSA-202209-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202209-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4251","reference_id":"RHSA-2021:4251","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4251"},{"reference_url":"https://usn.ubuntu.com/7083-1/","reference_id":"USN-7083-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7083-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933747?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933746?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2021-29338"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pzv2-p44c-8qg4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68426?format=json","vulnerability_id":"VCID-qyq1-1npp-yyb4","summary":"openjpeg: Openjpeg NULL pointer dereference","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50952.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50952.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50952","reference_id":"","reference_type":"","scores":[{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13947","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13898","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.14003","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13806","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13889","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13942","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15011","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1502","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15071","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15173","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15109","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21417","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21399","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21413","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50952"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50952","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50952"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/uclouvain/openjpeg/issues/1505","reference_id":"1505","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-07T20:28:33Z/"}],"url":"https://github.com/uclouvain/openjpeg/issues/1505"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2387082","reference_id":"2387082","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2387082"},{"reference_url":"https://usn.ubuntu.com/7757-1/","reference_id":"USN-7757-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7757-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933751?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933749?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2025-50952"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qyq1-1npp-yyb4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70433?format=json","vulnerability_id":"VCID-rm5x-1fp6-mfau","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6616.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6616.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-6616","reference_id":"","reference_type":"","scores":[{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23781","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.239","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23941","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23729","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.238","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23846","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23862","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23817","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.2376","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23772","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.2358","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.2423","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24106","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24093","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-6616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14423","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14423"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18088","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18088"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5785","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5785"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6616"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1542321","reference_id":"1542321","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1542321"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889683","reference_id":"889683","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889683"},{"reference_url":"https://usn.ubuntu.com/4109-1/","reference_id":"USN-4109-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4109-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933743?format=json","purl":"pkg:deb/debian/openjpeg2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2018-6616"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rm5x-1fp6-mfau"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62385?format=json","vulnerability_id":"VCID-t76s-q45b-9ff7","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3183.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3183.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3183","reference_id":"","reference_type":"","scores":[{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21324","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21491","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21548","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21304","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21382","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21443","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21454","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21416","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.2136","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21357","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21364","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21332","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21185","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21183","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.2116","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3183"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3183","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3183"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1317821","reference_id":"1317821","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1317821"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818399","reference_id":"818399","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818399"},{"reference_url":"https://security.gentoo.org/glsa/201612-26","reference_id":"GLSA-201612-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-26"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933733?format=json","purl":"pkg:deb/debian/openjpeg2@2.1.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2016-3183"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t76s-q45b-9ff7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70434?format=json","vulnerability_id":"VCID-tgph-8x71-qbc2","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14423.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14423.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14423","reference_id":"","reference_type":"","scores":[{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.81728","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.81874","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.81835","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.81859","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.81869","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.81739","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.81762","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.8176","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.81787","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.81792","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.81812","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.81799","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.81795","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.81831","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.81832","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14423"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14423","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14423"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18088","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18088"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5785","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5785"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6616"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/uclouvain/openjpeg/issues/1123","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/uclouvain/openjpeg/issues/1123"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/12/msg00013.