Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/1035195?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/1035195?format=api", "purl": "pkg:deb/debian/mplayer@1.0~rc1-12etch7", "type": "deb", "namespace": "debian", "name": "mplayer", "version": "1.0~rc1-12etch7", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "2:1.5+svn38408-1", "latest_non_vulnerable_version": "2:1.5+svn38408-1", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34979?format=api", "vulnerability_id": "VCID-1228-m28x-bkbm", "summary": "Multiple vulnerabilities have been found in MPlayer and the bundled\n FFmpeg, the worst of which may lead to the execution of arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4610", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04522", "scoring_system": "epss", "scoring_elements": "0.89171", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04522", "scoring_system": "epss", "scoring_elements": "0.89109", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04522", "scoring_system": "epss", "scoring_elements": "0.89117", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04522", "scoring_system": "epss", "scoring_elements": "0.89131", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04522", "scoring_system": "epss", "scoring_elements": "0.89134", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04522", "scoring_system": "epss", "scoring_elements": "0.89152", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04522", "scoring_system": "epss", "scoring_elements": "0.89157", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04522", "scoring_system": "epss", "scoring_elements": "0.89167", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04522", "scoring_system": "epss", "scoring_elements": "0.89163", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04522", "scoring_system": "epss", "scoring_elements": "0.8916", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04522", "scoring_system": "epss", "scoring_elements": "0.89173", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4610" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4610", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4610" }, { "reference_url": "http://secunia.com/advisories/34296", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34296" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2008/10/07/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2008/10/07/1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-734-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-734-1" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=407010", "reference_id": "407010", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=407010" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4610", "reference_id": "CVE-2008-4610", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4610" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/32856.txt", "reference_id": "CVE-2008-4610;OSVDB-49423", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/32856.txt" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/32857.txt", "reference_id": "CVE-2008-4610;OSVDB-49424", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/32857.txt" }, { "reference_url": "https://www.securityfocus.com/bid/34136/info", "reference_id": "CVE-2008-4610;OSVDB-49424", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/34136/info" }, { "reference_url": "https://security.gentoo.org/glsa/201310-13", "reference_id": "GLSA-201310-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-13" }, { "reference_url": "https://usn.ubuntu.com/734-1/", "reference_id": "USN-734-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/734-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035197?format=api", "purl": "pkg:deb/debian/mplayer@2:1.0~rc3%2B%2Bfinal.dfsg1-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4jd9-pt54-1bag" }, { "vulnerability": "VCID-8uk8-jxh7-k7aa" }, { "vulnerability": "VCID-9tg7-9r5m-dkgn" }, { "vulnerability": "VCID-9vx1-3zb9-5bf1" }, { "vulnerability": "VCID-e178-xa31-h3c4" }, { "vulnerability": "VCID-fjy3-bfzh-7beu" }, { "vulnerability": "VCID-g1k8-4mbb-fyew" }, { "vulnerability": "VCID-h9ks-v96k-wkf7" }, { "vulnerability": "VCID-m5db-wq6e-gqeu" }, { "vulnerability": "VCID-pfcp-7vj5-rqef" }, { "vulnerability": "VCID-tff5-wrpr-hbe1" }, { "vulnerability": "VCID-vnmz-rcby-n3gs" }, { "vulnerability": "VCID-xxgu-jjrs-pkaz" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.0~rc3%252B%252Bfinal.dfsg1-1" } ], "aliases": [ "CVE-2008-4610" ], "risk_score": 9.0, "exploitability": "2.0", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1228-m28x-bkbm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40187?format=api", "vulnerability_id": "VCID-1dp9-jbnu-abcm", "summary": "Multiple vulnerabilities in FFmpeg may lead to the remote execution of\n arbitrary code or a Denial of Service.", "references": [ { "reference_url": "http://archives.neohapsis.com/archives/fulldisclosure/2008-09/0103.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2008-09/0103.html" }, { "reference_url": "http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2008-August/016352.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2008-August/016352.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4867", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02422", "scoring_system": "epss", "scoring_elements": "0.85155", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02422", "scoring_system": "epss", "scoring_elements": "0.8506", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02422", "scoring_system": "epss", "scoring_elements": "0.85073", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02422", "scoring_system": "epss", "scoring_elements": "0.85091", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02422", "scoring_system": "epss", "scoring_elements": "0.85095", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02422", "scoring_system": "epss", "scoring_elements": "0.85116", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02422", "scoring_system": "epss", "scoring_elements": "0.85124", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02422", "scoring_system": "epss", "scoring_elements": "0.85138", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02422", "scoring_system": "epss", "scoring_elements": "0.85136", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02422", "scoring_system": "epss", "scoring_elements": "0.85132", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02422", "scoring_system": "epss", "scoring_elements": "0.85154", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02422", "scoring_system": "epss", "scoring_elements": "0.85157", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4867" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4867", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4867" }, { "reference_url": "http://secunia.com/advisories/34296", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34296" }, { "reference_url": "http://secunia.com/advisories/34385", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34385" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200903-33.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200903-33.xml" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46324", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46324" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:013", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:013" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:014", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:014" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:015", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:015" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2008/10/29/6", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2008/10/29/6" }, { "reference_url": "http://www.securityfocus.com/bid/33308", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/33308" }, { "reference_url": "http://www.ubuntu.com/usn/USN-734-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-734-1" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4867", "reference_id": "CVE-2008-4867", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4867" }, { "reference_url": "https://security.gentoo.org/glsa/200903-33", "reference_id": "GLSA-200903-33", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200903-33" }, { "reference_url": "https://usn.ubuntu.com/734-1/", "reference_id": "USN-734-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/734-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035196?format=api", "purl": "pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1228-m28x-bkbm" }, { "vulnerability": "VCID-4jd9-pt54-1bag" }, { "vulnerability": "VCID-8uk8-jxh7-k7aa" }, { "vulnerability": "VCID-9tg7-9r5m-dkgn" }, { "vulnerability": "VCID-9vx1-3zb9-5bf1" }, { "vulnerability": "VCID-e178-xa31-h3c4" }, { "vulnerability": "VCID-fjy3-bfzh-7beu" }, { "vulnerability": "VCID-fw24-pxsc-7bek" }, { "vulnerability": "VCID-g1k8-4mbb-fyew" }, { "vulnerability": "VCID-gxnr-jbzt-cffq" }, { "vulnerability": "VCID-h9ks-v96k-wkf7" }, { "vulnerability": "VCID-j7wp-941h-p3fc" }, { "vulnerability": "VCID-m5db-wq6e-gqeu" }, { "vulnerability": "VCID-pfcp-7vj5-rqef" }, { "vulnerability": "VCID-tff5-wrpr-hbe1" }, { "vulnerability": "VCID-tteq-u99e-ayg4" }, { "vulnerability": "VCID-vnmz-rcby-n3gs" }, { "vulnerability": "VCID-xxgu-jjrs-pkaz" }, { "vulnerability": "VCID-ybgy-yct3-6fba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-17%252Blenny3.2" } ], "aliases": [ "CVE-2008-4867" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1dp9-jbnu-abcm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58563?format=api", "vulnerability_id": "VCID-2ddg-c99t-9ye1", "summary": "Multiple vulnerabilities have been discovered in MPlayer, possibly allowing\n for the remote execution of arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0629", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02652", "scoring_system": "epss", "scoring_elements": "0.85688", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02652", "scoring_system": "epss", "scoring_elements": "0.85701", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02652", "scoring_system": "epss", "scoring_elements": "0.85719", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02652", "scoring_system": "epss", "scoring_elements": "0.85725", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02652", "scoring_system": "epss", "scoring_elements": "0.85744", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02652", "scoring_system": "epss", "scoring_elements": "0.85755", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02652", "scoring_system": "epss", "scoring_elements": "0.8577", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02652", "scoring_system": "epss", "scoring_elements": "0.85767", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02652", "scoring_system": "epss", "scoring_elements": "0.85763", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02652", "scoring_system": "epss", "scoring_elements": "0.85781", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02652", "scoring_system": "epss", "scoring_elements": "0.85786", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02652", "scoring_system": "epss", "scoring_elements": "0.8578", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0629" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464533", "reference_id": "464533", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464533" }, { "reference_url": "https://security.gentoo.org/glsa/200803-16", "reference_id": "GLSA-200803-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200803-16" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035196?format=api", "purl": "pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1228-m28x-bkbm" }, { "vulnerability": "VCID-4jd9-pt54-1bag" }, { "vulnerability": "VCID-8uk8-jxh7-k7aa" }, { "vulnerability": "VCID-9tg7-9r5m-dkgn" }, { "vulnerability": "VCID-9vx1-3zb9-5bf1" }, { "vulnerability": "VCID-e178-xa31-h3c4" }, { "vulnerability": "VCID-fjy3-bfzh-7beu" }, { "vulnerability": "VCID-fw24-pxsc-7bek" }, { "vulnerability": "VCID-g1k8-4mbb-fyew" }, { "vulnerability": "VCID-gxnr-jbzt-cffq" }, { "vulnerability": "VCID-h9ks-v96k-wkf7" }, { "vulnerability": "VCID-j7wp-941h-p3fc" }, { "vulnerability": "VCID-m5db-wq6e-gqeu" }, { "vulnerability": "VCID-pfcp-7vj5-rqef" }, { "vulnerability": "VCID-tff5-wrpr-hbe1" }, { "vulnerability": "VCID-tteq-u99e-ayg4" }, { "vulnerability": "VCID-vnmz-rcby-n3gs" }, { "vulnerability": "VCID-xxgu-jjrs-pkaz" }, { "vulnerability": "VCID-ybgy-yct3-6fba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-17%252Blenny3.2" } ], "aliases": [ "CVE-2008-0629" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2ddg-c99t-9ye1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46599?format=api", "vulnerability_id": "VCID-38xc-8rtk-qfes", "summary": "Multiple vulnerabilities have been discovered in MPlayer, possibly allowing\n for the remote execution of arbitrary code.", "references": [ { "reference_url": "http://lists.mplayerhq.hu/pipermail/mplayer-announce/2007-June/000066.