{"url":"http://public2.vulnerablecode.io/api/packages/941134?format=json","purl":"pkg:deb/debian/tiff@4.2.0-1%2Bdeb11u6?distro=trixie","type":"deb","namespace":"debian","name":"tiff","version":"4.2.0-1+deb11u6","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"4.2.0-1+deb11u7","latest_non_vulnerable_version":"4.7.1-2","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74691?format=json","vulnerability_id":"VCID-1nme-2pjx-q7hp","summary":"libtiff: NULL pointer dereference in tif_dirinfo.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7006.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7006.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-7006","reference_id":"","reference_type":"","scores":[{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.6606","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66084","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66082","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.67672","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.67638","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.67673","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.67685","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.67664","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.67684","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70036","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70051","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70028","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70076","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70092","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70115","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-7006"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7006","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7006"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078648","reference_id":"1078648","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078648"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302996","reference_id":"2302996","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T02:10:18Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302996"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb","reference_id":"cpe:/a:redhat:rhel_eus:9.2::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10","reference_id":"cpe:/o:redhat:enterprise_linux:10","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2024-7006","reference_id":"CVE-2024-7006","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T02:10:18Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2024-7006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6360","reference_id":"RHSA-2024:6360","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T02:10:18Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:6360"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8833","reference_id":"RHSA-2024:8833","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T02:10:18Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:8833"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8914","reference_id":"RHSA-2024:8914","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T02:10:18Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:8914"},{"reference_url":"https://usn.ubuntu.com/6997-1/","reference_id":"USN-6997-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6997-1/"},{"reference_url":"https://usn.ubuntu.com/6997-2/","reference_id":"USN-6997-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6997-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941049?format=json","purl":"pkg:deb/debian/tiff@4.2.0-1%2Bdeb11u5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1hfc-b4qr-jqgk"},{"vulnerability":"VCID-38sj-85gt-sfhe"},{"vulnerability":"VCID-4mhv-7vrm-v7hv"},{"vulnerability":"VCID-7zdy-fxq2-p7gf"},{"vulnerability":"VCID-9grz-pkwb-3kc5"},{"vulnerability":"VCID-a8jf-xmj8-cuh6"},{"vulnerability":"VCID-d8kh-h6vs-gqd4"},{"vulnerability":"VCID-dg96-zmw1-8kcp"},{"vulnerability":"VCID-h9ap-xxmw-j7dr"},{"vulnerability":"VCID-ndc5-qn5u-3qbq"},{"vulnerability":"VCID-r186-xqyn-ffey"},{"vulnerability":"VCID-rp7t-x7gz-9udg"},{"vulnerability":"VCID-sqxq-hg7v-d7gv"},{"vulnerability":"VCID-ttb7-w41r-4kfn"},{"vulnerability":"VCID-ukgj-45m7-6uba"},{"vulnerability":"VCID-vju4-pghv-47bx"},{"vulnerability":"VCID-vrtj-45t6-cqec"},{"vulnerability":"VCID-yfxw-tmnn-byc6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.2.0-1%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941134?format=json","purl":"pkg:deb/debian/tiff@4.2.0-1%2Bdeb11u6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.2.0-1%252Bdeb11u6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941133?format=json","purl":"pkg:deb/debian/tiff@4.5.0-6%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.0-6%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941047?format=json","purl":"pkg:deb/debian/tiff@4.5.0-6%2Bdeb12u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38sj-85gt-sfhe"},{"vulnerability":"VCID-4mhv-7vrm-v7hv"},{"vulnerability":"VCID-7zdy-fxq2-p7gf"},{"vulnerability":"VCID-9grz-pkwb-3kc5"},{"vulnerability":"VCID-a8jf-xmj8-cuh6"},{"vulnerability":"VCID-b4hb-cxzy-suck"},{"vulnerability":"VCID-d8kh-h6vs-gqd4"},{"vulnerability":"VCID-dg96-zmw1-8kcp"},{"vulnerability":"VCID-ndc5-qn5u-3qbq"},{"vulnerability":"VCID-r186-xqyn-ffey"},{"vulnerability":"VCID-rp7t-x7gz-9udg"},{"vulnerability":"VCID-sqxq-hg7v-d7gv"},{"vulnerability":"VCID-ttb7-w41r-4kfn"},{"vulnerability":"VCID-ukgj-45m7-6uba"},{"vulnerability":"VCID-vju4-pghv-47bx"},{"vulnerability":"VCID-yfxw-tmnn-byc6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.0-6%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941143?format=json","purl":"pkg:deb/debian/tiff@4.5.1%2Bgit230720-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.1%252Bgit230720-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941051?format=json","purl":"pkg:deb/debian/tiff@4.7.0-3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7zdy-fxq2-p7gf"},{"vulnerability":"VCID-9grz-pkwb-3kc5"},{"vulnerability":"VCID-dg96-zmw1-8kcp"},{"vulnerability":"VCID-r186-xqyn-ffey"},{"vulnerability":"VCID-sqxq-hg7v-d7gv"},{"vulnerability":"VCID-ttb7-w41r-4kfn"},{"vulnerability":"VCID-vju4-pghv-47bx"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.0-3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941050?format=json","purl":"pkg:deb/debian/tiff@4.7.1-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ttb7-w41r-4kfn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1000494?format=json","purl":"pkg:deb/debian/tiff@4.7.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-2%3Fdistro=trixie"}],"aliases":["CVE-2024-7006"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1nme-2pjx-q7hp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/18009?format=json","vulnerability_id":"VCID-2ds7-xq64-9ue2","summary":"NULL Pointer Dereference\nA NULL pointer dereference in TIFFClose() is caused by a failure to open an output file (non-existent path or a path that requires permissions like /dev/null) while specifying zones.