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/12/msg00013.html"},{"reference_url":"https://www.debian.org/security/2019/dsa-4405","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2019/dsa-4405"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1609909","reference_id":"1609909","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1609909"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904873","reference_id":"904873","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904873"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-14423","reference_id":"CVE-2018-14423","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-14423"},{"reference_url":"https://usn.ubuntu.com/4109-1/","reference_id":"USN-4109-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4109-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933743?format=json","purl":"pkg:deb/debian/openjpeg2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2018-14423"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tgph-8x71-qbc2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70435?format=json","vulnerability_id":"VCID-ttzh-p89a-mkar","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18088.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18088.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-18088","reference_id":"","reference_type":"","scores":[{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71115","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71124","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71141","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71116","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71158","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71171","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71194","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.7118","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71164","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71209","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71216","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71248","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71255","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71259","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-18088"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14423","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14423"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18088","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18088"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5785","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5785"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6616"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1638558","reference_id":"1638558","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1638558"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=910763","reference_id":"910763","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=910763"},{"reference_url":"https://usn.ubuntu.com/4109-1/","reference_id":"USN-4109-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4109-1/"},{"reference_url":"https://usn.ubuntu.com/USN-5664-1/","reference_id":"USN-USN-5664-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-5664-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933743?format=json","purl":"pkg:deb/debian/openjpeg2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2018-18088"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ttzh-p89a-mkar"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34458?format=json","vulnerability_id":"VCID-txsw-c8hq-suaj","summary":"Multiple vulnerabilities have been found in Chromium, the worst of\n    which can allow remote attackers to cause Denial of Service or gain\n    escalated privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7947.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7947.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-7947","reference_id":"","reference_type":"","scores":[{"value":"0.01436","scoring_system":"epss","scoring_elements":"0.80733","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01436","scoring_system":"epss","scoring_elements":"0.80756","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01436","scoring_system":"epss","scoring_elements":"0.8076","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01436","scoring_system":"epss","scoring_elements":"0.80773","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01675","scoring_system":"epss","scoring_elements":"0.82136","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01675","scoring_system":"epss","scoring_elements":"0.82144","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01675","scoring_system":"epss","scoring_elements":"0.82163","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01675","scoring_system":"epss","scoring_elements":"0.8208","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01675","scoring_system":"epss","scoring_elements":"0.82148","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01675","scoring_system":"epss","scoring_elements":"0.82186","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01675","scoring_system":"epss","scoring_elements":"0.82154","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01675","scoring_system":"epss","scoring_elements":"0.82093","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01675","scoring_system":"epss","scoring_elements":"0.82113","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01675","scoring_system":"epss","scoring_elements":"0.82109","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-7947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7947"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1185229","reference_id":"1185229","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1185229"},{"reference_url":"https://security.gentoo.org/glsa/201502-13","reference_id":"GLSA-201502-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201502-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0093","reference_id":"RHSA-2015:0093","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0093"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933733?format=json","purl":"pkg:deb/debian/openjpeg2@2.1.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2014-7947"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-txsw-c8hq-suaj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40231?format=json","vulnerability_id":"VCID-u497-trj1-rfdj","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27814.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27814.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27814","reference_id":"","reference_type":"","scores":[{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43658","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43541","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.4362","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43624","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43715","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.4374","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43674","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43724","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43727","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43747","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43716","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43699","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.4376","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43752","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43684","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27814"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/uclouvain/openjpeg/issues/1283","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/uclouvain/openjpeg/issues/1283"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1901998","reference_id":"1901998","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1901998"},{"reference_url":"https://security.archlinux.org/ASA-