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.mplayerhq.hu/pipermail/mplayer-announce/2007-June/000066.html" }, { "reference_url": "http://osvdb.org/36991", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/36991" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-2948", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.13236", "scoring_system": "epss", "scoring_elements": "0.94167", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.13236", "scoring_system": "epss", "scoring_elements": "0.94104", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.13236", "scoring_system": "epss", "scoring_elements": "0.94113", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.13236", "scoring_system": "epss", "scoring_elements": "0.94125", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.13236", "scoring_system": "epss", "scoring_elements": "0.94129", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.13236", "scoring_system": "epss", "scoring_elements": "0.94138", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.13236", "scoring_system": "epss", "scoring_elements": "0.94142", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.13236", "scoring_system": "epss", "scoring_elements": "0.94147", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.13236", "scoring_system": "epss", "scoring_elements": "0.94163", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.13236", "scoring_system": "epss", "scoring_elements": "0.94168", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-2948" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2948", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2948" }, { "reference_url": "http://secunia.com/advisories/24302", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24302" }, { "reference_url": "http://secunia.com/advisories/25713", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25713" }, { "reference_url": "http://secunia.com/advisories/25940", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25940" }, { "reference_url": "http://secunia.com/advisories/26083", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26083" }, { "reference_url": "http://secunia.com/advisories/26207", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26207" }, { "reference_url": "http://secunia.com/secunia_research/2007-55/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/secunia_research/2007-55/" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200707-07.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200707-07.xml" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34749", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34749" }, { "reference_url": "http://svn.mplayerhq.hu/mplayer/trunk/stream/stream_cddb.c?r1=23287&r2=23470&diff_format=u", "reference_id": "", "reference_type": "", "scores": [], "url": "http://svn.mplayerhq.hu/mplayer/trunk/stream/stream_cddb.c?r1=23287&r2=23470&diff_format=u" }, { "reference_url": "http://www.debian.org/security/2007/dsa-1313", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2007/dsa-1313" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:143", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:143" }, { "reference_url": "http://www.mplayerhq.hu/design7/news.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mplayerhq.hu/design7/news.html" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2007_14_sr.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2007_14_sr.html" }, { "reference_url": "http://www.securityfocus.com/bid/24339", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/24339" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/2080", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/2080" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_rc1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_rc1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_rc1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2948", "reference_id": "CVE-2007-2948", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2948" }, { "reference_url": "https://security.gentoo.org/glsa/200707-07", "reference_id": "GLSA-200707-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200707-07" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035196?format=api", "purl": "pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1228-m28x-bkbm" }, { "vulnerability": "VCID-4jd9-pt54-1bag" }, { "vulnerability": "VCID-8uk8-jxh7-k7aa" }, { "vulnerability": "VCID-9tg7-9r5m-dkgn" }, { "vulnerability": "VCID-9vx1-3zb9-5bf1" }, { "vulnerability": "VCID-e178-xa31-h3c4" }, { "vulnerability": "VCID-fjy3-bfzh-7beu" }, { "vulnerability": "VCID-fw24-pxsc-7bek" }, { "vulnerability": "VCID-g1k8-4mbb-fyew" }, { "vulnerability": "VCID-gxnr-jbzt-cffq" }, { "vulnerability": "VCID-h9ks-v96k-wkf7" }, { "vulnerability": "VCID-j7wp-941h-p3fc" }, { "vulnerability": "VCID-m5db-wq6e-gqeu" }, { "vulnerability": "VCID-pfcp-7vj5-rqef" }, { "vulnerability": "VCID-tff5-wrpr-hbe1" }, { "vulnerability": "VCID-tteq-u99e-ayg4" }, { "vulnerability": "VCID-vnmz-rcby-n3gs" }, { "vulnerability": "VCID-xxgu-jjrs-pkaz" }, { "vulnerability": "VCID-ybgy-yct3-6fba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-17%252Blenny3.2" } ], "aliases": [ "CVE-2007-2948" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-38xc-8rtk-qfes" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49465?format=api", "vulnerability_id": "VCID-4jd9-pt54-1bag", "summary": "Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38851", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18492", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18546", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18254", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18337", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.1839", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18342", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.1829", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18234", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18246", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18273", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38851" }, { "reference_url": "https://security.gentoo.org/glsa/202405-05", "reference_id": "GLSA-202405-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-05" }, { "reference_url": "https://usn.ubuntu.com/5895-1/", "reference_id": "USN-5895-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5895-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995157?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1" } ], "aliases": [ "CVE-2022-38851" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4jd9-pt54-1bag" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49473?format=api", "vulnerability_id": "VCID-8uk8-jxh7-k7aa", "summary": "Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38863", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19364", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19415", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19132", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19212", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19264", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.1927", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19224", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19169", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.1913", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19139", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19147", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38863" }, { "reference_url": "https://security.gentoo.org/glsa/202405-05", "reference_id": "GLSA-202405-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-05" }, { "reference_url": "https://usn.ubuntu.com/5895-1/", "reference_id": "USN-5895-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5895-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995157?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1" } ], "aliases": [ "CVE-2022-38863" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8uk8-jxh7-k7aa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49471?format=api", "vulnerability_id": "VCID-9tg7-9r5m-dkgn", "summary": "Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38861", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21284", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21337", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.2109", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.2117", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.2123", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21241", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21199", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21147", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.2114", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.2115", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21127", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38861" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021013", "reference_id": "1021013", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021013" }, { "reference_url": "https://security.gentoo.org/glsa/202405-05", "reference_id": "GLSA-202405-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-05" }, { "reference_url": "https://usn.ubuntu.com/5895-1/", "reference_id": "USN-5895-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5895-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995157?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1" } ], "aliases": [ "CVE-2022-38861" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9tg7-9r5m-dkgn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49476?format=api", "vulnerability_id": "VCID-9vx1-3zb9-5bf1", "summary": "Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38866", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20954", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.21012", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20729", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20807", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20868", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20883", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.2084", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20788", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20778", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.2077", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20756", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38866" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38866", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38866" }, { "reference_url": "https://security.gentoo.org/glsa/202405-05", "reference_id": "GLSA-202405-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-05" }, { "reference_url": "https://usn.ubuntu.com/5895-1/", "reference_id": "USN-5895-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5895-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995157?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1" } ], "aliases": [ "CVE-2022-38866" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9vx1-3zb9-5bf1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40197?format=api", "vulnerability_id": "VCID-bv1x-tr6m-qke1", "summary": "Multiple vulnerabilities in FFmpeg may lead to the remote execution of\n arbitrary code or a Denial of Service.", "references": [ { "reference_url": "http://archives.neohapsis.com/archives/fulldisclosure/2008-09/0103.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2008-09/0103.html" }, { "reference_url": "http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2008-August/016136.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2008-August/016136.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4868", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72668", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72577", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72584", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72601", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72616", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72628", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72651", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72634", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72624", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72666", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72676", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4868" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4868", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4868" }, { "reference_url": "http://secunia.com/advisories/34385", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34385" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200903-33.