Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/941085?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/941085?format=api", "purl": "pkg:deb/debian/tiff@4.0.6-3?distro=trixie", "type": "deb", "namespace": "debian", "name": "tiff", "version": "4.0.6-3", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "4.0.7-1", "latest_non_vulnerable_version": "4.7.1-2", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61008?format=api", "vulnerability_id": "VCID-1cjh-zx12-2fh2", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5318.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5318.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5318", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74807", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74774", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74776", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74648", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74652", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74678", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74685", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74699", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74723", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74702", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74694", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74731", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74739", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74729", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74764", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74771", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5318" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344068", "reference_id": "1344068", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344068" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://usn.ubuntu.com/3606-1/", "reference_id": "USN-3606-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3606-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/941085?format=api", "purl": "pkg:deb/debian/tiff@4.0.6-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.0.6-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941049?format=api", "purl": "pkg:deb/debian/tiff@4.2.0-1%2Bdeb11u5?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1hfc-b4qr-jqgk" }, { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-h9ap-xxmw-j7dr" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-vrtj-45t6-cqec" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.2.0-1%252Bdeb11u5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941047?format=api", "purl": "pkg:deb/debian/tiff@4.5.0-6%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-b4hb-cxzy-suck" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.0-6%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941051?format=api", "purl": "pkg:deb/debian/tiff@4.7.0-3%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-vju4-pghv-47bx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.0-3%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941050?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ttb7-w41r-4kfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000494?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-5318" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1cjh-zx12-2fh2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60992?format=api", "vulnerability_id": "VCID-1pbp-smgt-duey", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3623.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3623.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3623", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01585", "scoring_system": "epss", "scoring_elements": "0.81715", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01585", "scoring_system": "epss", "scoring_elements": "0.81677", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01585", "scoring_system": "epss", "scoring_elements": "0.81693", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01585", "scoring_system": "epss", "scoring_elements": "0.81533", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01585", "scoring_system": "epss", "scoring_elements": "0.81545", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01585", "scoring_system": "epss", "scoring_elements": "0.81567", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01585", "scoring_system": "epss", "scoring_elements": "0.81565", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01585", "scoring_system": "epss", "scoring_elements": "0.81592", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01585", "scoring_system": "epss", "scoring_elements": "0.81598", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01585", "scoring_system": "epss", "scoring_elements": "0.81618", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01585", "scoring_system": "epss", "scoring_elements": "0.81605", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01585", "scoring_system": "epss", "scoring_elements": "0.81635", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01585", "scoring_system": "epss", "scoring_elements": "0.81636", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01585", "scoring_system": "epss", "scoring_elements": "0.81639", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01585", "scoring_system": "epss", "scoring_elements": "0.81663", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01585", "scoring_system": "epss", "scoring_elements": "0.81672", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1325089", "reference_id": "1325089", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1325089" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" }, { "reference_url": "https://usn.ubuntu.com/3212-3/", "reference_id": "USN-3212-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/941085?format=api", "purl": "pkg:deb/debian/tiff@4.0.6-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.0.6-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941049?format=api", "purl": "pkg:deb/debian/tiff@4.2.0-1%2Bdeb11u5?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1hfc-b4qr-jqgk" }, { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-h9ap-xxmw-j7dr" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-vrtj-45t6-cqec" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.2.0-1%252Bdeb11u5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941047?format=api", "purl": "pkg:deb/debian/tiff@4.5.0-6%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-b4hb-cxzy-suck" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.0-6%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941051?format=api", "purl": "pkg:deb/debian/tiff@4.7.0-3%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-vju4-pghv-47bx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.0-3%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941050?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ttb7-w41r-4kfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000494?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-3623" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1pbp-smgt-duey" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60988?format=api", "vulnerability_id": "VCID-255p-pm39-1bb3", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3619.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3619.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3619", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00955", "scoring_system": "epss", "scoring_elements": "0.76524", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00955", "scoring_system": "epss", "scoring_elements": "0.76508", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00955", "scoring_system": "epss", "scoring_elements": "0.76495", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00955", "scoring_system": "epss", "scoring_elements": "0.76364", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00955", "scoring_system": "epss", "scoring_elements": "0.76368", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00955", "scoring_system": "epss", "scoring_elements": "0.76398", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00955", "scoring_system": "epss", "scoring_elements": "0.76379", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00955", "scoring_system": "epss", "scoring_elements": "0.76412", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00955", "scoring_system": "epss", "scoring_elements": "0.76426", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00955", "scoring_system": "epss", "scoring_elements": "0.76452", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00955", "scoring_system": "epss", "scoring_elements": "0.7643", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00955", "scoring_system": "epss", "scoring_elements": "0.76425", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00955", "scoring_system": "epss", "scoring_elements": "0.76466", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00955", "scoring_system": "epss", "scoring_elements": "0.7647", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00955", "scoring_system": "epss", "scoring_elements": "0.76456", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00955", "scoring_system": "epss", "scoring_elements": "0.76489", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00955", "scoring_system": "epss", "scoring_elements": "0.76496", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3619" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3619", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3619" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1316569", "reference_id": "1316569", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1316569" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820362", "reference_id": "820362", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820362" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/941085?format=api", "purl": "pkg:deb/debian/tiff@4.0.6-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.0.6-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941049?format=api", "purl": "pkg:deb/debian/tiff@4.2.0-1%2Bdeb11u5?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1hfc-b4qr-jqgk" }, { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-h9ap-xxmw-j7dr" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-vrtj-45t6-cqec" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.2.0-1%252Bdeb11u5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941047?format=api", "purl": "pkg:deb/debian/tiff@4.5.0-6%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-b4hb-cxzy-suck" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.0-6%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941051?format=api", "purl": "pkg:deb/debian/tiff@4.7.0-3%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-vju4-pghv-47bx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.0-3%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941050?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ttb7-w41r-4kfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000494?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-3619" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-255p-pm39-1bb3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60997?format=api", "vulnerability_id": "VCID-28t9-d8gb-b3h9", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3633.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3633.