202012-21","reference_id":"ASA-202012-21","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202012-21"},{"reference_url":"https://security.archlinux.org/AVG-1339","reference_id":"AVG-1339","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1339"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-27814","reference_id":"CVE-2020-27814","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-27814"},{"reference_url":"https://security.gentoo.org/glsa/202101-29","reference_id":"GLSA-202101-29","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202101-29"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4251","reference_id":"RHSA-2021:4251","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4251"},{"reference_url":"https://usn.ubuntu.com/4685-1/","reference_id":"USN-4685-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4685-1/"},{"reference_url":"https://usn.ubuntu.com/4686-1/","reference_id":"USN-4686-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4686-1/"},{"reference_url":"https://usn.ubuntu.com/4880-1/","reference_id":"USN-4880-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4880-1/"},{"reference_url":"https://usn.ubuntu.com/5952-1/","reference_id":"USN-5952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5952-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933745?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2020-27814"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u497-trj1-rfdj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58977?format=json","vulnerability_id":"VCID-ubrj-hty6-c3cc","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5159.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5159.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5159","reference_id":"","reference_type":"","scores":[{"value":"0.01465","scoring_system":"epss","scoring_elements":"0.80825","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01465","scoring_system":"epss","scoring_elements":"0.80833","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01465","scoring_system":"epss","scoring_elements":"0.80855","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01465","scoring_system":"epss","scoring_elements":"0.80851","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01465","scoring_system":"epss","scoring_elements":"0.80879","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01465","scoring_system":"epss","scoring_elements":"0.80888","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01465","scoring_system":"epss","scoring_elements":"0.80903","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01465","scoring_system":"epss","scoring_elements":"0.80889","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01465","scoring_system":"epss","scoring_elements":"0.80881","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01465","scoring_system":"epss","scoring_elements":"0.80917","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01465","scoring_system":"epss","scoring_elements":"0.8092","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01465","scoring_system":"epss","scoring_elements":"0.80921","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01465","scoring_system":"epss","scoring_elements":"0.80942","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01465","scoring_system":"epss","scoring_elements":"0.80949","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01465","scoring_system":"epss","scoring_elements":"0.80961","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5159"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5148","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5148"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5149","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5149"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5150","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5150"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5151","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5151"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5153","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5153"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5154","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5154"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5155","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5155"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5156","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5156"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5157","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5157"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5160","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5160"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5161","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5161"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5162","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5162"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5163","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5163"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5164","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5164"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5165","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5165"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5167","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5167"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8332","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8332"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1372220","reference_id":"1372220","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1372220"},{"reference_url":"https://security.gentoo.org/glsa/201610-09","reference_id":"GLSA-201610-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1854","reference_id":"RHSA-2016:1854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0559","reference_id":"RHSA-2017:0559","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0559"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0838","reference_id":"RHSA-2017:0838","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0838"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933738?format=json","purl":"pkg:deb/debian/openjpeg2@2.1.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2016-5159"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ubrj-hty6-c3cc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63483?format=json","vulnerability_id":"VCID-uzpe-dvyu-ckfc","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14040.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14040.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14040","reference_id":"","reference_type":"","scores":[{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70655","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75312","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75249","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75281","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75259","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75302","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75333","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.753","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.7534","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76065","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76098","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76109","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76049","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00925","scoring_system":"epss","scoring_elements":"0.76088","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487361","reference_id":"1487361","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487361"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874117","reference_id":"874117","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874117"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933741?format=json","purl":"pkg:deb/debian/openjpeg2@2.3.