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200903-33.xml" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46325", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46325" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2008/10/29/6", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2008/10/29/6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4868", "reference_id": "CVE-2008-4868", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4868" }, { "reference_url": "https://security.gentoo.org/glsa/200903-33", "reference_id": "GLSA-200903-33", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200903-33" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035196?format=api", "purl": "pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1228-m28x-bkbm" }, { "vulnerability": "VCID-4jd9-pt54-1bag" }, { "vulnerability": "VCID-8uk8-jxh7-k7aa" }, { "vulnerability": "VCID-9tg7-9r5m-dkgn" }, { "vulnerability": "VCID-9vx1-3zb9-5bf1" }, { "vulnerability": "VCID-e178-xa31-h3c4" }, { "vulnerability": "VCID-fjy3-bfzh-7beu" }, { "vulnerability": "VCID-fw24-pxsc-7bek" }, { "vulnerability": "VCID-g1k8-4mbb-fyew" }, { "vulnerability": "VCID-gxnr-jbzt-cffq" }, { "vulnerability": "VCID-h9ks-v96k-wkf7" }, { "vulnerability": "VCID-j7wp-941h-p3fc" }, { "vulnerability": "VCID-m5db-wq6e-gqeu" }, { "vulnerability": "VCID-pfcp-7vj5-rqef" }, { "vulnerability": "VCID-tff5-wrpr-hbe1" }, { "vulnerability": "VCID-tteq-u99e-ayg4" }, { "vulnerability": "VCID-vnmz-rcby-n3gs" }, { "vulnerability": "VCID-xxgu-jjrs-pkaz" }, { "vulnerability": "VCID-ybgy-yct3-6fba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-17%252Blenny3.2" } ], "aliases": [ "CVE-2008-4868" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bv1x-tr6m-qke1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49464?format=api", "vulnerability_id": "VCID-e178-xa31-h3c4", "summary": "Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38850", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12332", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12379", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.1218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.1226", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.1231", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12318", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12282", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12245", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12134", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12136", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12246", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38850" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38850", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38850" }, { "reference_url": "https://security.gentoo.org/glsa/202405-05", "reference_id": "GLSA-202405-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-05" }, { "reference_url": "https://usn.ubuntu.com/5895-1/", "reference_id": "USN-5895-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5895-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995157?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1" } ], "aliases": [ "CVE-2022-38850" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e178-xa31-h3c4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34981?format=api", "vulnerability_id": "VCID-fjy3-bfzh-7beu", "summary": "Multiple vulnerabilities have been found in MPlayer and the bundled\n FFmpeg, the worst of which may lead to the execution of arbitrary code.", "references": [ { "reference_url": "http://git.mplayer2.org/mplayer2/commit/?id=27b88a09c5319deb62221b8cd0ecc14cd1136e4a", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.mplayer2.org/mplayer2/commit/?id=27b88a09c5319deb62221b8cd0ecc14cd1136e4a" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3625", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.68101", "scoring_system": "epss", "scoring_elements": "0.98603", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.68101", "scoring_system": "epss", "scoring_elements": "0.98582", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.68101", "scoring_system": "epss", "scoring_elements": "0.98584", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.68101", "scoring_system": "epss", "scoring_elements": "0.98587", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.68101", "scoring_system": "epss", "scoring_elements": "0.98589", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.68101", "scoring_system": "epss", "scoring_elements": "0.98591", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.68101", "scoring_system": "epss", "scoring_elements": "0.98592", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.68101", "scoring_system": "epss", "scoring_elements": "0.98595", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.68101", "scoring_system": "epss", "scoring_elements": "0.98597", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.68101", "scoring_system": "epss", "scoring_elements": "0.98602", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3625" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3625", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3625" }, { "reference_url": "http://secunia.com/advisories/55486", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/55486" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201310-13.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201310-13.xml" }, { "reference_url": "https://labs.mwrinfosecurity.com/system/assets/149/original/mwri_mplayer-sami-subtitles_2011-08-12.pdf", "reference_id": "", "reference_type": "", "scores": [], "url": "https://labs.mwrinfosecurity.com/system/assets/149/original/mwri_mplayer-sami-subtitles_2011-08-12.pdf" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2011/10/18/12", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2011/10/18/12" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=645987", "reference_id": "645987", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=645987" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer2:mplayer2:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer2:mplayer2:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer2:mplayer2:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ricardo_villalba:smplayer:0.6.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ricardo_villalba:smplayer:0.6.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ricardo_villalba:smplayer:0.6.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3625", "reference_id": "CVE-2011-3625", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3625" }, { "reference_url": "https://security.gentoo.org/glsa/201310-13", "reference_id": "GLSA-201310-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-13" }, { "reference_url": "http://labs.mwrinfosecurity.com/files/Advisories/mwri_mplayer-sami-subtitles_2011-08-12.pdf", "reference_id": "OSVDB-74604;CVE-2011-3625", "reference_type": "exploit", "scores": [], "url": "http://labs.mwrinfosecurity.com/files/Advisories/mwri_mplayer-sami-subtitles_2011-08-12.pdf" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/18954.rb", "reference_id": "OSVDB-74604;CVE-2011-3625", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/18954.rb" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035198?format=api", "purl": "pkg:deb/debian/mplayer@2:1.0~rc4.dfsg1%2Bsvn34540-1%2Bdeb7u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4jd9-pt54-1bag" }, { "vulnerability": "VCID-8uk8-jxh7-k7aa" }, { "vulnerability": "VCID-9tg7-9r5m-dkgn" }, { "vulnerability": "VCID-9vx1-3zb9-5bf1" }, { "vulnerability": "VCID-e178-xa31-h3c4" }, { "vulnerability": "VCID-g1k8-4mbb-fyew" }, { "vulnerability": "VCID-h9ks-v96k-wkf7" }, { "vulnerability": "VCID-m5db-wq6e-gqeu" }, { "vulnerability": "VCID-pfcp-7vj5-rqef" }, { "vulnerability": "VCID-tff5-wrpr-hbe1" }, { "vulnerability": "VCID-vnmz-rcby-n3gs" }, { "vulnerability": "VCID-xxgu-jjrs-pkaz" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.0~rc4.dfsg1%252Bsvn34540-1%252Bdeb7u1" } ], "aliases": [ "CVE-2011-3625" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fjy3-bfzh-7beu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60430?format=api", "vulnerability_id": "VCID-fw24-pxsc-7bek", "summary": "Multiple vulnerabilities in MPlayer may lead to the execution of arbitrary\n code or a Denial of Service.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5616", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.25394", "scoring_system": "epss", "scoring_elements": "0.96223", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.25394", "scoring_system": "epss", "scoring_elements": "0.96173", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.25394", "scoring_system": "epss", "scoring_elements": "0.9618", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.25394", "scoring_system": "epss", "scoring_elements": "0.96188", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.25394", "scoring_system": "epss", "scoring_elements": "0.96191", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.25394", "scoring_system": "epss", "scoring_elements": "0.96201", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.25394", "scoring_system": "epss", "scoring_elements": "0.96204", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.25394", "scoring_system": "epss", "scoring_elements": "0.96209", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.25394", "scoring_system": "epss", "scoring_elements": "0.96208", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.25394", "scoring_system": "epss", "scoring_elements": "0.9621", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.25394", "scoring_system": "epss", "scoring_elements": "0.96218", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5616" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5616", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5616" }, { "reference_url": "http://secunia.com/advisories/33136", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33136" }, { "reference_url": "http://secunia.com/advisories/34845", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34845" }, { "reference_url": "http://svn.mplayerhq.hu/mplayer/branches/1.0rc2/libmpdemux/demux_vqf.c?r1=24723&r2=28150&pathrev=28150", "reference_id": "", "reference_type": "", "scores": [], "url": "http://svn.mplayerhq.hu/mplayer/branches/1.0rc2/libmpdemux/demux_vqf.c?r1=24723&r2=28150&pathrev=28150" }, { "reference_url": "http://svn.mplayerhq.hu/mplayer/branches/1.0rc2/libmpdemux/demux_vqf.c?view=log&pathrev=28150#rev28150", "reference_id": "", "reference_type": "", "scores": [], "url": "http://svn.mplayerhq.hu/mplayer/branches/1.0rc2/libmpdemux/demux_vqf.c?view=log&pathrev=28150#rev28150" }, { "reference_url": "http://trapkit.de/advisories/TKADV2008-014.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://trapkit.de/advisories/TKADV2008-014.txt" }, { "reference_url": "http://www.debian.org/security/2009/dsa-1782", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2009/dsa-1782" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:013", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:013" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:014", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:014" }, { "reference_url": "http://www.securityfocus.com/archive/1/499214/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/499214/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/32822", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/32822" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=508803", "reference_id": "508803", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=508803" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5616", "reference_id": "CVE-2008-5616", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5616" }, { "reference_url": "https://security.gentoo.org/glsa/200901-07", "reference_id": "GLSA-200901-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200901-07" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035197?format=api", "purl": "pkg:deb/debian/mplayer@2:1.0~rc3%2B%2Bfinal.dfsg1-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4jd9-pt54-1bag" }, { "vulnerability": "VCID-8uk8-jxh7-k7aa" }, { "vulnerability": "VCID-9tg7-9r5m-dkgn" }, { "vulnerability": "VCID-9vx1-3zb9-5bf1" }, { "vulnerability": "VCID-e178-xa31-h3c4" }, { "vulnerability": "VCID-fjy3-bfzh-7beu" }, { "vulnerability": "VCID-g1k8-4mbb-fyew" }, { "vulnerability": "VCID-h9ks-v96k-wkf7" }, { "vulnerability": "VCID-m5db-wq6e-gqeu" }, { "vulnerability": "VCID-pfcp-7vj5-rqef" }, { "vulnerability": "VCID-tff5-wrpr-hbe1" }, { "vulnerability": "VCID-vnmz-rcby-n3gs" }, { "vulnerability": "VCID-xxgu-jjrs-pkaz" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.0~rc3%252B%252Bfinal.dfsg1-1" } ], "aliases": [ "CVE-2008-5616" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fw24-pxsc-7bek" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49475?format=api", "vulnerability_id": "VCID-g1k8-4mbb-fyew", "summary": "Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38865", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18492", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18546", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18254", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18337", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.1839", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18342", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.1829", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18234", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18246", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18273", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38865" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38865", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38865" }, { "reference_url": "https://security.gentoo.org/glsa/202405-05", "reference_id": "GLSA-202405-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-05" }, { "reference_url": "https://usn.ubuntu.com/5895-1/", "reference_id": "USN-5895-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5895-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995157?