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3316.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3316.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3316","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05658","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0569","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05697","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0573","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05757","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05735","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05727","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05721","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06263","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.0605","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.0606","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06282","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06208","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06223","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06254","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3316"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3316","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3316"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://research.jfrog.com/vulnerabilities/libtiff-nullderef-dos-xray-522144/","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-09T21:09:26Z/"}],"url":"https://research.jfrog.com/vulnerabilities/libtiff-nullderef-dos-xray-522144/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2216080","reference_id":"2216080","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2216080"},{"reference_url":"https://gitlab.com/libtiff/libtiff/-/merge_requests/468","reference_id":"468","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-09T21:09:26Z/"}],"url":"https://gitlab.com/libtiff/libtiff/-/merge_requests/468"},{"reference_url":"https://gitlab.com/libtiff/libtiff/-/issues/515","reference_id":"515","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-09T21:09:26Z/"}],"url":"https://gitlab.com/libtiff/libtiff/-/issues/515"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3316","reference_id":"CVE-2023-3316","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3316"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html","reference_id":"msg00034.html","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-09T21:09:26Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6575","reference_id":"RHSA-2023:6575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6575"},{"reference_url":"https://usn.ubuntu.com/6229-1/","reference_id":"USN-6229-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6229-1/"},{"reference_url":"https://usn.ubuntu.com/6290-1/","reference_id":"USN-6290-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6290-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941049?format=json","purl":"pkg:deb/debian/tiff@4.2.0-1%2Bdeb11u5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1hfc-b4qr-jqgk"},{"vulnerability":"VCID-38sj-85gt-sfhe"},{"vulnerability":"VCID-4mhv-7vrm-v7hv"},{"vulnerability":"VCID-7zdy-fxq2-p7gf"},{"vulnerability":"VCID-9grz-pkwb-3kc5"},{"vulnerability":"VCID-a8jf-xmj8-cuh6"},{"vulnerability":"VCID-d8kh-h6vs-gqd4"},{"vulnerability":"VCID-dg96-zmw1-8kcp"},{"vulnerability":"VCID-h9ap-xxmw-j7dr"},{"vulnerability":"VCID-ndc5-qn5u-3qbq"},{"vulnerability":"VCID-r186-xqyn-ffey"},{"vulnerability":"VCID-rp7t-x7gz-9udg"},{"vulnerability":"VCID-sqxq-hg7v-d7gv"},{"vulnerability":"VCID-ttb7-w41r-4kfn"},{"vulnerability":"VCID-ukgj-45m7-6uba"},{"vulnerability":"VCID-vju4-pghv-47bx"},{"vulnerability":"VCID-vrtj-45t6-cqec"},{"vulnerability":"VCID-yfxw-tmnn-byc6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.2.0-1%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941134?format=json","purl":"pkg:deb/debian/tiff@4.2.0-1%2Bdeb11u6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.2.0-1%252Bdeb11u6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941130?format=json","purl":"pkg:deb/debian/tiff@4.5.0-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.0-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941047?format=json","purl":"pkg:deb/debian/tiff@4.5.0-6%2Bdeb12u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38sj-85gt-sfhe"},{"vulnerability":"VCID-4mhv-7vrm-v7hv"},{"vulnerability":"VCID-7zdy-fxq2-p7gf"},{"vulnerability":"VCID-9grz-pkwb-3kc5"},{"vulnerability":"VCID-a8jf-xmj8-cuh6"},{"vulnerability":"VCID-b4hb-cxzy-suck"},{"vulnerability":"VCID-d8kh-h6vs-gqd4"},{"vulnerability":"VCID-dg96-zmw1-8kcp"},{"vulnerability":"VCID-ndc5-qn5u-3qbq"},{"vulnerability":"VCID-r186-xqyn-ffey"},{"vulnerability":"VCID-rp7t-x7gz-9udg"},{"vulnerability":"VCID-sqxq-hg7v-d7gv"},{"vulnerability":"VCID-ttb7-w41r-4kfn"},{"vulnerability":"VCID-ukgj-45m7-6uba"},{"vulnerability":"VCID-vju4-pghv-47bx"},{"vulnerability":"VCID-yfxw-tmnn-byc6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.0-6%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941051?format=json","purl":"pkg:deb/debian/tiff@4.7.0-3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7zdy-fxq2-p7gf"},{"vulnerability":"VCID-9grz-pkwb-3kc5"},{"vulnerability":"VCID-dg96-zmw1-8kcp"},{"vulnerability":"VCID-r186-xqyn-ffey"},{"vulnerability":"VCID-sqxq-hg7v-d7gv"},{"vulnerability":"VCID-ttb7-w41r-4kfn"},{"vulnerability":"VCID-vju4-pghv-47bx"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.0-3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941050?format=json","purl":"pkg:deb/debian/tiff@4.7.1-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ttb7-w41r-4kfn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1000494?format=json","purl":"pkg:deb/debian/tiff@4.7.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-2%3Fdistro=trixie"}],"aliases":["CVE-2023-3316"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2ds7-xq64-9ue2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/18129?format=json","vulnerability_id":"VCID-6dt6-ppka-b3ct","summary":"Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')\nlibtiff 4.5.0 is vulnerable to Buffer Overflow in uv_encode() when libtiff reads a corrupted little-endian TIFF file and specifies the output to be big-endian.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-26966.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-26966.