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3633", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63815", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63799", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63771", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.6366", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.6372", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63745", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63706", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63758", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63775", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63788", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63773", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63739", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63785", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63789", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63802", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3633" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3633", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3633" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326255", "reference_id": "1326255", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326255" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842046", "reference_id": "842046", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842046" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/941085?format=api", "purl": "pkg:deb/debian/tiff@4.0.6-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.0.6-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941049?format=api", "purl": "pkg:deb/debian/tiff@4.2.0-1%2Bdeb11u5?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1hfc-b4qr-jqgk" }, { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-h9ap-xxmw-j7dr" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-vrtj-45t6-cqec" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.2.0-1%252Bdeb11u5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941047?format=api", "purl": "pkg:deb/debian/tiff@4.5.0-6%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-b4hb-cxzy-suck" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.0-6%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941051?format=api", "purl": "pkg:deb/debian/tiff@4.7.0-3%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-vju4-pghv-47bx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.0-3%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941050?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ttb7-w41r-4kfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000494?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-3633" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-28t9-d8gb-b3h9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60993?format=api", "vulnerability_id": "VCID-36t6-pnx8-xugd", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3624.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3624.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3624", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.80078", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.80042", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.80055", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.79912", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.79919", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.7994", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.79928", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.79957", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.79966", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.79986", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.7997", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.79961", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.79989", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.79991", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.8002", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.80026", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1325090", "reference_id": "1325090", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1325090" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" }, { "reference_url": "https://usn.ubuntu.com/3212-3/", "reference_id": "USN-3212-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/941085?format=api", "purl": "pkg:deb/debian/tiff@4.0.6-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.0.6-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941049?format=api", "purl": "pkg:deb/debian/tiff@4.2.0-1%2Bdeb11u5?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1hfc-b4qr-jqgk" }, { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-h9ap-xxmw-j7dr" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-vrtj-45t6-cqec" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.2.0-1%252Bdeb11u5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941047?format=api", "purl": "pkg:deb/debian/tiff@4.5.0-6%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-b4hb-cxzy-suck" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.0-6%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941051?format=api", "purl": "pkg:deb/debian/tiff@4.7.0-3%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-vju4-pghv-47bx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.0-3%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941050?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ttb7-w41r-4kfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000494?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-3624" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-36t6-pnx8-xugd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83489?format=api", "vulnerability_id": "VCID-43cd-stdq-pbc9", "summary": "libtiff: heap-based buffer over-read in TIFFWriteScanline function in tif_write.c", "references": [ { "reference_url": "http://bugzilla.maptools.org/show_bug.cgi?id=2788", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugzilla.maptools.org/show_bug.cgi?id=2788" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10779.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10779.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10779", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00509", "scoring_system": "epss", "scoring_elements": "0.66276", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00509", "scoring_system": "epss", "scoring_elements": "0.66444", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00509", "scoring_system": "epss", "scoring_elements": "0.66385", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00509", "scoring_system": "epss", "scoring_elements": "0.66401", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00509", "scoring_system": "epss", "scoring_elements": "0.66386", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00509", "scoring_system": "epss", "scoring_elements": "0.66409", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00509", "scoring_system": "epss", "scoring_elements": "0.66424", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00509", "scoring_system": "epss", "scoring_elements": "0.66314", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00509", "scoring_system": "epss", "scoring_elements": "0.66342", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00509", "scoring_system": "epss", "scoring_elements": "0.66312", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00509", "scoring_system": "epss", "scoring_elements": "0.6636", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00509", "scoring_system": "epss", "scoring_elements": "0.66373", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00509", "scoring_system": "epss", "scoring_elements": "0.66394", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00509", "scoring_system": "epss", "scoring_elements": "0.6638", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00509", "scoring_system": "epss", "scoring_elements": "0.6635", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10779" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10779", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10779" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securityfocus.com/bid/104089", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/104089" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1577311", "reference_id": "1577311", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1577311" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898359", "reference_id": "898359", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898359" }, { "reference_url": "https://security.archlinux.org/ASA-201811-18", "reference_id": "ASA-201811-18", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201811-18" }, { "reference_url": "https://security.archlinux.org/AVG-791", "reference_id": "AVG-791", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-791" }, { "reference_url": "https://security.archlinux.org/AVG-816", "reference_id": "AVG-816", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-816" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:3.8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libtiff:libtiff:3.8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:3.8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10779", "reference_id": "CVE-2018-10779", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10779" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2053", "reference_id": "RHSA-2019:2053", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2053" }, { "reference_url": "https://usn.ubuntu.com/3906-1/", "reference_id": "USN-3906-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3906-1/" }, { "reference_url": "https://usn.ubuntu.com/3906-2/", "reference_id": "USN-3906-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3906-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/941085?format=api", "purl": "pkg:deb/debian/tiff@4.0.6-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.0.6-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941049?format=api", "purl": "pkg:deb/debian/tiff@4.2.0-1%2Bdeb11u5?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1hfc-b4qr-jqgk" }, { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-h9ap-xxmw-j7dr" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-vrtj-45t6-cqec" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.2.0-1%252Bdeb11u5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941047?format=api", "purl": "pkg:deb/debian/tiff@4.5.0-6%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-b4hb-cxzy-suck" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.0-6%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941051?format=api", "purl": "pkg:deb/debian/tiff@4.7.0-3%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-vju4-pghv-47bx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.0-3%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941050?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ttb7-w41r-4kfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000494?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-10779" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-43cd-stdq-pbc9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60981?format=api", "vulnerability_id": "VCID-5h29-wne5-gbd7", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "http://packetstormsecurity.com/files/135080/libtiff-4.0.6-Heap-Overflow.