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1" } ], "aliases": [ "CVE-2022-38865" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g1k8-4mbb-fyew" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58564?format=api", "vulnerability_id": "VCID-gaa2-bekm-6bbt", "summary": "Multiple vulnerabilities have been discovered in MPlayer, possibly allowing\n for the remote execution of arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0630", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06989", "scoring_system": "epss", "scoring_elements": "0.9141", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06989", "scoring_system": "epss", "scoring_elements": "0.91416", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06989", "scoring_system": "epss", "scoring_elements": "0.91426", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06989", "scoring_system": "epss", "scoring_elements": "0.91434", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06989", "scoring_system": "epss", "scoring_elements": "0.91446", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06989", "scoring_system": "epss", "scoring_elements": "0.91452", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06989", "scoring_system": "epss", "scoring_elements": "0.91458", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.06989", "scoring_system": "epss", "scoring_elements": "0.91461", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06989", "scoring_system": "epss", "scoring_elements": "0.9146", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06989", "scoring_system": "epss", "scoring_elements": "0.91484", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.06989", "scoring_system": "epss", "scoring_elements": "0.91479", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0630" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0630", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0630" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464532", "reference_id": "464532", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464532" }, { "reference_url": "https://security.gentoo.org/glsa/200803-16", "reference_id": "GLSA-200803-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200803-16" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035196?format=api", "purl": "pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1228-m28x-bkbm" }, { "vulnerability": "VCID-4jd9-pt54-1bag" }, { "vulnerability": "VCID-8uk8-jxh7-k7aa" }, { "vulnerability": "VCID-9tg7-9r5m-dkgn" }, { "vulnerability": "VCID-9vx1-3zb9-5bf1" }, { "vulnerability": "VCID-e178-xa31-h3c4" }, { "vulnerability": "VCID-fjy3-bfzh-7beu" }, { "vulnerability": "VCID-fw24-pxsc-7bek" }, { "vulnerability": "VCID-g1k8-4mbb-fyew" }, { "vulnerability": "VCID-gxnr-jbzt-cffq" }, { "vulnerability": "VCID-h9ks-v96k-wkf7" }, { "vulnerability": "VCID-j7wp-941h-p3fc" }, { "vulnerability": "VCID-m5db-wq6e-gqeu" }, { "vulnerability": "VCID-pfcp-7vj5-rqef" }, { "vulnerability": "VCID-tff5-wrpr-hbe1" }, { "vulnerability": "VCID-tteq-u99e-ayg4" }, { "vulnerability": "VCID-vnmz-rcby-n3gs" }, { "vulnerability": "VCID-xxgu-jjrs-pkaz" }, { "vulnerability": "VCID-ybgy-yct3-6fba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-17%252Blenny3.2" } ], "aliases": [ "CVE-2008-0630" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gaa2-bekm-6bbt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60429?format=api", "vulnerability_id": "VCID-gxnr-jbzt-cffq", "summary": "Multiple vulnerabilities in MPlayer may lead to the execution of arbitrary\n code or a Denial of Service.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3827", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03588", "scoring_system": "epss", "scoring_elements": "0.87766", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03588", "scoring_system": "epss", "scoring_elements": "0.87699", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03588", "scoring_system": "epss", "scoring_elements": "0.8771", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03588", "scoring_system": "epss", "scoring_elements": "0.87721", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03588", "scoring_system": "epss", "scoring_elements": "0.87723", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03588", "scoring_system": "epss", "scoring_elements": "0.87745", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03588", "scoring_system": "epss", "scoring_elements": "0.87751", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03588", "scoring_system": "epss", "scoring_elements": "0.87761", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03588", "scoring_system": "epss", "scoring_elements": "0.87756", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03588", "scoring_system": "epss", "scoring_elements": "0.87754", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03588", "scoring_system": "epss", "scoring_elements": "0.87768", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03588", "scoring_system": "epss", "scoring_elements": "0.87767", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3827" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3827", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3827" }, { "reference_url": "http://secunia.com/advisories/32045", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32045" }, { "reference_url": "http://secunia.com/advisories/32153", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32153" }, { "reference_url": "http://securityreason.com/securityalert/4326", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securityreason.com/securityalert/4326" }, { "reference_url": "http://svn.mplayerhq.hu/mplayer/trunk/libmpdemux/demux_real.c?r1=27314&r2=27675", "reference_id": "", "reference_type": "", "scores": [], "url": "http://svn.mplayerhq.hu/mplayer/trunk/libmpdemux/demux_real.c?r1=27314&r2=27675" }, { "reference_url": "http://www.debian.org/security/2008/dsa-1644", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2008/dsa-1644" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:219", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:219" }, { "reference_url": "http://www.ocert.org/advisories/ocert-2008-013.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ocert.org/advisories/ocert-2008-013.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/496806/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/496806/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/31473", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/31473" }, { "reference_url": "http://www.securitytracker.com/id?1020952", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1020952" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/2703", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/2703" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=500683", "reference_id": "500683", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=500683" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_rc1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_rc1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_rc1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3827", "reference_id": "CVE-2008-3827", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3827" }, { "reference_url": "https://security.gentoo.org/glsa/200901-07", "reference_id": "GLSA-200901-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200901-07" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035197?format=api", "purl": "pkg:deb/debian/mplayer@2:1.0~rc3%2B%2Bfinal.dfsg1-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4jd9-pt54-1bag" }, { "vulnerability": "VCID-8uk8-jxh7-k7aa" }, { "vulnerability": "VCID-9tg7-9r5m-dkgn" }, { "vulnerability": "VCID-9vx1-3zb9-5bf1" }, { "vulnerability": "VCID-e178-xa31-h3c4" }, { "vulnerability": "VCID-fjy3-bfzh-7beu" }, { "vulnerability": "VCID-g1k8-4mbb-fyew" }, { "vulnerability": "VCID-h9ks-v96k-wkf7" }, { "vulnerability": "VCID-m5db-wq6e-gqeu" }, { "vulnerability": "VCID-pfcp-7vj5-rqef" }, { "vulnerability": "VCID-tff5-wrpr-hbe1" }, { "vulnerability": "VCID-vnmz-rcby-n3gs" }, { "vulnerability": "VCID-xxgu-jjrs-pkaz" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.0~rc3%252B%252Bfinal.dfsg1-1" } ], "aliases": [ "CVE-2008-3827" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gxnr-jbzt-cffq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55943?format=api", "vulnerability_id": "VCID-h9ks-v96k-wkf7", "summary": "security update", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6933", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03355", "scoring_system": "epss", "scoring_elements": "0.87278", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03355", "scoring_system": "epss", "scoring_elements": "0.87288", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03355", "scoring_system": "epss", "scoring_elements": "0.87304", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03355", "scoring_system": "epss", "scoring_elements": "0.87303", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03355", "scoring_system": "epss", "scoring_elements": "0.87322", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03355", "scoring_system": "epss", "scoring_elements": "0.87329", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03355", "scoring_system": "epss", "scoring_elements": "0.87342", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03355", "scoring_system": "epss", "scoring_elements": "0.87336", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03355", "scoring_system": "epss", "scoring_elements": "0.87332", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03355", "scoring_system": "epss", "scoring_elements": "0.87346", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03355", "scoring_system": "epss", "scoring_elements": "0.8735", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03355", "scoring_system": "epss", "scoring_elements": "0.87344", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6933" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6933", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6933" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035198?format=api", "purl": "pkg:deb/debian/mplayer@2:1.0~rc4.dfsg1%2Bsvn34540-1%2Bdeb7u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4jd9-pt54-1bag" }, { "vulnerability": "VCID-8uk8-jxh7-k7aa" }, { "vulnerability": "VCID-9tg7-9r5m-dkgn" }, { "vulnerability": "VCID-9vx1-3zb9-5bf1" }, { "vulnerability": "VCID-e178-xa31-h3c4" }, { "vulnerability": "VCID-g1k8-4mbb-fyew" }, { "vulnerability": "VCID-h9ks-v96k-wkf7" }, { "vulnerability": "VCID-m5db-wq6e-gqeu" }, { "vulnerability": "VCID-pfcp-7vj5-rqef" }, { "vulnerability": "VCID-tff5-wrpr-hbe1" }, { "vulnerability": "VCID-vnmz-rcby-n3gs" }, { "vulnerability": "VCID-xxgu-jjrs-pkaz" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.0~rc4.dfsg1%252Bsvn34540-1%252Bdeb7u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1049111?format=api", "purl": "pkg:deb/debian/mplayer@2:1.3.0-6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4jd9-pt54-1bag" }, { "vulnerability": "VCID-8uk8-jxh7-k7aa" }, { "vulnerability": "VCID-9tg7-9r5m-dkgn" }, { "vulnerability": "VCID-9vx1-3zb9-5bf1" }, { "vulnerability": "VCID-e178-xa31-h3c4" }, { "vulnerability": "VCID-g1k8-4mbb-fyew" }, { "vulnerability": "VCID-m5db-wq6e-gqeu" }, { "vulnerability": "VCID-pfcp-7vj5-rqef" }, { "vulnerability": "VCID-tff5-wrpr-hbe1" }, { "vulnerability": "VCID-vnmz-rcby-n3gs" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.3.0-6" } ], "aliases": [ "CVE-2013-6933" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h9ks-v96k-wkf7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58562?format=api", "vulnerability_id": "VCID-hujx-y363-e3cg", "summary": "Multiple vulnerabilities have been discovered in MPlayer, possibly allowing\n for the remote execution of arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0485", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.16295", "scoring_system": "epss", "scoring_elements": "0.94796", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.16295", "scoring_system": "epss", "scoring_elements": "0.94806", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.16295", "scoring_system": "epss", "scoring_elements": "0.94809", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.16295", "scoring_system": "epss", "scoring_elements": "0.94811", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.16295", "scoring_system": "epss", "scoring_elements": "0.94821", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.16295", "scoring_system": "epss", "scoring_elements": "0.94825", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.16295", "scoring_system": "epss", "scoring_elements": "0.94829", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.16295", "scoring_system": "epss", "scoring_elements": "0.94832", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.16295", "scoring_system": "epss", "scoring_elements": "0.94834", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.16295", "scoring_system": "epss", "scoring_elements": "0.9484", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.16295", "scoring_system": "epss", "scoring_elements": "0.94844", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.16295", "scoring_system": "epss", "scoring_elements": "0.94847", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0485" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464060", "reference_id": "464060", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464060" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/31076.py", "reference_id": "CVE-2008-0485;OSVDB-42201", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/31076.py" }, { "reference_url": "https://www.securityfocus.com/bid/27499/info", "reference_id": "CVE-2008-0485;OSVDB-42201", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/27499/info" }, { "reference_url": "https://security.gentoo.org/glsa/200803-16", "reference_id": "GLSA-200803-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200803-16" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035196?format=api", "purl": "pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1228-m28x-bkbm" }, { "vulnerability": "VCID-4jd9-pt54-1bag" }, { "vulnerability": "VCID-8uk8-jxh7-k7aa" }, { "vulnerability": "VCID-9tg7-9r5m-dkgn" }, { "vulnerability": "VCID-9vx1-3zb9-5bf1" }, { "vulnerability": "VCID-e178-xa31-h3c4" }, { "vulnerability": "VCID-fjy3-bfzh-7beu" }, { "vulnerability": "VCID-fw24-pxsc-7bek" }, { "vulnerability": "VCID-g1k8-4mbb-fyew" }, { "vulnerability": "VCID-gxnr-jbzt-cffq" }, { "vulnerability": "VCID-h9ks-v96k-wkf7" }, { "vulnerability": "VCID-j7wp-941h-p3fc" }, { "vulnerability": "VCID-m5db-wq6e-gqeu" }, { "vulnerability": "VCID-pfcp-7vj5-rqef" }, { "vulnerability": "VCID-tff5-wrpr-hbe1" }, { "vulnerability": "VCID-tteq-u99e-ayg4" }, { "vulnerability": "VCID-vnmz-rcby-n3gs" }, { "vulnerability": "VCID-xxgu-jjrs-pkaz" }, { "vulnerability": "VCID-ybgy-yct3-6fba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-17%252Blenny3.2" } ], "aliases": [ "CVE-2008-0485" ], "risk_score": 0.2, "exploitability": "2.0", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hujx-y363-e3cg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46257?format=api", "vulnerability_id": "VCID-j7wp-941h-p3fc", "summary": "Multiple vulnerabilities in xine-lib might result in the remote execution\n of arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5244", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00435", "scoring_system": "epss", "scoring_elements": "0.62955", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00435", "scoring_system": "epss", "scoring_elements": "0.62825", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00435", "scoring_system": "epss", "scoring_elements": "0.62883", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00435", "scoring_system": "epss", "scoring_elements": "0.62913", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00435", "scoring_system": "epss", "scoring_elements": "0.62876", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00435", "scoring_system": "epss", "scoring_elements": "0.62927", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00435", "scoring_system": "epss", "scoring_elements": "0.62943", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00435", "scoring_system": "epss", "scoring_elements": "0.62962", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00435", "scoring_system": "epss", "scoring_elements": "0.6295", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00435", "scoring_system": "epss", "scoring_elements": "0.62928", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00435", "scoring_system": "epss", "scoring_elements": "0.62968", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00435", "scoring_system": "epss", "scoring_elements": "0.62976", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5244" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5244", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5244" }, { "reference_url": "http://securitytracker.com/id?1020703", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1020703" }, { "reference_url": "http://sourceforge.net/project/shownotes.php?release_id=619869", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceforge.net/project/shownotes.php?release_id=619869" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=407010", "reference_id": "407010", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=407010" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5244", "reference_id": "CVE-2008-5244", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5244" }, { "reference_url": "https://security.gentoo.org/glsa/201006-04", "reference_id": "GLSA-201006-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201006-04" }, { "reference_url": "https://usn.ubuntu.com/710-1/", "reference_id": "USN-710-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/710-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035197?format=api", "purl": "pkg:deb/debian/mplayer@2:1.0~rc3%2B%2Bfinal.dfsg1-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4jd9-pt54-1bag" }, { "vulnerability": "VCID-8uk8-jxh7-k7aa" }, { "vulnerability": "VCID-9tg7-9r5m-dkgn" }, { "vulnerability": "VCID-9vx1-3zb9-5bf1" }, { "vulnerability": "VCID-e178-xa31-h3c4" }, { "vulnerability": "VCID-fjy3-bfzh-7beu" }, { "vulnerability": "VCID-g1k8-4mbb-fyew" }, { "vulnerability": "VCID-h9ks-v96k-wkf7" }, { "vulnerability": "VCID-m5db-wq6e-gqeu" }, { "vulnerability": "VCID-pfcp-7vj5-rqef" }, { "vulnerability": "VCID-tff5-wrpr-hbe1" }, { "vulnerability": "VCID-vnmz-rcby-n3gs" }, { "vulnerability": "VCID-xxgu-jjrs-pkaz" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.0~rc3%252B%252Bfinal.dfsg1-1" } ], "aliases": [ "CVE-2008-5244" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j7wp-941h-p3fc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49467?format=api", "vulnerability_id": "VCID-m5db-wq6e-gqeu", "summary": "Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38855", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19364", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19415", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19132", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19212", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19264", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.1927", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19224", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19169", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.1913", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19139", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19147", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38855" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38855", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38855" }, { "reference_url": "https://security.gentoo.org/glsa/202405-05", "reference_id": "GLSA-202405-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-05" }, { "reference_url": "https://usn.ubuntu.com/5895-1/", "reference_id": "USN-5895-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5895-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995157?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1" } ], "aliases": [ "CVE-2022-38855" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m5db-wq6e-gqeu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47797?format=api", "vulnerability_id": "VCID-pbr8-afjj-pbdq", "summary": "Two vulnerabilities have been discovered in MPlayer, each one could lead to\n the execution of arbitrary code.", "references": [ { "reference_url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414072", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414072" }, { "reference_url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414072%3Bmsg=12%3Bfilename=DS_VideoDecoder.c---SVN--22205.patch%3Batt=1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414072%3Bmsg=12%3Bfilename=DS_VideoDecoder.c---SVN--22205.patch%3Batt=1" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-1387", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05109", "scoring_system": "epss", "scoring_elements": "0.8985", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05109", "scoring_system": "epss", "scoring_elements": "0.898", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05109", "scoring_system": "epss", "scoring_elements": "0.89803", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05109", "scoring_system": "epss", "scoring_elements": "0.89817", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05109", "scoring_system": "epss", "scoring_elements": "0.89821", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05109", "scoring_system": "epss", "scoring_elements": "0.89839", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05109", "scoring_system": "epss", "scoring_elements": "0.89845", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05109", "scoring_system": "epss", "scoring_elements": "0.89851", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05109", "scoring_system": "epss", "scoring_elements": "0.89849", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05109", "scoring_system": "epss", "scoring_elements": "0.89842", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05109", "scoring_system": "epss", "scoring_elements": "0.89856", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05109", "scoring_system": "epss", "scoring_elements": "0.89857", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-1387" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1387", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1387" }, { "reference_url": "http://secunia.com/advisories/24443", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24443" }, { "reference_url": "http://secunia.com/advisories/24444", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24444" }, { "reference_url": "http://secunia.com/advisories/24462", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24462" }, { "reference_url": "http://secunia.com/advisories/25462", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25462" }, { "reference_url": "http://secunia.com/advisories/29601", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/29601" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200705-21.