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-26966","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07297","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07274","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07301","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07283","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07273","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07203","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07198","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07323","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07282","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07241","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0722","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08031","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08318","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08398","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08366","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-26966"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26966","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26966"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/libtiff/libtiff/-/issues/530","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:42:13Z/"}],"url":"https://gitlab.com/libtiff/libtiff/-/issues/530"},{"reference_url":"https://gitlab.com/libtiff/libtiff/-/merge_requests/473","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:42:13Z/"}],"url":"https://gitlab.com/libtiff/libtiff/-/merge_requests/473"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218749","reference_id":"2218749","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218749"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2023-26966","reference_id":"CVE-2023-26966","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-26966"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html","reference_id":"msg00034.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:42:13Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6575","reference_id":"RHSA-2023:6575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6575"},{"reference_url":"https://usn.ubuntu.com/6229-1/","reference_id":"USN-6229-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6229-1/"},{"reference_url":"https://usn.ubuntu.com/6290-1/","reference_id":"USN-6290-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6290-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941049?format=json","purl":"pkg:deb/debian/tiff@4.2.0-1%2Bdeb11u5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1hfc-b4qr-jqgk"},{"vulnerability":"VCID-38sj-85gt-sfhe"},{"vulnerability":"VCID-4mhv-7vrm-v7hv"},{"vulnerability":"VCID-7zdy-fxq2-p7gf"},{"vulnerability":"VCID-9grz-pkwb-3kc5"},{"vulnerability":"VCID-a8jf-xmj8-cuh6"},{"vulnerability":"VCID-d8kh-h6vs-gqd4"},{"vulnerability":"VCID-dg96-zmw1-8kcp"},{"vulnerability":"VCID-h9ap-xxmw-j7dr"},{"vulnerability":"VCID-ndc5-qn5u-3qbq"},{"vulnerability":"VCID-r186-xqyn-ffey"},{"vulnerability":"VCID-rp7t-x7gz-9udg"},{"vulnerability":"VCID-sqxq-hg7v-d7gv"},{"vulnerability":"VCID-ttb7-w41r-4kfn"},{"vulnerability":"VCID-ukgj-45m7-6uba"},{"vulnerability":"VCID-vju4-pghv-47bx"},{"vulnerability":"VCID-vrtj-45t6-cqec"},{"vulnerability":"VCID-yfxw-tmnn-byc6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.2.0-1%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941134?format=json","purl":"pkg:deb/debian/tiff@4.2.0-1%2Bdeb11u6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.2.0-1%252Bdeb11u6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941133?format=json","purl":"pkg:deb/debian/tiff@4.5.0-6%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.0-6%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941047?format=json","purl":"pkg:deb/debian/tiff@4.5.0-6%2Bdeb12u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38sj-85gt-sfhe"},{"vulnerability":"VCID-4mhv-7vrm-v7hv"},{"vulnerability":"VCID-7zdy-fxq2-p7gf"},{"vulnerability":"VCID-9grz-pkwb-3kc5"},{"vulnerability":"VCID-a8jf-xmj8-cuh6"},{"vulnerability":"VCID-b4hb-cxzy-suck"},{"vulnerability":"VCID-d8kh-h6vs-gqd4"},{"vulnerability":"VCID-dg96-zmw1-8kcp"},{"vulnerability":"VCID-ndc5-qn5u-3qbq"},{"vulnerability":"VCID-r186-xqyn-ffey"},{"vulnerability":"VCID-rp7t-x7gz-9udg"},{"vulnerability":"VCID-sqxq-hg7v-d7gv"},{"vulnerability":"VCID-ttb7-w41r-4kfn"},{"vulnerability":"VCID-ukgj-45m7-6uba"},{"vulnerability":"VCID-vju4-pghv-47bx"},{"vulnerability":"VCID-yfxw-tmnn-byc6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.0-6%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941135?format=json","purl":"pkg:deb/debian/tiff@4.5.1~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.1~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941051?format=json","purl":"pkg:deb/debian/tiff@4.7.0-3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7zdy-fxq2-p7gf"},{"vulnerability":"VCID-9grz-pkwb-3kc5"},{"vulnerability":"VCID-dg96-zmw1-8kcp"},{"vulnerability":"VCID-r186-xqyn-ffey"},{"vulnerability":"VCID-sqxq-hg7v-d7gv"},{"vulnerability":"VCID-ttb7-w41r-4kfn"},{"vulnerability":"VCID-vju4-pghv-47bx"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.0-3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941050?format=json","purl":"pkg:deb/debian/tiff@4.7.1-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ttb7-w41r-4kfn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1000494?format=json","purl":"pkg:deb/debian/tiff@4.7.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-2%3Fdistro=trixie"}],"aliases":["CVE-2023-26966"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6dt6-ppka-b3ct"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/18138?format=json","vulnerability_id":"VCID-k8kt-55y9-qyac","summary":"NULL Pointer Dereference\nA null pointer dereference issue was discovered in Libtiff's tif_dir.c file. This flaw allows an attacker to pass a crafted TIFF image file to the tiffcp utility, which triggers runtime error, causing an undefined behavior, resulting in an application crash, eventually leading to a denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2908.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2908.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2908","reference_id":"","reference_type":"","scores":[{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0239","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02294","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02289","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02305","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02307","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02321","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02339","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02317","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02318","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02314","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02312","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02369","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0281","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0278","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02838","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2908"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218830","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-28T13:04:03Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218830"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2908","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2908"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/libtiff/libtiff/-/commit/9bd48f0dbd64fb94dc2b5b05238fde0bfdd4ff3f","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-28T13:04:03Z/"}],"url":"https://gitlab.com/libtiff/libtiff/-/commit/9bd48f0dbd64fb94dc2b5b05238fde0bfdd4ff3f"},{"reference_url":"https://gitlab.com/libtiff/libtiff/-/merge_requests/479","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-28T13:04:03Z/"}],"url":"https://gitlab.com/libtiff/libtiff/-/merge_requests/479"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-2908","reference_id":"CVE-2023-2908","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-28T13:04:03Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-2908"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2908","reference_id":"CVE-2023-2908","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2908"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html","reference_id":"msg00034.