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/135080/libtiff-4.0.6-Heap-Overflow.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1546.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1546.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1547.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1547.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8668.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8668.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8668", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0671", "scoring_system": "epss", "scoring_elements": "0.91321", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0671", "scoring_system": "epss", "scoring_elements": "0.91279", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0671", "scoring_system": "epss", "scoring_elements": "0.91278", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0671", "scoring_system": "epss", "scoring_elements": "0.91281", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0671", "scoring_system": "epss", "scoring_elements": "0.91291", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0671", "scoring_system": "epss", "scoring_elements": "0.91289", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0671", "scoring_system": "epss", "scoring_elements": "0.91305", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.07386", "scoring_system": "epss", "scoring_elements": "0.91697", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07386", "scoring_system": "epss", "scoring_elements": "0.9171", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07386", "scoring_system": "epss", "scoring_elements": "0.91723", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07386", "scoring_system": "epss", "scoring_elements": "0.91729", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07386", "scoring_system": "epss", "scoring_elements": "0.91732", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07386", "scoring_system": "epss", "scoring_elements": "0.91734", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07386", "scoring_system": "epss", "scoring_elements": "0.9173", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07386", "scoring_system": "epss", "scoring_elements": "0.91688", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07386", "scoring_system": "epss", "scoring_elements": "0.91702", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8668" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8668", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8668" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/537208/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/537208/100/0/threaded" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1294425", "reference_id": "1294425", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1294425" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842046", "reference_id": "842046", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842046" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_server:3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:vm_server:3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_server:3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_server:3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:vm_server:3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_server:3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8668", "reference_id": "CVE-2015-8668", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8668" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1546", "reference_id": "RHSA-2016:1546", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1546" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1547", "reference_id": "RHSA-2016:1547", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1547" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" }, { "reference_url": "https://usn.ubuntu.com/3212-3/", "reference_id": "USN-3212-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/941085?format=api", "purl": "pkg:deb/debian/tiff@4.0.6-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.0.6-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941049?format=api", "purl": "pkg:deb/debian/tiff@4.2.0-1%2Bdeb11u5?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1hfc-b4qr-jqgk" }, { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-h9ap-xxmw-j7dr" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-vrtj-45t6-cqec" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.2.0-1%252Bdeb11u5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941047?format=api", "purl": "pkg:deb/debian/tiff@4.5.0-6%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-b4hb-cxzy-suck" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.0-6%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941051?format=api", "purl": "pkg:deb/debian/tiff@4.7.0-3%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-vju4-pghv-47bx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.0-3%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941050?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ttb7-w41r-4kfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000494?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2015-8668" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5h29-wne5-gbd7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61017?format=api", "vulnerability_id": "VCID-6ngq-ungb-sycm", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8331.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8331.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8331", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06223", "scoring_system": "epss", "scoring_elements": "0.90832", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06223", "scoring_system": "epss", "scoring_elements": "0.90837", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06223", "scoring_system": "epss", "scoring_elements": "0.90848", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06223", "scoring_system": "epss", "scoring_elements": "0.90858", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06223", "scoring_system": "epss", "scoring_elements": "0.9087", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06223", "scoring_system": "epss", "scoring_elements": "0.90876", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06223", "scoring_system": "epss", "scoring_elements": "0.90885", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06223", "scoring_system": "epss", "scoring_elements": "0.90884", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06223", "scoring_system": "epss", "scoring_elements": "0.90909", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.06223", "scoring_system": "epss", "scoring_elements": "0.90906", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.06223", "scoring_system": "epss", "scoring_elements": "0.90907", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.06223", "scoring_system": "epss", "scoring_elements": "0.9092", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.06223", "scoring_system": "epss", "scoring_elements": "0.90918", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.06223", "scoring_system": "epss", "scoring_elements": "0.90916", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.06223", "scoring_system": "epss", "scoring_elements": "0.90931", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.06223", "scoring_system": "epss", "scoring_elements": "0.90948", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8331" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8331", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8331" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389229", "reference_id": "1389229", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389229" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" }, { "reference_url": "https://usn.ubuntu.com/3212-3/", "reference_id": "USN-3212-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/941085?format=api", "purl": "pkg:deb/debian/tiff@4.0.6-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.0.6-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941049?format=api", "purl": "pkg:deb/debian/tiff@4.2.0-1%2Bdeb11u5?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1hfc-b4qr-jqgk" }, { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-h9ap-xxmw-j7dr" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-vrtj-45t6-cqec" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.2.0-1%252Bdeb11u5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941047?format=api", "purl": "pkg:deb/debian/tiff@4.5.0-6%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-b4hb-cxzy-suck" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.0-6%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941051?format=api", "purl": "pkg:deb/debian/tiff@4.7.0-3%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-vju4-pghv-47bx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.0-3%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941050?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ttb7-w41r-4kfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000494?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-8331" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6ngq-ungb-sycm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60999?format=api", "vulnerability_id": "VCID-83hb-ksrb-yyb5", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3658.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3658.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3658", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00951", "scoring_system": "epss", "scoring_elements": "0.76476", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00951", "scoring_system": "epss", "scoring_elements": "0.76459", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00951", "scoring_system": "epss", "scoring_elements": "0.76447", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00951", "scoring_system": "epss", "scoring_elements": "0.76316", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00951", "scoring_system": "epss", "scoring_elements": "0.76319", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00951", "scoring_system": "epss", "scoring_elements": "0.76349", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00951", "scoring_system": "epss", "scoring_elements": "0.76329", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00951", "scoring_system": "epss", "scoring_elements": "0.76361", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00951", "scoring_system": "epss", "scoring_elements": "0.76375", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00951", "scoring_system": "epss", "scoring_elements": "0.76401", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00951", "scoring_system": "epss", "scoring_elements": "0.76379", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00951", "scoring_system": "epss", "scoring_elements": "0.76373", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00951", "scoring_system": "epss", "scoring_elements": "0.76413", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00951", "scoring_system": "epss", "scoring_elements": "0.7642", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00951", "scoring_system": "epss", "scoring_elements": "0.76404", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00951", "scoring_system": "epss", "scoring_elements": "0.76438", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00