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200705-21.xml" }, { "reference_url": "http://www.debian.org/security/2008/dsa-1536", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2008/dsa-1536" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:061", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:061" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:062", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:062" }, { "reference_url": "http://www.securityfocus.com/bid/22933", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/22933" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414075", "reference_id": "414075", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414075" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1387", "reference_id": "CVE-2007-1387", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:M/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1387" }, { "reference_url": "https://security.gentoo.org/glsa/200705-21", "reference_id": "GLSA-200705-21", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200705-21" }, { "reference_url": "https://usn.ubuntu.com/435-1/", "reference_id": "USN-435-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/435-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035196?format=api", "purl": "pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1228-m28x-bkbm" }, { "vulnerability": "VCID-4jd9-pt54-1bag" }, { "vulnerability": "VCID-8uk8-jxh7-k7aa" }, { "vulnerability": "VCID-9tg7-9r5m-dkgn" }, { "vulnerability": "VCID-9vx1-3zb9-5bf1" }, { "vulnerability": "VCID-e178-xa31-h3c4" }, { "vulnerability": "VCID-fjy3-bfzh-7beu" }, { "vulnerability": "VCID-fw24-pxsc-7bek" }, { "vulnerability": "VCID-g1k8-4mbb-fyew" }, { "vulnerability": "VCID-gxnr-jbzt-cffq" }, { "vulnerability": "VCID-h9ks-v96k-wkf7" }, { "vulnerability": "VCID-j7wp-941h-p3fc" }, { "vulnerability": "VCID-m5db-wq6e-gqeu" }, { "vulnerability": "VCID-pfcp-7vj5-rqef" }, { "vulnerability": "VCID-tff5-wrpr-hbe1" }, { "vulnerability": "VCID-tteq-u99e-ayg4" }, { "vulnerability": "VCID-vnmz-rcby-n3gs" }, { "vulnerability": "VCID-xxgu-jjrs-pkaz" }, { "vulnerability": "VCID-ybgy-yct3-6fba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-17%252Blenny3.2" } ], "aliases": [ "CVE-2007-1387" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pbr8-afjj-pbdq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31750?format=api", "vulnerability_id": "VCID-pbz2-w6vz-cqhx", "summary": "An integer overflow vulnerability in MPlayer may allow for the execution of\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1558", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.21937", "scoring_system": "epss", "scoring_elements": "0.95731", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.21937", "scoring_system": "epss", "scoring_elements": "0.9574", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.21937", "scoring_system": "epss", "scoring_elements": "0.95748", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.21937", "scoring_system": "epss", "scoring_elements": "0.95751", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.21937", "scoring_system": "epss", "scoring_elements": "0.95759", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.21937", "scoring_system": "epss", "scoring_elements": "0.95763", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.21937", "scoring_system": "epss", "scoring_elements": "0.95766", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.21937", "scoring_system": "epss", "scoring_elements": "0.95767", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.21937", "scoring_system": "epss", "scoring_elements": "0.95777", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.21937", "scoring_system": "epss", "scoring_elements": "0.95781", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.21937", "scoring_system": "epss", "scoring_elements": "0.95783", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1558" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1558", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1558" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=473056", "reference_id": "473056", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=473056" }, { "reference_url": "https://security.gentoo.org/glsa/200805-22", "reference_id": "GLSA-200805-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200805-22" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/5307.pl", "reference_id": "OSVDB-43740;CVE-2008-1558", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/5307.pl" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035196?format=api", "purl": "pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1228-m28x-bkbm" }, { "vulnerability": "VCID-4jd9-pt54-1bag" }, { "vulnerability": "VCID-8uk8-jxh7-k7aa" }, { "vulnerability": "VCID-9tg7-9r5m-dkgn" }, { "vulnerability": "VCID-9vx1-3zb9-5bf1" }, { "vulnerability": "VCID-e178-xa31-h3c4" }, { "vulnerability": "VCID-fjy3-bfzh-7beu" }, { "vulnerability": "VCID-fw24-pxsc-7bek" }, { "vulnerability": "VCID-g1k8-4mbb-fyew" }, { "vulnerability": "VCID-gxnr-jbzt-cffq" }, { "vulnerability": "VCID-h9ks-v96k-wkf7" }, { "vulnerability": "VCID-j7wp-941h-p3fc" }, { "vulnerability": "VCID-m5db-wq6e-gqeu" }, { "vulnerability": "VCID-pfcp-7vj5-rqef" }, { "vulnerability": "VCID-tff5-wrpr-hbe1" }, { "vulnerability": "VCID-tteq-u99e-ayg4" }, { "vulnerability": "VCID-vnmz-rcby-n3gs" }, { "vulnerability": "VCID-xxgu-jjrs-pkaz" }, { "vulnerability": "VCID-ybgy-yct3-6fba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-17%252Blenny3.2" } ], "aliases": [ "CVE-2008-1558" ], "risk_score": 0.4, "exploitability": "2.0", "weighted_severity": "0.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pbz2-w6vz-cqhx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49474?format=api", "vulnerability_id": "VCID-pfcp-7vj5-rqef", "summary": "Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38864", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19364", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19415", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19132", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19212", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19264", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.1927", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19224", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19169", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.1913", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19139", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19147", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38864" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38864", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38864" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021013", "reference_id": "1021013", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021013" }, { "reference_url": "https://security.gentoo.org/glsa/202405-05", "reference_id": "GLSA-202405-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-05" }, { "reference_url": "https://usn.ubuntu.com/5895-1/", "reference_id": "USN-5895-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5895-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995157?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1" } ], "aliases": [ "CVE-2022-38864" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pfcp-7vj5-rqef" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91766?format=api", "vulnerability_id": "VCID-pxrz-2835-dfhm", "summary": "Heap-based buffer overflow in libmpdemux/aviheader.c in MPlayer 1.0rc1 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a .avi file with certain large \"indx truck size\" and nEntriesInuse values, and a certain wLongsPerEntry value.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4938", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.09968", "scoring_system": "epss", "scoring_elements": "0.93011", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.09968", "scoring_system": "epss", "scoring_elements": "0.9302", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.09968", "scoring_system": "epss", "scoring_elements": "0.93024", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.09968", "scoring_system": "epss", "scoring_elements": "0.93023", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.09968", "scoring_system": "epss", "scoring_elements": "0.93031", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.09968", "scoring_system": "epss", "scoring_elements": "0.93036", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.09968", "scoring_system": "epss", "scoring_elements": "0.93041", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.09968", "scoring_system": "epss", "scoring_elements": "0.93038", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.09968", "scoring_system": "epss", "scoring_elements": "0.9304", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.09968", "scoring_system": "epss", "scoring_elements": "0.9305", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.09968", "scoring_system": "epss", "scoring_elements": "0.93053", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.09968", "scoring_system": "epss", "scoring_elements": "0.9306", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4938" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4938", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4938" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=443478", "reference_id": "443478", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=443478" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/30578.txt", "reference_id": "CVE-2007-4938;OSVDB-45940", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/30578.txt" }, { "reference_url": "https://www.securityfocus.com/bid/25648/info", "reference_id": "CVE-2007-4938;OSVDB-45940", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/25648/info" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035196?format=api", "purl": "pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1228-m28x-bkbm" }, { "vulnerability": "VCID-4jd9-pt54-1bag" }, { "vulnerability": "VCID-8uk8-jxh7-k7aa" }, { "vulnerability": "VCID-9tg7-9r5m-dkgn" }, { "vulnerability": "VCID-9vx1-3zb9-5bf1" }, { "vulnerability": "VCID-e178-xa31-h3c4" }, { "vulnerability": "VCID-fjy3-bfzh-7beu" }, { "vulnerability": "VCID-fw24-pxsc-7bek" }, { "vulnerability": "VCID-g1k8-4mbb-fyew" }, { "vulnerability": "VCID-gxnr-jbzt-cffq" }, { "vulnerability": "VCID-h9ks-v96k-wkf7" }, { "vulnerability": "VCID-j7wp-941h-p3fc" }, { "vulnerability": "VCID-m5db-wq6e-gqeu" }, { "vulnerability": "VCID-pfcp-7vj5-rqef" }, { "vulnerability": "VCID-tff5-wrpr-hbe1" }, { "vulnerability": "VCID-tteq-u99e-ayg4" }, { "vulnerability": "VCID-vnmz-rcby-n3gs" }, { "vulnerability": "VCID-xxgu-jjrs-pkaz" }, { "vulnerability": "VCID-ybgy-yct3-6fba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-17%252Blenny3.2" } ], "aliases": [ "CVE-2007-4938" ], "risk_score": 0.2, "exploitability": "2.0", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pxrz-2835-dfhm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31094?format=api", "vulnerability_id": "VCID-q7u2-mhac-r7fp", "summary": "xine-lib is vulnerable to multiple buffer overflows when processing FLAC\n and ASF streams.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0486.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0486.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0486", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0457", "scoring_system": "epss", "scoring_elements": "0.89158", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0457", "scoring_system": "epss", "scoring_elements": "0.89165", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0457", "scoring_system": "epss", "scoring_elements": "0.8918", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0457", "scoring_system": "epss", "scoring_elements": "0.89182", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0457", "scoring_system": "epss", "scoring_elements": "0.892", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0457", "scoring_system": "epss", "scoring_elements": "0.89205", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0457", "scoring_system": "epss", "scoring_elements": "0.89215", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0457", "scoring_system": "epss", "scoring_elements": "0.89211", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0457", "scoring_system": "epss", "scoring_elements": "0.89209", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0457", "scoring_system": "epss", "scoring_elements": "0.89221", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0457", "scoring_system": "epss", "scoring_elements": "0.89217", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0486" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0486", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0486" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=431541", "reference_id": "431541", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431541" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464060", "reference_id": "464060", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464060" }, { "reference_url": "https://security.gentoo.org/glsa/200802-12", "reference_id": "GLSA-200802-12", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200802-12" }, { "reference_url": "https://security.gentoo.org/glsa/200803-16", "reference_id": "GLSA-200803-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200803-16" }, { "reference_url": "https://usn.ubuntu.com/635-1/", "reference_id": "USN-635-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/635-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035196?format=api", "purl": "pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1228-m28x-bkbm" }, { "vulnerability": "VCID-4jd9-pt54-1bag" }, { "vulnerability": "VCID-8uk8-jxh7-k7aa" }, { "vulnerability": "VCID-9tg7-9r5m-dkgn" }, { "vulnerability": "VCID-9vx1-3zb9-5bf1" }, { "vulnerability": "VCID-e178-xa31-h3c4" }, { "vulnerability": "VCID-fjy3-bfzh-7beu" }, { "vulnerability": "VCID-fw24-pxsc-7bek" }, { "vulnerability": "VCID-g1k8-4mbb-fyew" }, { "vulnerability": "VCID-gxnr-jbzt-cffq" }, { "vulnerability": "VCID-h9ks-v96k-wkf7" }, { "vulnerability": "VCID-j7wp-941h-p3fc" }, { "vulnerability": "VCID-m5db-wq6e-gqeu" }, { "vulnerability": "VCID-pfcp-7vj5-rqef" }, { "vulnerability": "VCID-tff5-wrpr-hbe1" }, { "vulnerability": "VCID-tteq-u99e-ayg4" }, { "vulnerability": "VCID-vnmz-rcby-n3gs" }, { "vulnerability": "VCID-xxgu-jjrs-pkaz" }, { "vulnerability": "VCID-ybgy-yct3-6fba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-17%252Blenny3.2" } ], "aliases": [ "CVE-2008-0486" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q7u2-mhac-r7fp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40177?format=api", "vulnerability_id": "VCID-r4rz-8ey9-fqb4", "summary": "Multiple vulnerabilities in FFmpeg may lead to the remote execution of\n arbitrary code or a Denial of Service.", "references": [ { "reference_url": "http://archives.neohapsis.com/archives/fulldisclosure/2008-09/0103.