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2017-14040"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uzpe-dvyu-ckfc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62386?format=json","vulnerability_id":"VCID-vt59-h7ax-7uca","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which may allow execution of arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7445","reference_id":"","reference_type":"","scores":[{"value":"0.02027","scoring_system":"epss","scoring_elements":"0.83718","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02027","scoring_system":"epss","scoring_elements":"0.83731","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02027","scoring_system":"epss","scoring_elements":"0.83745","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02027","scoring_system":"epss","scoring_elements":"0.83748","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02027","scoring_system":"epss","scoring_elements":"0.83771","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02027","scoring_system":"epss","scoring_elements":"0.83778","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02027","scoring_system":"epss","scoring_elements":"0.83794","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02027","scoring_system":"epss","scoring_elements":"0.83788","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02027","scoring_system":"epss","scoring_elements":"0.83783","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02027","scoring_system":"epss","scoring_elements":"0.83817","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02027","scoring_system":"epss","scoring_elements":"0.83818","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02027","scoring_system":"epss","scoring_elements":"0.83843","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02027","scoring_system":"epss","scoring_elements":"0.83851","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02027","scoring_system":"epss","scoring_elements":"0.83856","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7445"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7445","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7445"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838690","reference_id":"838690","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838690"},{"reference_url":"https://security.gentoo.org/glsa/201612-26","reference_id":"GLSA-201612-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-26"},{"reference_url":"https://usn.ubuntu.com/USN-5664-1/","reference_id":"USN-USN-5664-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-5664-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933738?format=json","purl":"pkg:deb/debian/openjpeg2@2.1.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2016-7445"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vt59-h7ax-7uca"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62384?format=json","vulnerability_id":"VCID-vxw5-nm1p-q3d5","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3182.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3182.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3182","reference_id":"","reference_type":"","scores":[{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38046","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38023","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.37927","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.54364","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.54416","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.54411","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.5446","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.54338","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.54421","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.54464","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.54446","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.54443","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.5436","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.54388","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3182"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1317826","reference_id":"1317826","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1317826"},{"reference_url":"https://security.gentoo.org/glsa/201612-26","reference_id":"GLSA-201612-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-26"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933733?format=json","purl":"pkg:deb/debian/openjpeg2@2.1.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2016-3182"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vxw5-nm1p-q3d5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60042?format=json","vulnerability_id":"VCID-wc6r-1t2c-9qdp","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which may allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10504.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10504.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10504","reference_id":"","reference_type":"","scores":[{"value":"0.06106","scoring_system":"epss","scoring_elements":"0.90738","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06106","scoring_system":"epss","scoring_elements":"0.90812","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06106","scoring_system":"epss","scoring_elements":"0.90806","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06106","scoring_system":"epss","scoring_elements":"0.90817","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06106","scoring_system":"epss","scoring_elements":"0.90744","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06106","scoring_system":"epss","scoring_elements":"0.90756","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06106","scoring_system":"epss","scoring_elements":"0.90766","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06106","scoring_system":"epss","scoring_elements":"0.90777","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06106","scoring_system":"epss","scoring_elements":"0.90783","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06106","scoring_system":"epss","scoring_elements":"0.90792","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06106","scoring_system":"epss","scoring_elements":"0.90791","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06106","scoring_system":"epss","scoring_elements":"0.90789","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06106","scoring_system":"epss","scoring_elements":"0.90808","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10504"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10504","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10504"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487369","reference_id":"1487369","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487369"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874113","reference_id":"874113","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874113"},{"reference_url":"https://github.com/uclouvain/openjpeg/issues/835","reference_id":"CVE-2016-10504","reference_type":"exploit","scores":[],"url":"https://github.com/uclouvain/openjpeg/issues/835"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/42600.txt","reference_id":"CVE-2016-10504","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/42600.txt"},{"reference_url":"https://security.gentoo.org/glsa/201710-26","reference_id":"GLSA-201710-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-26"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933737?format=json","purl":"pkg:deb/debian/openjpeg2@2.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.2.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2016-10504"],"risk_score":9.4,"exploitability":"2.0","weighted_severity":"4.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wc6r-1t2c-9qdp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80759?format=json","vulnerability_id":"VCID-whsh-5urk-b3ap","summary":"openjpeg: heap-buffer-overflow write in opj_tcd_dc_level_shift_encode()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27823.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27823.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27823","reference_id":"","reference_type":"","scores":[{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14051","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.13897","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.13989","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.13963","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14132","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14188","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14004","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14086","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14139","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14082","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.1404","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.13988","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.13882","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.13874","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.13953","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1905762","reference_id":"1905762","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1905762"},{"reference_url":"https://security.archlinux.org/AVG-1980","reference_id":"AVG-1980","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1980"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-27823","reference_id":"CVE-2020-27823","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-27823"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4251","reference_id":"RHSA-2021:4251","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4251"},{"reference_url":"https://usn.ubuntu.com/4685-1/","reference_id":"USN-4685-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4685-1/"},{"reference_url":"https://usn.ubuntu.com/4880-1/","reference_id":"USN-4880-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4880-1/"},{"reference_url":"https://usn.ubuntu.com/5952-1/","reference_id":"USN-5952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5952-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933745?