951", "scoring_system": "epss", "scoring_elements": "0.76445", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10266", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10266" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10267", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10267" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10269", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10269" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10270", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10270" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9535", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9535" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5225", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5225" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7592", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7592" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7593", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7594", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7594" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7595", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7595" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7596" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7597", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7597" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7598", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7598" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7602" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326257", "reference_id": "1326257", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326257" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/941085?format=api", "purl": "pkg:deb/debian/tiff@4.0.6-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.0.6-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941049?format=api", "purl": "pkg:deb/debian/tiff@4.2.0-1%2Bdeb11u5?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1hfc-b4qr-jqgk" }, { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-h9ap-xxmw-j7dr" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-vrtj-45t6-cqec" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.2.0-1%252Bdeb11u5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941047?format=api", "purl": "pkg:deb/debian/tiff@4.5.0-6%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-b4hb-cxzy-suck" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.0-6%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941051?format=api", "purl": "pkg:deb/debian/tiff@4.7.0-3%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-vju4-pghv-47bx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.0-3%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941050?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ttb7-w41r-4kfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000494?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-3658" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-83hb-ksrb-yyb5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83738?format=api", "vulnerability_id": "VCID-bap5-5e3b-8qea", "summary": "LibTIFF: heap-based buffer over-read in the ReadTIFFImage function in coders/tiff.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5360.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5360.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-5360", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63806", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63867", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63894", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63852", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63902", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63919", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63932", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63918", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63885", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63921", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63931", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63937", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63949", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63947", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.6392", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63964", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-5360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5360" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535494", "reference_id": "1535494", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535494" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/941085?format=api", "purl": "pkg:deb/debian/tiff@4.0.6-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.0.6-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941049?format=api", "purl": "pkg:deb/debian/tiff@4.2.0-1%2Bdeb11u5?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1hfc-b4qr-jqgk" }, { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-h9ap-xxmw-j7dr" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-vrtj-45t6-cqec" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.2.0-1%252Bdeb11u5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941047?format=api", "purl": "pkg:deb/debian/tiff@4.5.0-6%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-b4hb-cxzy-suck" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.0-6%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941051?format=api", "purl": "pkg:deb/debian/tiff@4.7.0-3%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-vju4-pghv-47bx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.0-3%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941050?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ttb7-w41r-4kfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000494?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-5360" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bap5-5e3b-8qea" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61014?format=api", "vulnerability_id": "VCID-bf8s-peku-2uht", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5652.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5652.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5652", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06401", "scoring_system": "epss", "scoring_elements": "0.90982", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06401", "scoring_system": "epss", "scoring_elements": "0.91095", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.06401", "scoring_system": "epss", "scoring_elements": "0.91069", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.06401", "scoring_system": "epss", "scoring_elements": "0.91065", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.06401", "scoring_system": "epss", "scoring_elements": "0.9108", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.06401", "scoring_system": "epss", "scoring_elements": "0.90987", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06401", "scoring_system": "epss", "scoring_elements": "0.90996", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06401", "scoring_system": "epss", "scoring_elements": "0.91007", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06401", "scoring_system": "epss", "scoring_elements": "0.91019", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06401", "scoring_system": "epss", "scoring_elements": "0.91025", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06401", "scoring_system": "epss", "scoring_elements": "0.91033", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06401", "scoring_system": "epss", "scoring_elements": "0.91057", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.06401", "scoring_system": "epss", "scoring_elements": "0.91055", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.06401", "scoring_system": "epss", "scoring_elements": "0.91058", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.06401", "scoring_system": "epss", "scoring_elements": "0.91071", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389222", "reference_id": "1389222", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389222" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842361", "reference_id": "842361", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842361" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0225", "reference_id": "RHSA-2017:0225", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0225" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/941085?format=api", "purl": "pkg:deb/debian/tiff@4.0.6-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.0.6-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941049?format=api", "purl": "pkg:deb/debian/tiff@4.2.0-1%2Bdeb11u5?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1hfc-b4qr-jqgk" }, { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-h9ap-xxmw-j7dr" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-vrtj-45t6-cqec" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.2.0-1%252Bdeb11u5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941047?format=api", "purl": "pkg:deb/debian/tiff@4.5.0-6%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-b4hb-cxzy-suck" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.0-6%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941051?format=api", "purl": "pkg:deb/debian/tiff@4.7.0-3%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-vju4-pghv-47bx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.0-3%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941050?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ttb7-w41r-4kfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000494?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-5652" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bf8s-peku-2uht" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60995?format=api", "vulnerability_id": "VCID-ceb4-e5mz-4fbp", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3631.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3631.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3631", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0079", "scoring_system": "epss", "scoring_elements": "0.73983", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0079", "scoring_system": "epss", "scoring_elements": "0.73961", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0079", "scoring_system": "epss", "scoring_elements": "0.73956", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0079", "scoring_system": "epss", "scoring_elements": "0.73827", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0079", "scoring_system": "epss", "scoring_elements": "0.73837", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0079", "scoring_system": "epss", "scoring_elements": "0.73862", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0079", "scoring_system": "epss", "scoring_elements": "0.73832", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0079", "scoring_system": "epss", "scoring_elements": "0.73867", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0079", "scoring_system": "epss", "scoring_elements": "0.7388", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0079", "scoring_system": "epss", "scoring_elements": "0.73902", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0079", "scoring_system": "epss", "scoring_elements": "0.73884", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0079", "scoring_system": "epss", "scoring_elements": "0.73875", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0079", "scoring_system": "epss", "scoring_elements": "0.73918", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0079", "scoring_system": "epss", "scoring_elements": "0.73926", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0079", "scoring_system": "epss", "scoring_elements": "0.73953", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3631" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3631", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3631" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1316872", "reference_id": "1316872", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1316872" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820366", "reference_id": "820366", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820366" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/941085?format=api", "purl": "pkg:deb/debian/tiff@4.0.6-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.0.6-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941049?format=api", "purl": "pkg:deb/debian/tiff@4.2.0-1%2Bdeb11u5?