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-28T13:04:03Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230731-0004/","reference_id":"ntap-20230731-0004","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-28T13:04:03Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230731-0004/"},{"reference_url":"https://usn.ubuntu.com/6290-1/","reference_id":"USN-6290-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6290-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941049?format=json","purl":"pkg:deb/debian/tiff@4.2.0-1%2Bdeb11u5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1hfc-b4qr-jqgk"},{"vulnerability":"VCID-38sj-85gt-sfhe"},{"vulnerability":"VCID-4mhv-7vrm-v7hv"},{"vulnerability":"VCID-7zdy-fxq2-p7gf"},{"vulnerability":"VCID-9grz-pkwb-3kc5"},{"vulnerability":"VCID-a8jf-xmj8-cuh6"},{"vulnerability":"VCID-d8kh-h6vs-gqd4"},{"vulnerability":"VCID-dg96-zmw1-8kcp"},{"vulnerability":"VCID-h9ap-xxmw-j7dr"},{"vulnerability":"VCID-ndc5-qn5u-3qbq"},{"vulnerability":"VCID-r186-xqyn-ffey"},{"vulnerability":"VCID-rp7t-x7gz-9udg"},{"vulnerability":"VCID-sqxq-hg7v-d7gv"},{"vulnerability":"VCID-ttb7-w41r-4kfn"},{"vulnerability":"VCID-ukgj-45m7-6uba"},{"vulnerability":"VCID-vju4-pghv-47bx"},{"vulnerability":"VCID-vrtj-45t6-cqec"},{"vulnerability":"VCID-yfxw-tmnn-byc6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.2.0-1%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941134?format=json","purl":"pkg:deb/debian/tiff@4.2.0-1%2Bdeb11u6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.2.0-1%252Bdeb11u6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941133?format=json","purl":"pkg:deb/debian/tiff@4.5.0-6%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.0-6%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941047?format=json","purl":"pkg:deb/debian/tiff@4.5.0-6%2Bdeb12u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38sj-85gt-sfhe"},{"vulnerability":"VCID-4mhv-7vrm-v7hv"},{"vulnerability":"VCID-7zdy-fxq2-p7gf"},{"vulnerability":"VCID-9grz-pkwb-3kc5"},{"vulnerability":"VCID-a8jf-xmj8-cuh6"},{"vulnerability":"VCID-b4hb-cxzy-suck"},{"vulnerability":"VCID-d8kh-h6vs-gqd4"},{"vulnerability":"VCID-dg96-zmw1-8kcp"},{"vulnerability":"VCID-ndc5-qn5u-3qbq"},{"vulnerability":"VCID-r186-xqyn-ffey"},{"vulnerability":"VCID-rp7t-x7gz-9udg"},{"vulnerability":"VCID-sqxq-hg7v-d7gv"},{"vulnerability":"VCID-ttb7-w41r-4kfn"},{"vulnerability":"VCID-ukgj-45m7-6uba"},{"vulnerability":"VCID-vju4-pghv-47bx"},{"vulnerability":"VCID-yfxw-tmnn-byc6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.0-6%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941135?format=json","purl":"pkg:deb/debian/tiff@4.5.1~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.1~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941051?format=json","purl":"pkg:deb/debian/tiff@4.7.0-3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7zdy-fxq2-p7gf"},{"vulnerability":"VCID-9grz-pkwb-3kc5"},{"vulnerability":"VCID-dg96-zmw1-8kcp"},{"vulnerability":"VCID-r186-xqyn-ffey"},{"vulnerability":"VCID-sqxq-hg7v-d7gv"},{"vulnerability":"VCID-ttb7-w41r-4kfn"},{"vulnerability":"VCID-vju4-pghv-47bx"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.0-3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941050?format=json","purl":"pkg:deb/debian/tiff@4.7.1-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ttb7-w41r-4kfn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1000494?format=json","purl":"pkg:deb/debian/tiff@4.7.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-2%3Fdistro=trixie"}],"aliases":["CVE-2023-2908"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k8kt-55y9-qyac"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/17889?format=json","vulnerability_id":"VCID-ndwc-beev-43ck","summary":"Out-of-bounds Write\nloadImage() in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-based use after free via a crafted TIFF image.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-26965.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-26965.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-26965","reference_id":"","reference_type":"","scores":[{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00733","published_at":"2026-04-02T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00736","published_at":"2026-04-07T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.0073","published_at":"2026-04-04T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00735","published_at":"2026-04-08T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00726","published_at":"2026-04-09T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00796","published_at":"2026-04-13T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.008","published_at":"2026-04-18T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00795","published_at":"2026-04-16T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00844","published_at":"2026-04-29T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00801","published_at":"2026-04-11T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00846","published_at":"2026-05-05T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00845","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-26965"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26965","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26965"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/libtiff/libtiff/-/merge_requests/472","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-06T16:22:37Z/"}],"url":"https://gitlab.com/libtiff/libtiff/-/merge_requests/472"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2215206","reference_id":"2215206","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2215206"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2023-26965","reference_id":"CVE-2023-26965","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-26965"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html","reference_id":"msg00034.