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2020-27823"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-whsh-5urk-b3ap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40239?format=json","vulnerability_id":"VCID-xc4v-2aa6-yfd6","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27843.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27843.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27843","reference_id":"","reference_type":"","scores":[{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32926","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32573","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.3277","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32657","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33055","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33088","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32918","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32964","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32994","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32997","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32959","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32934","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32976","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32954","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32917","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1907516","reference_id":"1907516","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1907516"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983663","reference_id":"983663","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983663"},{"reference_url":"https://security.archlinux.org/ASA-202012-21","reference_id":"ASA-202012-21","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202012-21"},{"reference_url":"https://security.archlinux.org/AVG-1339","reference_id":"AVG-1339","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1339"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-27843","reference_id":"CVE-2020-27843","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-27843"},{"reference_url":"https://security.gentoo.org/glsa/202101-29","reference_id":"GLSA-202101-29","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202101-29"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4251","reference_id":"RHSA-2021:4251","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4251"},{"reference_url":"https://usn.ubuntu.com/4685-1/","reference_id":"USN-4685-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4685-1/"},{"reference_url":"https://usn.ubuntu.com/4686-1/","reference_id":"USN-4686-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4686-1/"},{"reference_url":"https://usn.ubuntu.com/5952-1/","reference_id":"USN-5952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5952-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933745?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2020-27843"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xc4v-2aa6-yfd6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40240?format=json","vulnerability_id":"VCID-xd8s-688v-tbd7","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27844.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27844.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27844","reference_id":"","reference_type":"","scores":[{"value":"0.00778","scoring_system":"epss","scoring_elements":"0.73599","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00778","scoring_system":"epss","scoring_elements":"0.73653","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00778","scoring_system":"epss","scoring_elements":"0.73632","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00778","scoring_system":"epss","scoring_elements":"0.73604","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00778","scoring_system":"epss","scoring_elements":"0.7364","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00778","scoring_system":"epss","scoring_elements":"0.73676","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00778","scoring_system":"epss","scoring_elements":"0.73658","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00778","scoring_system":"epss","scoring_elements":"0.7365","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00778","scoring_system":"epss","scoring_elements":"0.73694","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00778","scoring_system":"epss","scoring_elements":"0.73703","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00778","scoring_system":"epss","scoring_elements":"0.73608","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01994","scoring_system":"epss","scoring_elements":"0.83694","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01994","scoring_system":"epss","scoring_elements":"0.83699","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01994","scoring_system":"epss","scoring_elements":"0.83663","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01994","scoring_system":"epss","scoring_elements":"0.83687","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27844"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1907521","reference_id":"1907521","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1907521"},{"reference_url":"https://security.archlinux.org/ASA-202103-19","reference_id":"ASA-202103-19","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202103-19"},{"reference_url":"https://security.archlinux.org/AVG-1361","reference_id":"AVG-1361","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1361"},{"reference_url":"https://security.archlinux.org/AVG-1631","reference_id":"AVG-1631","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1631"},{"reference_url":"https://security.archlinux.org/AVG-1633","reference_id":"AVG-1633","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1633"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-27844","reference_id":"CVE-2020-27844","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-27844"},{"reference_url":"https://security.gentoo.org/glsa/202101-29","reference_id":"GLSA-202101-29","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202101-29"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933742?format=json","purl":"pkg:deb/debian/openjpeg2@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2020-27844"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xd8s-688v-tbd7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/13537?format=json","vulnerability_id":"VCID-xh3j-ufru-6fby","summary":"Access of Uninitialized Pointer\nA flaw was found in the opj2_decompress program in openjpeg2 2.4.0 in the way it handles an input directory with a large number of files. When it fails to allocate a buffer to store the filenames of the input directory, it calls free() on an uninitialized pointer, leading to a segmentation fault and a denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1122.json","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1122.