{"url":"http://public2.vulnerablecode.io/api/packages/933739?format=json","purl":"pkg:deb/debian/openjpeg2@2.1.2-1.2?distro=trixie","type":"deb","namespace":"debian","name":"openjpeg2","version":"2.1.2-1.2","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"2.2.0-1","latest_non_vulnerable_version":"2.5.4-1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58966?format=json","vulnerability_id":"VCID-drgt-8maa-xqgv","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5152.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5152.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5152","reference_id":"","reference_type":"","scores":[{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.76934","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.7694","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.7697","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.76952","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.76984","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.76995","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.77023","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.77002","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.76996","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.77037","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.77039","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.77032","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.77067","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.77073","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.77087","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.77096","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.77126","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5148","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5148"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5149","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5149"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5150","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5150"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5151","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5151"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5153","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5153"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5154","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5154"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5155","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5155"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5156","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5156"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5157","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5157"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5160","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5160"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5161","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5161"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5162","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5162"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5163","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5163"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5164","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5164"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5165","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5165"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5167","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5167"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1372213","reference_id":"1372213","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1372213"},{"reference_url":"https://security.gentoo.org/glsa/201610-09","reference_id":"GLSA-201610-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1854","reference_id":"RHSA-2016:1854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1854"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933739?format=json","purl":"pkg:deb/debian/openjpeg2@2.1.2-1.2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2016-5152"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-drgt-8maa-xqgv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60046?format=json","vulnerability_id":"VCID-e76r-pz11-yfhu","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which may allow remote attackers to execute arbitrary code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00119.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00119.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0241.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0241.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1626.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1626.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1626","reference_id":"","reference_type":"","scores":[{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.7059","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.7055","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70423","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70436","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70454","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70432","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70477","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70492","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70516","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70501","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70487","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.7053","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70538","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70517","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70568","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70577","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1626"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=571480","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=571480"},{"reference_url":"https://codereview.chromium.org/1583233008","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/1583233008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152"},{"reference_url":"http://www.debian.org/security/2016/dsa-3486","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3486"},{"reference_url":"http://www.securityfocus.com/bid/83125","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/83125"},{"reference_url":"http://www.securitytracker.com/id/1035183","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035183"},{"reference_url":"http://www.zerodayinitiative.com/advisories/ZDI-16-171","reference_id":"","reference_type":"","scores":[],"url":"http://www.zerodayinitiative.com/advisories/ZDI-16-171"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1306156","reference_id":"1306156","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1306156"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:48.0.2564.103:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:48.0.2564.103:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:48.0.2564.103:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1626","reference_id":"CVE-2016-1626","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1626"},{"reference_url":"https://security.gentoo.org/glsa/201603-09","reference_id":"GLSA-201603-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-09"},{"reference_url":"https://security.gentoo.org/glsa/201710-26","reference_id":"GLSA-201710-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-26"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0241","reference_id":"RHSA-2016:0241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0241"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933739?format=json","purl":"pkg:deb/debian/openjpeg2@2.1.2-1.2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2016-1626"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e76r-pz11-yfhu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60048?format=json","vulnerability_id":"VCID-eavm-6anm-nfgu","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which may allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9112.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9112.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9112","reference_id":"","reference_type":"","scores":[{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73677","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73686","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.7371","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73682","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73717","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.7373","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73752","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73734","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73725","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73767","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73776","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.738","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.7381","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73803","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73829","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9112"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9112","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9112"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1418147","reference_id":"1418147","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1418147"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=844551","reference_id":"844551","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=844551"},{"reference_url":"https://security.gentoo.org/glsa/201710-26","reference_id":"GLSA-201710-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-26"},{"reference_url":"https://usn.ubuntu.com/4497-1/","reference_id":"USN-4497-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4497-1/"},{"reference_url":"https://usn.ubuntu.com/USN-5664-1/","reference_id":"USN-USN-5664-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-5664-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933739?format=json","purl":"pkg:deb/debian/openjpeg2@2.1.2-1.2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2016-9112"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eavm-6anm-nfgu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60054?format=json","vulnerability_id":"VCID-jayn-yzet-k7g5","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which may allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9118.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9118.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9118","reference_id":"","reference_type":"","scores":[{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67792","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67944","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67928","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67902","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67826","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67846","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67825","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67876","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.6789","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67913","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.679","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67864","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67894","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67923","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9118"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1390231","reference_id":"1390231","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1390231"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=844557","reference_id":"844557","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=844557"},{"reference_url":"https://security.archlinux.org/AVG-54","reference_id":"AVG-54","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-54"},{"reference_url":"https://security.gentoo.org/glsa/201710-26","reference_id":"GLSA-201710-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-26"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933739?format=json","purl":"pkg:deb/debian/openjpeg2@2.1.2-1.2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2016-9118"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jayn-yzet-k7g5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60047?format=json","vulnerability_id":"VCID-jqup-3gmb-mqbh","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which may allow remote attackers to execute arbitrary code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0241.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0241.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1628.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1628.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1628","reference_id":"","reference_type":"","scores":[{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75897","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75868","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75715","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75718","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75749","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75727","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75761","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75773","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75797","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75778","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75772","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.7581","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75814","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75799","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75839","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75849","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.7586","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1628"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=571479","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=571479"},{"reference_url":"https://codereview.chromium.org/1590593002","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/1590593002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152"},{"reference_url":"http://www.debian.org/security/2016/dsa-3486","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3486"},{"reference_url":"http://www.debian.org/security/2017/dsa-4013","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2017/dsa-4013"},{"reference_url":"http://www.securityfocus.com/bid/83125","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/83125"},{"reference_url":"http://www.securitytracker.com/id/1035183","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035183"},{"reference_url":"http://www.zerodayinitiative.com/advisories/ZDI-16-172/","reference_id":"","reference_type":"","scores":[],"url":"http://www.zerodayinitiative.com/advisories/ZDI-16-172/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1310577","reference_id":"1310577","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1310577"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1628","reference_id":"CVE-2016-1628","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1628"},{"reference_url":"https://security.gentoo.org/glsa/201603-09","reference_id":"GLSA-201603-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-09"},{"reference_url":"https://security.gentoo.org/glsa/201710-26","reference_id":"GLSA-201710-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-26"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0241","reference_id":"RHSA-2016:0241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0241"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933739?format=json","purl":"pkg:deb/debian/openjpeg2@2.1.2-1.2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933734?format=json","purl":"pkg:deb/debian/openjpeg2@2.4.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.4.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933732?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.0-2%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.0-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933736?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.3-2.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933735?format=json","purl":"pkg:deb/debian/openjpeg2@2.5.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.5.4-1%3Fdistro=trixie"}],"aliases":["CVE-2016-1628"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jqup-3gmb-mqbh"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjpeg2@2.1.2-1.2%3Fdistro=trixie"}