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-06T16:22:37Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230706-0009/","reference_id":"ntap-20230706-0009","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-06T16:22:37Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230706-0009/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6575","reference_id":"RHSA-2023:6575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6575"},{"reference_url":"https://usn.ubuntu.com/6229-1/","reference_id":"USN-6229-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6229-1/"},{"reference_url":"https://usn.ubuntu.com/6290-1/","reference_id":"USN-6290-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6290-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941049?format=json","purl":"pkg:deb/debian/tiff@4.2.0-1%2Bdeb11u5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1hfc-b4qr-jqgk"},{"vulnerability":"VCID-38sj-85gt-sfhe"},{"vulnerability":"VCID-4mhv-7vrm-v7hv"},{"vulnerability":"VCID-7zdy-fxq2-p7gf"},{"vulnerability":"VCID-9grz-pkwb-3kc5"},{"vulnerability":"VCID-a8jf-xmj8-cuh6"},{"vulnerability":"VCID-d8kh-h6vs-gqd4"},{"vulnerability":"VCID-dg96-zmw1-8kcp"},{"vulnerability":"VCID-h9ap-xxmw-j7dr"},{"vulnerability":"VCID-ndc5-qn5u-3qbq"},{"vulnerability":"VCID-r186-xqyn-ffey"},{"vulnerability":"VCID-rp7t-x7gz-9udg"},{"vulnerability":"VCID-sqxq-hg7v-d7gv"},{"vulnerability":"VCID-ttb7-w41r-4kfn"},{"vulnerability":"VCID-ukgj-45m7-6uba"},{"vulnerability":"VCID-vju4-pghv-47bx"},{"vulnerability":"VCID-vrtj-45t6-cqec"},{"vulnerability":"VCID-yfxw-tmnn-byc6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.2.0-1%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941134?format=json","purl":"pkg:deb/debian/tiff@4.2.0-1%2Bdeb11u6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.2.0-1%252Bdeb11u6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941133?format=json","purl":"pkg:deb/debian/tiff@4.5.0-6%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.0-6%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941047?format=json","purl":"pkg:deb/debian/tiff@4.5.0-6%2Bdeb12u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38sj-85gt-sfhe"},{"vulnerability":"VCID-4mhv-7vrm-v7hv"},{"vulnerability":"VCID-7zdy-fxq2-p7gf"},{"vulnerability":"VCID-9grz-pkwb-3kc5"},{"vulnerability":"VCID-a8jf-xmj8-cuh6"},{"vulnerability":"VCID-b4hb-cxzy-suck"},{"vulnerability":"VCID-d8kh-h6vs-gqd4"},{"vulnerability":"VCID-dg96-zmw1-8kcp"},{"vulnerability":"VCID-ndc5-qn5u-3qbq"},{"vulnerability":"VCID-r186-xqyn-ffey"},{"vulnerability":"VCID-rp7t-x7gz-9udg"},{"vulnerability":"VCID-sqxq-hg7v-d7gv"},{"vulnerability":"VCID-ttb7-w41r-4kfn"},{"vulnerability":"VCID-ukgj-45m7-6uba"},{"vulnerability":"VCID-vju4-pghv-47bx"},{"vulnerability":"VCID-yfxw-tmnn-byc6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.0-6%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941135?format=json","purl":"pkg:deb/debian/tiff@4.5.1~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.1~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941051?format=json","purl":"pkg:deb/debian/tiff@4.7.0-3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7zdy-fxq2-p7gf"},{"vulnerability":"VCID-9grz-pkwb-3kc5"},{"vulnerability":"VCID-dg96-zmw1-8kcp"},{"vulnerability":"VCID-r186-xqyn-ffey"},{"vulnerability":"VCID-sqxq-hg7v-d7gv"},{"vulnerability":"VCID-ttb7-w41r-4kfn"},{"vulnerability":"VCID-vju4-pghv-47bx"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.0-3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941050?format=json","purl":"pkg:deb/debian/tiff@4.7.1-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ttb7-w41r-4kfn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1000494?format=json","purl":"pkg:deb/debian/tiff@4.7.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-2%3Fdistro=trixie"}],"aliases":["CVE-2023-26965"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ndwc-beev-43ck"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/20633?format=json","vulnerability_id":"VCID-ua38-ur2u-eues","summary":"Out-of-bounds Write\nA segment fault (SEGV) flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFReadRGBATileExt() API. This flaw allows a remote attacker to cause a heap-buffer overflow, leading to a denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52356.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52356.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-52356","reference_id":"","reference_type":"","scores":[{"value":"0.00616","scoring_system":"epss","scoring_elements":"0.69868","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00717","scoring_system":"epss","scoring_elements":"0.72436","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00737","scoring_system":"epss","scoring_elements":"0.72831","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00737","scoring_system":"epss","scoring_elements":"0.72823","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00737","scoring_system":"epss","scoring_elements":"0.72864","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00737","scoring_system":"epss","scoring_elements":"0.72771","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00737","scoring_system":"epss","scoring_elements":"0.7281","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00737","scoring_system":"epss","scoring_elements":"0.72795","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00737","scoring_system":"epss","scoring_elements":"0.72824","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00737","scoring_system":"epss","scoring_elements":"0.72848","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00737","scoring_system":"epss","scoring_elements":"0.72917","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00737","scoring_system":"epss","scoring_elements":"0.72915","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00737","scoring_system":"epss","scoring_elements":"0.72909","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00849","scoring_system":"epss","scoring_elements":"0.74932","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00849","scoring_system":"epss","scoring_elements":"0.74896","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-52356"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2251344","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-28T01:27:48Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2251344"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52356","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52356"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/libtiff/libtiff/-/issues/622","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-28T01:27:48Z/"}],"url":"https://gitlab.com/libtiff/libtiff/-/issues/622"},{"reference_url":"https://gitlab.com/libtiff/libtiff/-/merge_requests/546","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-28T01:27:48Z/"}],"url":"https://gitlab.com/libtiff/libtiff/-/merge_requests/546"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061524","reference_id":"1061524","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061524"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ai_inference_server:3.2::el9","reference_id":"cpe:/a:redhat:ai_inference_server:3.2::el9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ai_inference_server:3.2::el9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