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1122","reference_id":"","reference_type":"","scores":[{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16222","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16373","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16267","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16263","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.18031","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17819","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17881","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17896","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17852","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17804","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17747","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17756","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17813","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17732","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17976","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1122"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1122","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1122"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/uclouvain/openjpeg/issues/1368","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/uclouvain/openjpeg/issues/1368"},{"reference_url":"https://github.com/uclouvain/openjpeg/pull/1369","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/uclouvain/openjpeg/pull/1369"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ROSN5NRUFOH7HGLJ4ZSKPGAKLFXJALW4/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ROSN5NRUFOH7HGLJ4ZSKPGAKLFXJALW4/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2067052","reference_id":"2067052","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2067052"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1122","reference_id":"CVE-2022-1122","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1122"},{"reference_url":"https://security.gentoo.org/glsa/202209-04","reference_id":"GLSA-202209-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202209-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7645","reference_id":"RHSA-2022:7645","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7645"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8207","reference_id":"RHSA-2022:8207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8207"},{"reference_url":"https://usn.ubuntu.com/7083-1/","reference_id":"USN-7083-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7083-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933747?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933750?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2022-1122"],"risk_score":2.3,"exploitability":"0.5","weighted_severity":"4.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xh3j-ufru-6fby"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82454?format=json","vulnerability_id":"VCID-xvjg-5z4m-pqdv","summary":"openjpeg: integer overflow in function opj_get_encoding_parameters in openjp2/pi.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20847.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20847.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20847","reference_id":"","reference_type":"","scores":[{"value":"0.00724","scoring_system":"epss","scoring_elements":"0.72639","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00724","scoring_system":"epss","scoring_elements":"0.72558","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00724","scoring_system":"epss","scoring_elements":"0.72548","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00724","scoring_system":"epss","scoring_elements":"0.7259","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00724","scoring_system":"epss","scoring_elements":"0.726","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00724","scoring_system":"epss","scoring_elements":"0.72591","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00724","scoring_system":"epss","scoring_elements":"0.72633","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00724","scoring_system":"epss","scoring_elements":"0.72642","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00724","scoring_system":"epss","scoring_elements":"0.72575","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72795","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72799","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72819","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72792","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72833","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72847","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20847"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20847","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20847"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1728509","reference_id":"1728509","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1728509"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931294","reference_id":"931294","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931294"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4251","reference_id":"RHSA-2021:4251","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4251"},{"reference_url":"https://usn.ubuntu.com/4497-1/","reference_id":"USN-4497-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4497-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933744?format=json","purl":"pkg:deb/debian/openjpeg2@2.3.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2018-20847"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xvjg-5z4m-pqdv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40224?format=json","vulnerability_id":"VCID-yb58-a8p7-v7dw","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-21010.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-21010.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-21010","reference_id":"","reference_type":"","scores":[{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74768","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74893","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74846","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74882","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74889","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74771","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74798","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74772","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74805","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74819","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74843","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74822","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74812","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74848","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74855","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-21010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21010"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/uclouvain/openjpeg/commit/2e5ab1d9987831c981ff05862e8ccf1381ed58ea","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/uclouvain/openjpeg/commit/2e5ab1d9987831c981ff05862e8ccf1381ed58ea"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/10/msg00009.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/10/msg00009.html"},{"reference_url":"https://www.oracle.com//security-alerts/cpujul2021.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com//security-alerts/cpujul2021.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1755769","reference_id":"1755769","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1755769"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939553","reference_id":"939553","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939553"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-21010","reference_id":"CVE-2018-21010","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-21010"},{"reference_url":"https://security.gentoo.org/glsa/202101-29","reference_id":"GLSA-202101-29","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202101-29"},{"reference_url":"https://usn.ubuntu.com/4497-1/","reference_id":"USN-4497-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4497-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933744?format=json","purl":"pkg:deb/debian/openjpeg2@2.3.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2018-21010"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yb58-a8p7-v7dw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/93803?format=json","vulnerability_id":"VCID-z1a1-p95p-sya2","summary":"An issue was discovered in mj2/opj_mj2_extract.c in OpenJPEG 2.3.0. The output prefix was not checked for length, which could overflow a buffer, when providing a prefix with 50 or more characters on the command line.