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2008-09/0103.html" }, { "reference_url": "http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2008-August/016011.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2008-August/016011.html" }, { "reference_url": "http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2008-August/016012.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2008-August/016012.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4866", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05735", "scoring_system": "epss", "scoring_elements": "0.90457", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05735", "scoring_system": "epss", "scoring_elements": "0.90404", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05735", "scoring_system": "epss", "scoring_elements": "0.90408", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05735", "scoring_system": "epss", "scoring_elements": "0.9042", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05735", "scoring_system": "epss", "scoring_elements": "0.90424", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05735", "scoring_system": "epss", "scoring_elements": "0.90438", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05735", "scoring_system": "epss", "scoring_elements": "0.90444", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05735", "scoring_system": "epss", "scoring_elements": "0.90452", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05735", "scoring_system": "epss", "scoring_elements": "0.9046", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05735", "scoring_system": "epss", "scoring_elements": "0.90459", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4866" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4866", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4866" }, { "reference_url": "http://secunia.com/advisories/34296", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34296" }, { "reference_url": "http://secunia.com/advisories/34385", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34385" }, { "reference_url": "http://secunia.com/advisories/34845", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34845" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200903-33.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200903-33.xml" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46322" }, { "reference_url": "http://www.debian.org/security/2009/dsa-1782", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2009/dsa-1782" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:013", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:013" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:015", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:015" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2008/10/29/6", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2008/10/29/6" }, { "reference_url": "http://www.securityfocus.com/bid/33308", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/33308" }, { "reference_url": "http://www.ubuntu.com/usn/USN-734-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-734-1" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4866", "reference_id": "CVE-2008-4866", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4866" }, { "reference_url": "https://security.gentoo.org/glsa/200903-33", "reference_id": "GLSA-200903-33", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200903-33" }, { "reference_url": "https://usn.ubuntu.com/734-1/", "reference_id": "USN-734-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/734-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035196?format=api", "purl": "pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1228-m28x-bkbm" }, { "vulnerability": "VCID-4jd9-pt54-1bag" }, { "vulnerability": "VCID-8uk8-jxh7-k7aa" }, { "vulnerability": "VCID-9tg7-9r5m-dkgn" }, { "vulnerability": "VCID-9vx1-3zb9-5bf1" }, { "vulnerability": "VCID-e178-xa31-h3c4" }, { "vulnerability": "VCID-fjy3-bfzh-7beu" }, { "vulnerability": "VCID-fw24-pxsc-7bek" }, { "vulnerability": "VCID-g1k8-4mbb-fyew" }, { "vulnerability": "VCID-gxnr-jbzt-cffq" }, { "vulnerability": "VCID-h9ks-v96k-wkf7" }, { "vulnerability": "VCID-j7wp-941h-p3fc" }, { "vulnerability": "VCID-m5db-wq6e-gqeu" }, { "vulnerability": "VCID-pfcp-7vj5-rqef" }, { "vulnerability": "VCID-tff5-wrpr-hbe1" }, { "vulnerability": "VCID-tteq-u99e-ayg4" }, { "vulnerability": "VCID-vnmz-rcby-n3gs" }, { "vulnerability": "VCID-xxgu-jjrs-pkaz" }, { "vulnerability": "VCID-ybgy-yct3-6fba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-17%252Blenny3.2" } ], "aliases": [ "CVE-2008-4866" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r4rz-8ey9-fqb4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40217?format=api", "vulnerability_id": "VCID-sgm1-d98g-nff9", "summary": "Multiple vulnerabilities in FFmpeg may lead to the remote execution of\n arbitrary code or a Denial of Service.", "references": [ { "reference_url": "http://git.ffmpeg.org/?p=ffmpeg%3Ba=commitdiff%3Bh=72e715fb798f2cb79fd24a6d2eaeafb7c6eeda17", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.ffmpeg.org/?p=ffmpeg%3Ba=commitdiff%3Bh=72e715fb798f2cb79fd24a6d2eaeafb7c6eeda17" }, { "reference_url": "http://osvdb.org/51643", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/51643" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0385", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.11552", "scoring_system": "epss", "scoring_elements": "0.9366", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.11552", "scoring_system": "epss", "scoring_elements": "0.93594", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.11552", "scoring_system": "epss", "scoring_elements": "0.93603", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.11552", "scoring_system": "epss", "scoring_elements": "0.93612", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.11552", "scoring_system": "epss", "scoring_elements": "0.93614", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.11552", "scoring_system": "epss", "scoring_elements": "0.93623", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.11552", "scoring_system": "epss", "scoring_elements": "0.93625", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.11552", "scoring_system": "epss", "scoring_elements": "0.9363", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.11552", "scoring_system": "epss", "scoring_elements": "0.93631", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.11552", "scoring_system": "epss", "scoring_elements": "0.93649", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.11552", "scoring_system": "epss", "scoring_elements": "0.93656", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0385" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0385", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0385" }, { "reference_url": "http://secunia.com/advisories/33711", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33711" }, { "reference_url": "http://secunia.com/advisories/34296", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34296" }, { "reference_url": "http://secunia.com/advisories/34385", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34385" }, { "reference_url": "http://secunia.com/advisories/34712", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34712" }, { "reference_url": "http://secunia.com/advisories/34845", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34845" }, { "reference_url": "http://secunia.com/advisories/34905", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34905" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200903-33.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200903-33.xml" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48330", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48330" }, { "reference_url": "http://svn.mplayerhq.hu/ffmpeg/trunk/libavformat/4xm.c?r1=16838&r2=16846&pathrev=16846", "reference_id": "", "reference_type": "", "scores": [], "url": "http://svn.mplayerhq.hu/ffmpeg/trunk/libavformat/4xm.c?r1=16838&r2=16846&pathrev=16846" }, { "reference_url": "http://svn.mplayerhq.hu/ffmpeg?view=rev&revision=16846", "reference_id": "", "reference_type": "", "scores": [], "url": "http://svn.mplayerhq.hu/ffmpeg?view=rev&revision=16846" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00210.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00210.html" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00215.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00215.html" }, { "reference_url": "http://www.debian.org/security/2009/dsa-1781", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2009/dsa-1781" }, { "reference_url": "http://www.debian.org/security/2009/dsa-1782", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2009/dsa-1782" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:297", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:297" }, { "reference_url": "http://www.securityfocus.com/archive/1/500514/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/500514/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/33502", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/33502" }, { "reference_url": "http://www.trapkit.de/advisories/TKADV2009-004.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trapkit.de/advisories/TKADV2009-004.txt" }, { "reference_url": "http://www.ubuntu.com/usn/USN-734-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-734-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2009/0277", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2009/0277" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524805", "reference_id": "524805", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524805" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0385", "reference_id": "CVE-2009-0385", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0385" }, { "reference_url": "https://security.gentoo.org/glsa/200903-33", "reference_id": "GLSA-200903-33", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200903-33" }, { "reference_url": "https://usn.ubuntu.com/734-1/", "reference_id": "USN-734-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/734-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035196?format=api", "purl": "pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1228-m28x-bkbm" }, { "vulnerability": "VCID-4jd9-pt54-1bag" }, { "vulnerability": "VCID-8uk8-jxh7-k7aa" }, { "vulnerability": "VCID-9tg7-9r5m-dkgn" }, { "vulnerability": "VCID-9vx1-3zb9-5bf1" }, { "vulnerability": "VCID-e178-xa31-h3c4" }, { "vulnerability": "VCID-fjy3-bfzh-7beu" }, { "vulnerability": "VCID-fw24-pxsc-7bek" }, { "vulnerability": "VCID-g1k8-4mbb-fyew" }, { "vulnerability": "VCID-gxnr-jbzt-cffq" }, { "vulnerability": "VCID-h9ks-v96k-wkf7" }, { "vulnerability": "VCID-j7wp-941h-p3fc" }, { "vulnerability": "VCID-m5db-wq6e-gqeu" }, { "vulnerability": "VCID-pfcp-7vj5-rqef" }, { "vulnerability": "VCID-tff5-wrpr-hbe1" }, { "vulnerability": "VCID-tteq-u99e-ayg4" }, { "vulnerability": "VCID-vnmz-rcby-n3gs" }, { "vulnerability": "VCID-xxgu-jjrs-pkaz" }, { "vulnerability": "VCID-ybgy-yct3-6fba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-17%252Blenny3.2" } ], "aliases": [ "CVE-2009-0385" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sgm1-d98g-nff9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49470?format=api", "vulnerability_id": "VCID-tff5-wrpr-hbe1", "summary": "Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38860", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18492", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18546", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18254", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18337", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.1839", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18342", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.1829", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18234", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18246", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18273", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38860" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38860", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38860" }, { "reference_url": "https://security.gentoo.org/glsa/202405-05", "reference_id": "GLSA-202405-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-05" }, { "reference_url": "https://usn.ubuntu.com/5895-1/", "reference_id": "USN-5895-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5895-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995157?