[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-UBUNTU-CVE-2016-5684":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-08T20:11:31.826Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":11,"aliases":12,"duplicate_of":9,"upstream":13,"downstream":16,"duplicates":19,"related":20,"reserved_at":9,"published_at":22,"modified_at":23,"state":9,"summary":24,"references_raw":26,"kevs":54,"epss":9,"epss_history":55,"metrics":56,"affected":63},"UBUNTU-CVE-2016-5684","An exploitable out-of-bounds write vulnerability exists in the XMP image handling functionality of the FreeImage library. A specially crafted XMP file can cause an arbitrary memory overwrite resulting in code execution. An attacker can provide a malicious image to trigger this vulnerability.",null,[],[],[],[14],{"_key":15},"CVE-2016-5684",[17],{"_key":18},"USN-3925-1",[],[21],{"_key":18},"2017-01-06T00:00:00Z","2026-02-04T02:49:32.283330Z",{"cisa_kev":25,"cisa_ransomware":25,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":9,"severity_score":9,"severity_version":9,"severity_source":9,"severity_vector":9,"severity_status":9},false,[27,33,37,41,45,50],{"url":28,"sources":29,"tags":31},"https://ubuntu.com/security/CVE-2016-5684",[30],"osv_ubuntu",[32],"REPORT",{"url":34,"sources":35,"tags":36},"http://www.talosintelligence.com/reports/TALOS-2016-0189/",[30],[32],{"url":38,"sources":39,"tags":40},"http://freeimage.cvs.sourceforge.net/viewvc/freeimage/FreeImage/Source/FreeImage/PluginXPM.cpp?r1=1.17&r2=1.18",[30],[32],{"url":42,"sources":43,"tags":44},"http://freeimage.cvs.sourceforge.net/viewvc/freeimage/FreeImage/Source/FreeImage/PluginXPM.cpp?r1=1.18&r2=1.19",[30],[32],{"url":46,"sources":47,"tags":48},"https://ubuntu.com/security/notices/USN-3925-1",[30],[49],"Advisory",{"url":51,"sources":52,"tags":53},"https://www.cve.org/CVERecord?id=CVE-2016-5684",[30],[32],[],[],[57],{"source":30,"cvss_v2_0":9,"cvss_v3_0":58,"cvss_v3_1":9,"cvss_v4_0":9},{"baseScore":59,"baseSeverity":9,"vectorString":60,"impactScore":61,"exploitabilityScore":62},7.8,"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",9.8,4.6,[64],{"ecosystem":65,"name":66,"vendor":67,"product":66,"cpe_part":9,"purl_type":68,"purl_namespace":67,"purl_name":66,"source":9,"versions":69},"Ubuntu","freeimage","ubuntu","deb",[70,76],{"version":71,"is_range":72,"range_type":73,"version_start":9,"version_start_type":9,"version_end":74,"version_end_type":75,"fixed_in":9},"lt3_15_4_3ubuntu0_1",true,"ecosystem","3.15.4-3ubuntu0.1","excluding",{"version":77,"is_range":72,"range_type":73,"version_start":9,"version_start_type":9,"version_end":78,"version_end_type":75,"fixed_in":9},"lt3_17_0+ds1_2ubuntu0_1","3.17.0+ds1-2ubuntu0.1"]