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1hfc-b4qr-jqgk" }, { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-h9ap-xxmw-j7dr" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-vrtj-45t6-cqec" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.2.0-1%252Bdeb11u5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941047?format=api", "purl": "pkg:deb/debian/tiff@4.5.0-6%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-b4hb-cxzy-suck" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.0-6%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941051?format=api", "purl": "pkg:deb/debian/tiff@4.7.0-3%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-vju4-pghv-47bx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.0-3%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941050?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ttb7-w41r-4kfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000494?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-3631" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ceb4-e5mz-4fbp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60989?format=api", "vulnerability_id": "VCID-dxtf-qzfj-k3aq", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3620.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3620.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3620", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0101", "scoring_system": "epss", "scoring_elements": "0.77218", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0101", "scoring_system": "epss", "scoring_elements": "0.77182", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0101", "scoring_system": "epss", "scoring_elements": "0.77188", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0101", "scoring_system": "epss", "scoring_elements": "0.77032", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0101", "scoring_system": "epss", "scoring_elements": "0.77038", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0101", "scoring_system": "epss", "scoring_elements": "0.77067", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0101", "scoring_system": "epss", "scoring_elements": "0.77048", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0101", "scoring_system": "epss", "scoring_elements": "0.7708", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0101", "scoring_system": "epss", "scoring_elements": "0.7709", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0101", "scoring_system": "epss", "scoring_elements": "0.77118", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0101", "scoring_system": "epss", "scoring_elements": "0.77098", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0101", "scoring_system": "epss", "scoring_elements": "0.77093", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0101", "scoring_system": "epss", "scoring_elements": "0.77134", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0101", "scoring_system": "epss", "scoring_elements": "0.77136", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0101", "scoring_system": "epss", "scoring_elements": "0.77127", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0101", "scoring_system": "epss", "scoring_elements": "0.77161", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0101", "scoring_system": "epss", "scoring_elements": "0.77168", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3620" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3620", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3620" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1316859", "reference_id": "1316859", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1316859" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820363", "reference_id": "820363", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820363" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/941085?format=api", "purl": "pkg:deb/debian/tiff@4.0.6-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.0.6-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941049?format=api", "purl": "pkg:deb/debian/tiff@4.2.0-1%2Bdeb11u5?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1hfc-b4qr-jqgk" }, { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-h9ap-xxmw-j7dr" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-vrtj-45t6-cqec" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.2.0-1%252Bdeb11u5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941047?format=api", "purl": "pkg:deb/debian/tiff@4.5.0-6%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-b4hb-cxzy-suck" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.0-6%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941051?format=api", "purl": "pkg:deb/debian/tiff@4.7.0-3%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-vju4-pghv-47bx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.0-3%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941050?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ttb7-w41r-4kfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000494?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-3620" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dxtf-qzfj-k3aq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61021?format=api", "vulnerability_id": "VCID-fc93-fu34-37cx", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9453.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9453.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9453", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.6167", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.61826", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.61827", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.61822", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.61833", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.61778", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.61744", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.61774", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.61792", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.61808", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.61828", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.61816", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.61796", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.6184", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00418", "scoring_system": "epss", "scoring_elements": "0.61844", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9453" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10093" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10094" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397723", "reference_id": "1397723", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397723" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" }, { "reference_url": "https://usn.ubuntu.com/3212-3/", "reference_id": "USN-3212-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/941085?format=api", "purl": "pkg:deb/debian/tiff@4.0.6-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.0.6-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941049?format=api", "purl": "pkg:deb/debian/tiff@4.2.0-1%2Bdeb11u5?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1hfc-b4qr-jqgk" }, { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-h9ap-xxmw-j7dr" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-vrtj-45t6-cqec" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.2.0-1%252Bdeb11u5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941047?format=api", "purl": "pkg:deb/debian/tiff@4.5.0-6%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-b4hb-cxzy-suck" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.0-6%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941051?format=api", "purl": "pkg:deb/debian/tiff@4.7.0-3%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-vju4-pghv-47bx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.0-3%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941050?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ttb7-w41r-4kfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000494?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-9453" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fc93-fu34-37cx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60987?format=api", "vulnerability_id": "VCID-gg7k-u39a-kqbw", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-04/msg00064.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-04/msg00064.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-04/msg00075.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-04/msg00075.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3186.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3186.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3186", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00766", "scoring_system": "epss", "scoring_elements": "0.73563", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00766", "scoring_system": "epss", "scoring_elements": "0.73537", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00766", "scoring_system": "epss", "scoring_elements": "0.73549", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00766", "scoring_system": "epss", "scoring_elements": "0.73546", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00766", "scoring_system": "epss", "scoring_elements": "0.73538", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00766", "scoring_system": "epss", "scoring_elements": "0.7341", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00766", "scoring_system": "epss", "scoring_elements": "0.73418", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00766", "scoring_system": "epss", "scoring_elements": "0.73442", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00766", "scoring_system": "epss", "scoring_elements": "0.73413", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00766", "scoring_system": "epss", "scoring_elements": "0.73451", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00766", "scoring_system": "epss", "scoring_elements": "0.73464", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00766", "scoring_system": "epss", "scoring_elements": "0.73488", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00766", "scoring_system": "epss", "scoring_elements": "0.73468", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00766", "scoring_system": "epss", "scoring_elements": "0.7346", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00766", "scoring_system": "epss", "scoring_elements": "0.73502", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00766", "scoring_system": "epss", "scoring_elements": "0.7351", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00766", "scoring_system": "epss", "scoring_elements": "0.73504", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3186" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1319503", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1319503" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3186", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3186" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1035442", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035442" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1319666", "reference_id": "1319666", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1319666" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=819972", "reference_id": "819972", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=819972" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:4.