ai_inference_server:3.3::el9","reference_id":"cpe:/a:redhat:ai_inference_server:3.3::el9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ai_inference_server:3.3::el9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9","reference_id":"cpe:/a:redhat:discovery:2::el9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::crb","reference_id":"cpe:/a:redhat:rhel_eus:9.6::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10","reference_id":"cpe:/o:redhat:enterprise_linux:10","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1","reference_id":"cpe:/o:redhat:enterprise_linux:10.1","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux_eus:10.0","reference_id":"cpe:/o:redhat:enterprise_linux_eus:10.0","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux_eus:10.0"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-52356","reference_id":"CVE-2023-52356","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-28T01:27:48Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-52356"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52356","reference_id":"CVE-2023-52356","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52356"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5079","reference_id":"RHSA-2024:5079","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-28T01:27:48Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:5079"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20801","reference_id":"RHSA-2025:20801","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-28T01:27:48Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:20801"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21994","reference_id":"RHSA-2025:21994","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-28T01:27:48Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:21994"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23078","reference_id":"RHSA-2025:23078","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-28T01:27:48Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23078"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23079","reference_id":"RHSA-2025:23079","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-28T01:27:48Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23079"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23080","reference_id":"RHSA-2025:23080","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-28T01:27:48Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23080"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3461","reference_id":"RHSA-2026:3461","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-28T01:27:48Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:3461"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3462","reference_id":"RHSA-2026:3462","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-28T01:27:48Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:3462"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:5958","reference_id":"RHSA-2026:5958","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-28T01:27:48Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:5958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7081","reference_id":"RHSA-2026:7081","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-28T01:27:48Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:7081"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7304","reference_id":"RHSA-2026:7304","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-28T01:27:48Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:7304"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7335","reference_id":"RHSA-2026:7335","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-28T01:27:48Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:7335"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8746","reference_id":"RHSA-2026:8746","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-28T01:27:48Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:8746"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8747","reference_id":"RHSA-2026:8747","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-28T01:27:48Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:8747"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8748","reference_id":"RHSA-2026:8748","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-28T01:27:48Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:8748"},{"reference_url":"https://usn.ubuntu.com/6644-1/","reference_id":"USN-6644-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6644-1/"},{"reference_url":"https://usn.ubuntu.com/6644-2/","reference_id":"USN-6644-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6644-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941049?format=json","purl":"pkg:deb/debian/tiff@4.2.0-1%2Bdeb11u5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1hfc-b4qr-jqgk"},{"vulnerability":"VCID-38sj-85gt-sfhe"},{"vulnerability":"VCID-4mhv-7vrm-v7hv"},{"vulnerability":"VCID-7zdy-fxq2-p7gf"},{"vulnerability":"VCID-9grz-pkwb-3kc5"},{"vulnerability":"VCID-a8jf-xmj8-cuh6"},{"vulnerability":"VCID-d8kh-h6vs-gqd4"},{"vulnerability":"VCID-dg96-zmw1-8kcp"},{"vulnerability":"VCID-h9ap-xxmw-j7dr"},{"vulnerability":"VCID-ndc5-qn5u-3qbq"},{"vulnerability":"VCID-r186-xqyn-ffey"},{"vulnerability":"VCID-rp7t-x7gz-9udg"},{"vulnerability":"VCID-sqxq-hg7v-d7gv"},{"vulnerability":"VCID-ttb7-w41r-4kfn"},{"vulnerability":"VCID-ukgj-45m7-6uba"},{"vulnerability":"VCID-vju4-pghv-47bx"},{"vulnerability":"VCID-vrtj-45t6-cqec"},{"vulnerability":"VCID-yfxw-tmnn-byc6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.2.0-1%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941134?format=json","purl":"pkg:deb/debian/tiff@4.2.0-1%2Bdeb11u6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.2.0-1%252Bdeb11u6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941133?format=json","purl":"pkg:deb/debian/tiff@4.5.0-6%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.0-6%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941047?format=json","purl":"pkg:deb/debian/tiff@4.5.0-6%2Bdeb12u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38sj-85gt-sfhe"},{"vulnerability":"VCID-4mhv-7vrm-v7hv"},{"vulnerability":"VCID-7zdy-fxq2-p7gf"},{"vulnerability":"VCID-9grz-pkwb-3kc5"},{"vulnerability":"VCID-a8jf-xmj8-cuh6"},{"vulnerability":"VCID-b4hb-cxzy-suck"},{"vulnerability":"VCID-d8kh-h6vs-gqd4"},{"vulnerability":"VCID-dg96-zmw1-8kcp"},{"vulnerability":"VCID-ndc5-qn5u-3qbq"},{"vulnerability":"VCID-r186-xqyn-ffey"},{"vulnerability":"VCID-rp7t-x7gz-9udg"},{"vulnerability":"VCID-sqxq-hg7v-d7gv"},{"vulnerability":"VCID-ttb7-w41r-4kfn"},{"vulnerability":"VCID-ukgj-45m7-6uba"},{"vulnerability":"VCID-vju4-pghv-47bx"},{"vulnerability":"VCID-yfxw-tmnn-byc6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.0-6%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941139?format=json","purl":"pkg:deb/debian/tiff@4.5.1%2Bgit230720-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.1%252Bgit230720-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941051?format=json","purl":"pkg:deb/debian/tiff@4.7.0-3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7zdy-fxq2-p7gf"},{"vulnerability":"VCID-9grz-pkwb-3kc5"},{"vulnerability":"VCID-dg96-zmw1-8kcp"},{"vulnerability":"VCID-r186-xqyn-ffey"},{"vulnerability":"VCID-sqxq-hg7v-d7gv"},{"vulnerability":"VCID-ttb7-w41r-4kfn"},{"vulnerability":"VCID-vju4-pghv-47bx"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.0-3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941050?format=json","purl":"pkg:deb/debian/tiff@4.7.1-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ttb7-w41r-4kfn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1000494?format=json","purl":"pkg:deb/debian/tiff@4.7.