{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T17:30:35.491","vulnerabilities":[{"cve":{"id":"CVE-2016-5684","sourceIdentifier":"cret@cert.org","published":"2017-01-06T21:59:01.727","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"An exploitable out-of-bounds write vulnerability exists in the XMP image handling functionality of the FreeImage library. A specially crafted XMP file can cause an arbitrary memory overwrite resulting in code execution. An attacker can provide a malicious image to trigger this vulnerability."},{"lang":"es","value":"Existe una vulnerabilidad explotable de escritura fuera de límites en la funcionalidad de manejo de imágenes XMP de la librería FreeImage. Un archivo XMP especialmente manipulado puede provocar una sobreescritura de memoria arbitraria resultando en ejecución de código. Un atacante puede proveer una imagen maliciosa para desencadenar esta vulnerabilidad."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:freeimage_project:freeimage:3.17.0:*:*:*:*:*:*:*","matchCriteriaId":"95228735-DF39-4743-A1D1-C53BA15565E3"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/93287","source":"cret@cert.org"},{"url":"http://www.talosintelligence.com/reports/TALOS-2016-0189/","source":"cret@cert.org","tags":["Mitigation","Technical Description","Third Party Advisory"]},{"url":"https://security.gentoo.org/glsa/201701-68","source":"cret@cert.org"},{"url":"https://usn.ubuntu.com/3925-1/","source":"cret@cert.org"},{"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html","source":"cret@cert.org"},{"url":"http://www.securityfocus.com/bid/93287","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.talosintelligence.com/reports/TALOS-2016-0189/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mitigation","Technical Description","Third Party Advisory"]},{"url":"https://security.gentoo.org/glsa/201701-68","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://usn.ubuntu.com/3925-1/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}