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libtiff:libtiff:4.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:4.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3186", "reference_id": "CVE-2016-3186", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3186" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2053", "reference_id": "RHSA-2019:2053", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2053" }, { "reference_url": "https://usn.ubuntu.com/3606-1/", "reference_id": "USN-3606-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3606-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/941085?format=api", "purl": "pkg:deb/debian/tiff@4.0.6-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.0.6-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941049?format=api", "purl": "pkg:deb/debian/tiff@4.2.0-1%2Bdeb11u5?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1hfc-b4qr-jqgk" }, { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-h9ap-xxmw-j7dr" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-vrtj-45t6-cqec" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.2.0-1%252Bdeb11u5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941047?format=api", "purl": "pkg:deb/debian/tiff@4.5.0-6%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-b4hb-cxzy-suck" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.0-6%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941051?format=api", "purl": "pkg:deb/debian/tiff@4.7.0-3%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-vju4-pghv-47bx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.0-3%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941050?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ttb7-w41r-4kfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000494?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-3186" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gg7k-u39a-kqbw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61009?format=api", "vulnerability_id": "VCID-hfrr-s8ge-z7hx", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5319.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5319.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5319", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00877", "scoring_system": "epss", "scoring_elements": "0.75418", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00877", "scoring_system": "epss", "scoring_elements": "0.75382", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00877", "scoring_system": "epss", "scoring_elements": "0.75389", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00877", "scoring_system": "epss", "scoring_elements": "0.75248", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00877", "scoring_system": "epss", "scoring_elements": "0.75251", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00877", "scoring_system": "epss", "scoring_elements": "0.75283", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00877", "scoring_system": "epss", "scoring_elements": "0.75261", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00877", "scoring_system": "epss", "scoring_elements": "0.75304", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00877", "scoring_system": "epss", "scoring_elements": "0.75314", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00877", "scoring_system": "epss", "scoring_elements": "0.75335", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00877", "scoring_system": "epss", "scoring_elements": "0.75313", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00877", "scoring_system": "epss", "scoring_elements": "0.75302", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00877", "scoring_system": "epss", "scoring_elements": "0.75342", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00877", "scoring_system": "epss", "scoring_elements": "0.75348", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00877", "scoring_system": "epss", "scoring_elements": "0.75338", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00877", "scoring_system": "epss", "scoring_elements": "0.75373", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00877", "scoring_system": "epss", "scoring_elements": "0.75377", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5319" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344069", "reference_id": "1344069", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344069" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842046", "reference_id": "842046", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842046" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/941085?format=api", "purl": "pkg:deb/debian/tiff@4.0.6-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.0.6-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941049?format=api", "purl": "pkg:deb/debian/tiff@4.2.0-1%2Bdeb11u5?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1hfc-b4qr-jqgk" }, { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-h9ap-xxmw-j7dr" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-vrtj-45t6-cqec" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.2.0-1%252Bdeb11u5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941047?format=api", "purl": "pkg:deb/debian/tiff@4.5.0-6%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-b4hb-cxzy-suck" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.0-6%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941051?format=api", "purl": "pkg:deb/debian/tiff@4.7.0-3%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-vju4-pghv-47bx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.0-3%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941050?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ttb7-w41r-4kfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000494?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-5319" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hfrr-s8ge-z7hx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60998?format=api", "vulnerability_id": "VCID-p9pe-czsr-9uhu", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3634.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3634.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3634", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71951", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71926", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71916", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71808", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71817", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71836", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71809", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71848", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71859", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71883", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71865", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.7189", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71895", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71879", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71924", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71929", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3634" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3634", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3634" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326267", "reference_id": "1326267", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326267" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/941085?format=api", "purl": "pkg:deb/debian/tiff@4.0.6-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.0.6-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941049?format=api", "purl": "pkg:deb/debian/tiff@4.2.0-1%2Bdeb11u5?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1hfc-b4qr-jqgk" }, { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-h9ap-xxmw-j7dr" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-vrtj-45t6-cqec" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.2.0-1%252Bdeb11u5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941047?format=api", "purl": "pkg:deb/debian/tiff@4.5.0-6%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-b4hb-cxzy-suck" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.0-6%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941051?format=api", "purl": "pkg:deb/debian/tiff@4.7.0-3%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-vju4-pghv-47bx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.0-3%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941050?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ttb7-w41r-4kfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000494?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-3634" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p9pe-czsr-9uhu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58071?format=api", "vulnerability_id": "VCID-pf5w-eted-9kc9", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8127.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8127.