{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62383?format=json","vulnerability_id":"VCID-rv8p-cz94-6ue9","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which may allow execution of arbitrary code.","aliases":[{"alias":"CVE-2016-3181"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85852?format=json","purl":"pkg:ebuild/media-libs/openjpeg@2.1.1_p20160922","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/openjpeg@2.1.1_p20160922"}],"affected_packages":[],"references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3181.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3181.json"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1317822","reference_id":"1317822","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1317822"},{"reference_url":"https://security.gentoo.org/glsa/201612-26","reference_id":"GLSA-201612-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-26"}],"weaknesses":[{"cwe_id":125,"name":"Out-of-bounds Read","description":"The product reads data past the end, or before the beginning, of the intended buffer."}],"exploits":[],"severity_range_score":null,"exploitability":null,"weighted_severity":null,"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rv8p-cz94-6ue9"}