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-2%3Fdistro=trixie"}],"aliases":["CVE-2023-52356"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ua38-ur2u-eues"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/18361?format=json","vulnerability_id":"VCID-v4rx-c1w4-pbb3","summary":"Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')\nA flaw was found in libtiff. A specially crafted tiff file can lead to a segmentation fault due to a buffer overflow in the Fax3Encode function in libtiff/tif_fax3.c, resulting in a denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3618.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3618.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3618","reference_id":"","reference_type":"","scores":[{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.43714","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.44003","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.44026","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.43957","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.44008","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.4401","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.44025","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.43993","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.43977","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.44039","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.4403","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.43964","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.43916","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.4392","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.43835","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3618"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2215865","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:26:00Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2215865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3618"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/libtiff/libtiff/-/commit/8a4f6b587be4fa7bb39fe17f5f9dec52182ab26e","reference_id":"","reference_type":"","scores":[],"url":"https://gitlab.com/libtiff/libtiff/-/commit/8a4f6b587be4fa7bb39fe17f5f9dec52182ab26e"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1040945","reference_id":"1040945","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1040945"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-3618","reference_id":"CVE-2023-3618","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:26:00Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-3618"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3618","reference_id":"CVE-2023-3618","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3618"},{"reference_url":"https://support.apple.com/kb/HT214036","reference_id":"HT214036","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:26:00Z/"}],"url":"https://support.apple.com/kb/HT214036"},{"reference_url":"https://support.apple.com/kb/HT214037","reference_id":"HT214037","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:26:00Z/"}],"url":"https://support.apple.com/kb/HT214037"},{"reference_url":"https://support.apple.com/kb/HT214038","reference_id":"HT214038","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:26:00Z/"}],"url":"https://support.apple.com/kb/HT214038"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html","reference_id":"msg00034.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:26:00Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230824-0012/","reference_id":"ntap-20230824-0012","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:26:00Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230824-0012/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2289","reference_id":"RHSA-2024:2289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2289"},{"reference_url":"https://usn.ubuntu.com/6290-1/","reference_id":"USN-6290-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6290-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941049?format=json","purl":"pkg:deb/debian/tiff@4.2.0-1%2Bdeb11u5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1hfc-b4qr-jqgk"},{"vulnerability":"VCID-38sj-85gt-sfhe"},{"vulnerability":"VCID-4mhv-7vrm-v7hv"},{"vulnerability":"VCID-7zdy-fxq2-p7gf"},{"vulnerability":"VCID-9grz-pkwb-3kc5"},{"vulnerability":"VCID-a8jf-xmj8-cuh6"},{"vulnerability":"VCID-d8kh-h6vs-gqd4"},{"vulnerability":"VCID-dg96-zmw1-8kcp"},{"vulnerability":"VCID-h9ap-xxmw-j7dr"},{"vulnerability":"VCID-ndc5-qn5u-3qbq"},{"vulnerability":"VCID-r186-xqyn-ffey"},{"vulnerability":"VCID-rp7t-x7gz-9udg"},{"vulnerability":"VCID-sqxq-hg7v-d7gv"},{"vulnerability":"VCID-ttb7-w41r-4kfn"},{"vulnerability":"VCID-ukgj-45m7-6uba"},{"vulnerability":"VCID-vju4-pghv-47bx"},{"vulnerability":"VCID-vrtj-45t6-cqec"},{"vulnerability":"VCID-yfxw-tmnn-byc6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.2.0-1%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941134?format=json","purl":"pkg:deb/debian/tiff@4.2.0-1%2Bdeb11u6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.2.0-1%252Bdeb11u6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941133?format=json","purl":"pkg:deb/debian/tiff@4.5.0-6%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.0-6%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941047?format=json","purl":"pkg:deb/debian/tiff@4.5.0-6%2Bdeb12u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38sj-85gt-sfhe"},{"vulnerability":"VCID-4mhv-7vrm-v7hv"},{"vulnerability":"VCID-7zdy-fxq2-p7gf"},{"vulnerability":"VCID-9grz-pkwb-3kc5"},{"vulnerability":"VCID-a8jf-xmj8-cuh6"},{"vulnerability":"VCID-b4hb-cxzy-suck"},{"vulnerability":"VCID-d8kh-h6vs-gqd4"},{"vulnerability":"VCID-dg96-zmw1-8kcp"},{"vulnerability":"VCID-ndc5-qn5u-3qbq"},{"vulnerability":"VCID-r186-xqyn-ffey"},{"vulnerability":"VCID-rp7t-x7gz-9udg"},{"vulnerability":"VCID-sqxq-hg7v-d7gv"},{"vulnerability":"VCID-ttb7-w41r-4kfn"},{"vulnerability":"VCID-ukgj-45m7-6uba"},{"vulnerability":"VCID-vju4-pghv-47bx"},{"vulnerability":"VCID-yfxw-tmnn-byc6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.0-6%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941135?format=json","purl":"pkg:deb/debian/tiff@4.5.1~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.1~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941051?format=json","purl":"pkg:deb/debian/tiff@4.7.0-3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7zdy-fxq2-p7gf"},{"vulnerability":"VCID-9grz-pkwb-3kc5"},{"vulnerability":"VCID-dg96-zmw1-8kcp"},{"vulnerability":"VCID-r186-xqyn-ffey"},{"vulnerability":"VCID-sqxq-hg7v-d7gv"},{"vulnerability":"VCID-ttb7-w41r-4kfn"},{"vulnerability":"VCID-vju4-pghv-47bx"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.0-3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941050?format=json","purl":"pkg:deb/debian/tiff@4.7.1-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ttb7-w41r-4kfn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1000494?format=json","purl":"pkg:deb/debian/tiff@4.7.