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8127", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67455", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67607", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67589", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67563", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67491", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67512", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.6749", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67541", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67556", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67578", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67564", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67531", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67566", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67579", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67558", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67577", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67587", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8128", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8128" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8129", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8129" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9330", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9330" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9655", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9655" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1547" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185805", "reference_id": "1185805", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185805" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776185", "reference_id": "776185", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776185" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1546", "reference_id": "RHSA-2016:1546", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1546" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1547", "reference_id": "RHSA-2016:1547", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1547" }, { "reference_url": "https://usn.ubuntu.com/2553-1/", "reference_id": "USN-2553-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2553-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/941085?format=api", "purl": "pkg:deb/debian/tiff@4.0.6-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.0.6-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941049?format=api", "purl": "pkg:deb/debian/tiff@4.2.0-1%2Bdeb11u5?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1hfc-b4qr-jqgk" }, { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-h9ap-xxmw-j7dr" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-vrtj-45t6-cqec" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.2.0-1%252Bdeb11u5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941047?format=api", "purl": "pkg:deb/debian/tiff@4.5.0-6%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-b4hb-cxzy-suck" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.0-6%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941051?format=api", "purl": "pkg:deb/debian/tiff@4.7.0-3%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-vju4-pghv-47bx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.0-3%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941050?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ttb7-w41r-4kfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000494?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2014-8127" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pf5w-eted-9kc9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60996?format=api", "vulnerability_id": "VCID-u1mj-pxtw-7qet", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3632.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3632.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3632", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66461", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66628", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66609", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.6661", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66583", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.665", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66526", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66497", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66545", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66559", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66578", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66566", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66534", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.6657", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66587", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66594", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3632" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3632", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3632" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1325095", "reference_id": "1325095", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1325095" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1546", "reference_id": "RHSA-2016:1546", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1546" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1547", "reference_id": "RHSA-2016:1547", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1547" }, { "reference_url": "https://usn.ubuntu.com/3212-1/", "reference_id": "USN-3212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-1/" }, { "reference_url": "https://usn.ubuntu.com/3212-3/", "reference_id": "USN-3212-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3212-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/941085?format=api", "purl": "pkg:deb/debian/tiff@4.0.6-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.0.6-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941049?format=api", "purl": "pkg:deb/debian/tiff@4.2.0-1%2Bdeb11u5?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1hfc-b4qr-jqgk" }, { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-h9ap-xxmw-j7dr" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-vrtj-45t6-cqec" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.2.0-1%252Bdeb11u5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941047?format=api", "purl": "pkg:deb/debian/tiff@4.5.0-6%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-b4hb-cxzy-suck" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.0-6%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941051?format=api", "purl": "pkg:deb/debian/tiff@4.7.0-3%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-vju4-pghv-47bx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.0-3%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941050?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ttb7-w41r-4kfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000494?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-3632" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u1mj-pxtw-7qet" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83757?format=api", "vulnerability_id": "VCID-vxd8-dh75-fqah", "summary": "libtiff: Heap-based buffer overflow in PackBitsEncode function in tif_packbits.c", "references": [ { "reference_url": "http://bugzilla.maptools.org/show_bug.cgi?id=2767", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugzilla.maptools.org/show_bug.cgi?id=2767" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17942.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17942.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17942", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61083", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61228", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61236", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61229", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61179", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.6116", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61188", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61154", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61202", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61217", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61237", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61224", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61206", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61245", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61251", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61231", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61221", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17942" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17942", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17942" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securityfocus.com/bid/102312", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/102312" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1529524", "reference_id": "1529524", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1529524" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=885579", "reference_id": "885579", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=885579" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:4.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libtiff:libtiff:4.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:4.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17942", "reference_id": "CVE-2017-17942", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17942" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/941085?format=api", "purl": "pkg:deb/debian/tiff@4.0.6-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.0.6-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941049?format=api", "purl": "pkg:deb/debian/tiff@4.2.0-1%2Bdeb11u5?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1hfc-b4qr-jqgk" }, { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-h9ap-xxmw-j7dr" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-vrtj-45t6-cqec" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.2.0-1%252Bdeb11u5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941047?format=api", "purl": "pkg:deb/debian/tiff@4.5.0-6%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-b4hb-cxzy-suck" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.0-6%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941051?format=api", "purl": "pkg:deb/debian/tiff@4.7.0-3%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-vju4-pghv-47bx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.0-3%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941050?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ttb7-w41r-4kfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000494?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-17942" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vxd8-dh75-fqah" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61003?format=api", "vulnerability_id": "VCID-xg5z-jss1-3ycp", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5102.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5102.