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-7648","reference_id":"","reference_type":"","scores":[{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68265","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68284","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68305","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68281","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68332","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68349","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68375","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68362","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68329","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68369","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68382","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68361","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68408","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68413","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68417","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-7648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7648"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933744?format=json","purl":"pkg:deb/debian/openjpeg2@2.3.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2018-7648"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z1a1-p95p-sya2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40241?format=json","vulnerability_id":"VCID-zgaa-57ak-jbex","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27845.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27845.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27845","reference_id":"","reference_type":"","scores":[{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29845","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29457","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29634","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.2952","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.2989","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29938","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.2975","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29812","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29847","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29856","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.2981","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.2976","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29779","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29758","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29714","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27824"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1907523","reference_id":"1907523","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1907523"},{"reference_url":"https://security.archlinux.org/ASA-202012-21","reference_id":"ASA-202012-21","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202012-21"},{"reference_url":"https://security.archlinux.org/AVG-1339","reference_id":"AVG-1339","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1339"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-27845","reference_id":"CVE-2020-27845","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-27845"},{"reference_url":"https://security.gentoo.org/glsa/202101-29","reference_id":"GLSA-202101-29","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202101-29"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4251","reference_id":"RHSA-2021:4251","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4251"},{"reference_url":"https://usn.ubuntu.com/4685-1/","reference_id":"USN-4685-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4685-1/"},{"reference_url":"https://usn.ubuntu.com/4686-1/","reference_id":"USN-4686-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4686-1/"},{"reference_url":"https://usn.ubuntu.com/4880-1/","reference_id":"USN-4880-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4880-1/"},{"reference_url":"https://usn.ubuntu.com/5952-1/","reference_id":"USN-5952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5952-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933745?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2020-27845"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zgaa-57ak-jbex"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84045?format=json","vulnerability_id":"VCID-zmh5-86mb-yqde","summary":"openjpeg: Heap-based buffer overflow in opj_mqc_flush in mqc.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14151.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14151.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14151","reference_id":"","reference_type":"","scores":[{"value":"0.0091","scoring_system":"epss","scoring_elements":"0.75753","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0091","scoring_system":"epss","scoring_elements":"0.75755","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0091","scoring_system":"epss","scoring_elements":"0.75787","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0091","scoring_system":"epss","scoring_elements":"0.75765","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0091","scoring_system":"epss","scoring_elements":"0.75799","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0091","scoring_system":"epss","scoring_elements":"0.7581","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0091","scoring_system":"epss","scoring_elements":"0.75834","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0091","scoring_system":"epss","scoring_elements":"0.75815","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0091","scoring_system":"epss","scoring_elements":"0.75809","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0091","scoring_system":"epss","scoring_elements":"0.75847","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0091","scoring_system":"epss","scoring_elements":"0.7585","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0091","scoring_system":"epss","scoring_elements":"0.75835","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0091","scoring_system":"epss","scoring_elements":"0.75874","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0091","scoring_system":"epss","scoring_elements":"0.75883","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0091","scoring_system":"epss","scoring_elements":"0.75894","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14151"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14151","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487390","reference_id":"1487390","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487390"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874430","reference_id":"874430","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874430"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933741?format=json","purl":"pkg:deb/debian/openjpeg2@2.3.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2017-14151"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zmh5-86mb-yqde"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83180?format=json","vulnerability_id":"VCID-zz9f-brcy-ekdy","summary":"openjpeg: Heap-based buffer overflow in pnmtoimage function in bin/jpwl/convert.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16375.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16375.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16375","reference_id":"","reference_type":"","scores":[{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61488","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61563","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61592","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61611","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61625","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61646","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61635","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61781","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61745","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61787","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61792","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61775","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.6177","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16375"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16375"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1626088","reference_id":"1626088","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1626088"},{"reference_url":"https://usn.ubuntu.com/USN-4782-1/","reference_id":"USN-USN-4782-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4782-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933744?format=json","purl":"pkg:deb/debian/openjpeg2@2.3.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.3.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2018-16375"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zz9f-brcy-ekdy"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"}