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-2%3Fdistro=trixie"}],"aliases":["CVE-2023-3618"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v4rx-c1w4-pbb3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/18135?format=json","vulnerability_id":"VCID-z1vf-mhw2-ducs","summary":"Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')\nlibtiff 4.5.0 is vulnerable to Buffer Overflow via /libtiff/tools/tiffcrop.c:8499. Incorrect updating of buffer size after rotateImage() in tiffcrop cause heap-buffer-overflow and SEGV.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25433.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25433.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-25433","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06633","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06643","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07226","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0728","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07307","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07302","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07202","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07247","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07289","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07278","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07209","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07204","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07592","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07641","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0761","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-25433"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25433","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25433"},{"reference_url":"https://gitlab.com/libtiff/libtiff/-/issues/520","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T14:30:31Z/"}],"url":"https://gitlab.com/libtiff/libtiff/-/issues/520"},{"reference_url":"https://gitlab.com/libtiff/libtiff/-/merge_requests/467","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T14:30:31Z/"}],"url":"https://gitlab.com/libtiff/libtiff/-/merge_requests/467"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218744","reference_id":"2218744","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218744"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25433","reference_id":"CVE-2023-25433","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25433"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html","reference_id":"msg00034.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T14:30:31Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5079","reference_id":"RHSA-2024:5079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5079"},{"reference_url":"https://usn.ubuntu.com/6229-1/","reference_id":"USN-6229-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6229-1/"},{"reference_url":"https://usn.ubuntu.com/6290-1/","reference_id":"USN-6290-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6290-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941049?format=json","purl":"pkg:deb/debian/tiff@4.2.0-1%2Bdeb11u5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1hfc-b4qr-jqgk"},{"vulnerability":"VCID-38sj-85gt-sfhe"},{"vulnerability":"VCID-4mhv-7vrm-v7hv"},{"vulnerability":"VCID-7zdy-fxq2-p7gf"},{"vulnerability":"VCID-9grz-pkwb-3kc5"},{"vulnerability":"VCID-a8jf-xmj8-cuh6"},{"vulnerability":"VCID-d8kh-h6vs-gqd4"},{"vulnerability":"VCID-dg96-zmw1-8kcp"},{"vulnerability":"VCID-h9ap-xxmw-j7dr"},{"vulnerability":"VCID-ndc5-qn5u-3qbq"},{"vulnerability":"VCID-r186-xqyn-ffey"},{"vulnerability":"VCID-rp7t-x7gz-9udg"},{"vulnerability":"VCID-sqxq-hg7v-d7gv"},{"vulnerability":"VCID-ttb7-w41r-4kfn"},{"vulnerability":"VCID-ukgj-45m7-6uba"},{"vulnerability":"VCID-vju4-pghv-47bx"},{"vulnerability":"VCID-vrtj-45t6-cqec"},{"vulnerability":"VCID-yfxw-tmnn-byc6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.2.0-1%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941134?format=json","purl":"pkg:deb/debian/tiff@4.2.0-1%2Bdeb11u6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.2.0-1%252Bdeb11u6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941133?format=json","purl":"pkg:deb/debian/tiff@4.5.0-6%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.0-6%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941047?format=json","purl":"pkg:deb/debian/tiff@4.5.0-6%2Bdeb12u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38sj-85gt-sfhe"},{"vulnerability":"VCID-4mhv-7vrm-v7hv"},{"vulnerability":"VCID-7zdy-fxq2-p7gf"},{"vulnerability":"VCID-9grz-pkwb-3kc5"},{"vulnerability":"VCID-a8jf-xmj8-cuh6"},{"vulnerability":"VCID-b4hb-cxzy-suck"},{"vulnerability":"VCID-d8kh-h6vs-gqd4"},{"vulnerability":"VCID-dg96-zmw1-8kcp"},{"vulnerability":"VCID-ndc5-qn5u-3qbq"},{"vulnerability":"VCID-r186-xqyn-ffey"},{"vulnerability":"VCID-rp7t-x7gz-9udg"},{"vulnerability":"VCID-sqxq-hg7v-d7gv"},{"vulnerability":"VCID-ttb7-w41r-4kfn"},{"vulnerability":"VCID-ukgj-45m7-6uba"},{"vulnerability":"VCID-vju4-pghv-47bx"},{"vulnerability":"VCID-yfxw-tmnn-byc6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.0-6%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941135?format=json","purl":"pkg:deb/debian/tiff@4.5.1~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.1~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941051?format=json","purl":"pkg:deb/debian/tiff@4.7.0-3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7zdy-fxq2-p7gf"},{"vulnerability":"VCID-9grz-pkwb-3kc5"},{"vulnerability":"VCID-dg96-zmw1-8kcp"},{"vulnerability":"VCID-r186-xqyn-ffey"},{"vulnerability":"VCID-sqxq-hg7v-d7gv"},{"vulnerability":"VCID-ttb7-w41r-4kfn"},{"vulnerability":"VCID-vju4-pghv-47bx"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.0-3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941050?format=json","purl":"pkg:deb/debian/tiff@4.7.1-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ttb7-w41r-4kfn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1000494?format=json","purl":"pkg:deb/debian/tiff@4.7.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-2%3Fdistro=trixie"}],"aliases":["CVE-2023-25433"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z1vf-mhw2-ducs"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.2.0-1%252Bdeb11u6%3Fdistro=trixie"}