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5102", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00602", "scoring_system": "epss", "scoring_elements": "0.69632", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00602", "scoring_system": "epss", "scoring_elements": "0.69614", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00602", "scoring_system": "epss", "scoring_elements": "0.69589", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00602", "scoring_system": "epss", "scoring_elements": "0.69454", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00602", "scoring_system": "epss", "scoring_elements": "0.69465", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00602", "scoring_system": "epss", "scoring_elements": "0.69481", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00602", "scoring_system": "epss", "scoring_elements": "0.69461", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00602", "scoring_system": "epss", "scoring_elements": "0.69511", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00602", "scoring_system": "epss", "scoring_elements": "0.69527", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00602", "scoring_system": "epss", "scoring_elements": "0.69549", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00602", "scoring_system": "epss", "scoring_elements": "0.69534", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00602", "scoring_system": "epss", "scoring_elements": "0.6952", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00602", "scoring_system": "epss", "scoring_elements": "0.69559", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00602", "scoring_system": "epss", "scoring_elements": "0.69569", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00602", "scoring_system": "epss", "scoring_elements": "0.6955", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00602", "scoring_system": "epss", "scoring_elements": "0.69602", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00602", "scoring_system": "epss", "scoring_elements": "0.6961", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5102" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5102", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5102" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343407", "reference_id": "1343407", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343407" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" }, { "reference_url": "https://usn.ubuntu.com/3606-1/", "reference_id": "USN-3606-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3606-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/941085?format=api", "purl": "pkg:deb/debian/tiff@4.0.6-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.0.6-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941049?format=api", "purl": "pkg:deb/debian/tiff@4.2.0-1%2Bdeb11u5?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1hfc-b4qr-jqgk" }, { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-h9ap-xxmw-j7dr" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-vrtj-45t6-cqec" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.2.0-1%252Bdeb11u5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941047?format=api", "purl": "pkg:deb/debian/tiff@4.5.0-6%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-b4hb-cxzy-suck" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.0-6%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941051?format=api", "purl": "pkg:deb/debian/tiff@4.7.0-3%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-vju4-pghv-47bx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.0-3%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941050?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ttb7-w41r-4kfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000494?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-5102" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xg5z-jss1-3ycp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60990?format=api", "vulnerability_id": "VCID-ytpu-tcxj-guex", "summary": "Multiple vulnerabilities have been found in libTIFF, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3621.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3621.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3621", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71675", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71656", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.7164", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.7153", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71536", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71554", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71527", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71567", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71578", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71601", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71585", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71612", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71616", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71597", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71647", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71651", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3621" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3621", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3621" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1324822", "reference_id": "1324822", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1324822" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820364", "reference_id": "820364", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820364" }, { "reference_url": "https://security.archlinux.org/ASA-201611-26", "reference_id": "ASA-201611-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-26" }, { "reference_url": "https://security.archlinux.org/ASA-201611-27", "reference_id": "ASA-201611-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-27" }, { "reference_url": "https://security.archlinux.org/AVG-85", "reference_id": "AVG-85", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-85" }, { "reference_url": "https://security.archlinux.org/AVG-86", "reference_id": "AVG-86", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-86" }, { "reference_url": "https://security.gentoo.org/glsa/201701-16", "reference_id": "GLSA-201701-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-16" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/941085?format=api", "purl": "pkg:deb/debian/tiff@4.0.6-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.0.6-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941049?format=api", "purl": "pkg:deb/debian/tiff@4.2.0-1%2Bdeb11u5?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1hfc-b4qr-jqgk" }, { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-h9ap-xxmw-j7dr" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-vrtj-45t6-cqec" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.2.0-1%252Bdeb11u5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941047?format=api", "purl": "pkg:deb/debian/tiff@4.5.0-6%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-b4hb-cxzy-suck" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.0-6%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941051?format=api", "purl": "pkg:deb/debian/tiff@4.7.0-3%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-vju4-pghv-47bx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.0-3%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941050?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ttb7-w41r-4kfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000494?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-3621" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ytpu-tcxj-guex" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83490?format=api", "vulnerability_id": "VCID-z4fp-77gf-gydw", "summary": "libtiff: memory leak in bmp2tiff tool", "references": [ { "reference_url": "http://bugzilla.maptools.org/show_bug.cgi?id=2790", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugzilla.maptools.org/show_bug.cgi?id=2790" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10801.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10801.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10801", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.60737", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.60889", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.6081", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.60839", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.60803", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.60852", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.60868", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.60876", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00405", "scoring_system": "epss", "scoring_elements": "0.61002", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00405", "scoring_system": "epss", "scoring_elements": "0.61048", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00405", "scoring_system": "epss", "scoring_elements": "0.6106", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00405", "scoring_system": "epss", "scoring_elements": "0.61053", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00405", "scoring_system": "epss", "scoring_elements": "0.61052", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00405", "scoring_system": "epss", "scoring_elements": "0.61027", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00405", "scoring_system": "epss", "scoring_elements": "0.61068", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00405", "scoring_system": "epss", "scoring_elements": "0.61074", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00405", "scoring_system": "epss", "scoring_elements": "0.61059", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10801" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10801", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10801" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1577392", "reference_id": "1577392", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1577392" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:3.8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libtiff:libtiff:3.8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtiff:libtiff:3.8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10801", "reference_id": "CVE-2018-10801", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10801" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/941085?format=api", "purl": "pkg:deb/debian/tiff@4.0.6-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.0.6-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941049?format=api", "purl": "pkg:deb/debian/tiff@4.2.0-1%2Bdeb11u5?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1hfc-b4qr-jqgk" }, { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-h9ap-xxmw-j7dr" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-vrtj-45t6-cqec" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.2.0-1%252Bdeb11u5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941047?format=api", "purl": "pkg:deb/debian/tiff@4.5.0-6%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-38sj-85gt-sfhe" }, { "vulnerability": "VCID-4mhv-7vrm-v7hv" }, { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-a8jf-xmj8-cuh6" }, { "vulnerability": "VCID-b4hb-cxzy-suck" }, { "vulnerability": "VCID-d8kh-h6vs-gqd4" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-ndc5-qn5u-3qbq" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-rp7t-x7gz-9udg" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-ukgj-45m7-6uba" }, { "vulnerability": "VCID-vju4-pghv-47bx" }, { "vulnerability": "VCID-yfxw-tmnn-byc6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.0-6%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941051?format=api", "purl": "pkg:deb/debian/tiff@4.7.0-3%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7zdy-fxq2-p7gf" }, { "vulnerability": "VCID-9grz-pkwb-3kc5" }, { "vulnerability": "VCID-dg96-zmw1-8kcp" }, { "vulnerability": "VCID-r186-xqyn-ffey" }, { "vulnerability": "VCID-sqxq-hg7v-d7gv" }, { "vulnerability": "VCID-ttb7-w41r-4kfn" }, { "vulnerability": "VCID-vju4-pghv-47bx" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.0-3%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941050?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ttb7-w41r-4kfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000494?format=api", "purl": "pkg:deb/debian/tiff@4.7.1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-10801" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z4fp-77gf-gydw" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.0.6-3%3Fdistro=trixie" }