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1" } ], "aliases": [ "CVE-2022-38860" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tff5-wrpr-hbe1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34978?format=api", "vulnerability_id": "VCID-tteq-u99e-ayg4", "summary": "Multiple vulnerabilities have been found in MPlayer and the bundled\n FFmpeg, the worst of which may lead to the execution of arbitrary code.", "references": [ { "reference_url": "http://sam.zoy.org/blog/2007-01-16-exposing-file-parsing-vulnerabilities", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sam.zoy.org/blog/2007-01-16-exposing-file-parsing-vulnerabilities" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-6718", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63347", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63242", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63301", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63328", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63294", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63345", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63363", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.6338", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63327", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63361", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63369", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-6718" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6718", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6718" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2008/10/07/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2008/10/07/1" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=407010", "reference_id": "407010", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=407010" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-6718", "reference_id": "CVE-2007-6718", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-6718" }, { "reference_url": "https://security.gentoo.org/glsa/201310-13", "reference_id": "GLSA-201310-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-13" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035197?format=api", "purl": "pkg:deb/debian/mplayer@2:1.0~rc3%2B%2Bfinal.dfsg1-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4jd9-pt54-1bag" }, { "vulnerability": "VCID-8uk8-jxh7-k7aa" }, { "vulnerability": "VCID-9tg7-9r5m-dkgn" }, { "vulnerability": "VCID-9vx1-3zb9-5bf1" }, { "vulnerability": "VCID-e178-xa31-h3c4" }, { "vulnerability": "VCID-fjy3-bfzh-7beu" }, { "vulnerability": "VCID-g1k8-4mbb-fyew" }, { "vulnerability": "VCID-h9ks-v96k-wkf7" }, { "vulnerability": "VCID-m5db-wq6e-gqeu" }, { "vulnerability": "VCID-pfcp-7vj5-rqef" }, { "vulnerability": "VCID-tff5-wrpr-hbe1" }, { "vulnerability": "VCID-vnmz-rcby-n3gs" }, { "vulnerability": "VCID-xxgu-jjrs-pkaz" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.0~rc3%252B%252Bfinal.dfsg1-1" } ], "aliases": [ "CVE-2007-6718" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tteq-u99e-ayg4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49469?format=api", "vulnerability_id": "VCID-vnmz-rcby-n3gs", "summary": "Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38858", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19364", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19415", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19132", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19212", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19264", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.1927", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19224", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19169", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.1913", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19139", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19147", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38858", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38858" }, { "reference_url": "https://security.gentoo.org/glsa/202405-05", "reference_id": "GLSA-202405-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-05" }, { "reference_url": "https://usn.ubuntu.com/5895-1/", "reference_id": "USN-5895-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5895-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995157?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1" } ], "aliases": [ "CVE-2022-38858" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vnmz-rcby-n3gs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47796?format=api", "vulnerability_id": "VCID-xfdf-djbw-3yht", "summary": "Two vulnerabilities have been discovered in MPlayer, each one could lead to\n the execution of arbitrary code.", "references": [ { "reference_url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-March/052738.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-March/052738.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-1246", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.09304", "scoring_system": "epss", "scoring_elements": "0.92762", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.09304", "scoring_system": "epss", "scoring_elements": "0.92718", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.09304", "scoring_system": "epss", "scoring_elements": "0.92725", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.09304", "scoring_system": "epss", "scoring_elements": "0.9273", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.09304", "scoring_system": "epss", "scoring_elements": "0.92728", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.09304", "scoring_system": "epss", "scoring_elements": "0.92738", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.09304", "scoring_system": "epss", "scoring_elements": "0.92742", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.09304", "scoring_system": "epss", "scoring_elements": "0.92748", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.09304", "scoring_system": "epss", "scoring_elements": "0.92746", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.09304", "scoring_system": "epss", "scoring_elements": "0.92758", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-1246" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1246", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1246" }, { "reference_url": "http://secunia.com/advisories/24443", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24443" }, { "reference_url": "http://secunia.com/advisories/24444", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24444" }, { "reference_url": "http://secunia.com/advisories/24446", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24446" }, { "reference_url": "http://secunia.com/advisories/24448", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24448" }, { "reference_url": "http://secunia.com/advisories/24462", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24462" }, { "reference_url": "http://secunia.com/advisories/24866", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24866" }, { "reference_url": "http://secunia.com/advisories/24897", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24897" }, { "reference_url": "http://secunia.com/advisories/24995", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24995" }, { "reference_url": "http://secunia.com/advisories/25462", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25462" }, { "reference_url": "http://secunia.com/advisories/29601", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/29601" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200704-09.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200704-09.xml" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200705-21.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200705-21.xml" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32747" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.449141", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.449141" }, { "reference_url": "http://svn.mplayerhq.hu/mplayer/trunk/loader/dmo/DMO_VideoDecoder.c", "reference_id": "", "reference_type": "", "scores": [], "url": "http://svn.mplayerhq.hu/mplayer/trunk/loader/dmo/DMO_VideoDecoder.c" }, { "reference_url": "http://svn.mplayerhq.hu/mplayer/trunk/loader/dmo/DMO_VideoDecoder.c?r1=22019&r2=22204", "reference_id": "", "reference_type": "", "scores": [], "url": "http://svn.mplayerhq.hu/mplayer/trunk/loader/dmo/DMO_VideoDecoder.c?r1=22019&r2=22204" }, { "reference_url": "http://www.debian.org/security/2008/dsa-1536", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2008/dsa-1536" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:055", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:055" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:057", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:057" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2007_007_suse.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2007_007_suse.html" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2007_5_sr.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2007_5_sr.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/466691/30/6900/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/466691/30/6900/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/22771", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/22771" }, { "reference_url": "http://www.ubuntu.com/usn/usn-433-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/usn-433-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/0794", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/0794" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414075", "reference_id": "414075", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414075" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1246", "reference_id": "CVE-2007-1246", "reference_type": "", "scores": [ { "value": "7.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1246" }, { "reference_url": "https://security.gentoo.org/glsa/200704-09", "reference_id": "GLSA-200704-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200704-09" }, { "reference_url": "https://security.gentoo.org/glsa/200705-21", "reference_id": "GLSA-200705-21", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200705-21" }, { "reference_url": "https://usn.ubuntu.com/433-1/", "reference_id": "USN-433-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/433-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035196?format=api", "purl": "pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1228-m28x-bkbm" }, { "vulnerability": "VCID-4jd9-pt54-1bag" }, { "vulnerability": "VCID-8uk8-jxh7-k7aa" }, { "vulnerability": "VCID-9tg7-9r5m-dkgn" }, { "vulnerability": "VCID-9vx1-3zb9-5bf1" }, { "vulnerability": "VCID-e178-xa31-h3c4" }, { "vulnerability": "VCID-fjy3-bfzh-7beu" }, { "vulnerability": "VCID-fw24-pxsc-7bek" }, { "vulnerability": "VCID-g1k8-4mbb-fyew" }, { "vulnerability": "VCID-gxnr-jbzt-cffq" }, { "vulnerability": "VCID-h9ks-v96k-wkf7" }, { "vulnerability": "VCID-j7wp-941h-p3fc" }, { "vulnerability": "VCID-m5db-wq6e-gqeu" }, { "vulnerability": "VCID-pfcp-7vj5-rqef" }, { "vulnerability": "VCID-tff5-wrpr-hbe1" }, { "vulnerability": "VCID-tteq-u99e-ayg4" }, { "vulnerability": "VCID-vnmz-rcby-n3gs" }, { "vulnerability": "VCID-xxgu-jjrs-pkaz" }, { "vulnerability": "VCID-ybgy-yct3-6fba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-17%252Blenny3.2" } ], "aliases": [ "CVE-2007-1246" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xfdf-djbw-3yht" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92899?format=api", "vulnerability_id": "VCID-xxgu-jjrs-pkaz", "summary": "Integer overflow in the demuxer function in libmpdemux/demux_gif.c in Mplayer allows remote attackers to cause a denial of service (crash) via large dimensions in a gif file.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4352", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42241", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42316", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42345", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42286", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42334", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42342", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42365", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42328", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.423", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.4235", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42326", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42253", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4352" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4352", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4352" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823723", "reference_id": "823723", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823723" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049111?format=api", "purl": "pkg:deb/debian/mplayer@2:1.3.0-6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4jd9-pt54-1bag" }, { "vulnerability": "VCID-8uk8-jxh7-k7aa" }, { "vulnerability": "VCID-9tg7-9r5m-dkgn" }, { "vulnerability": "VCID-9vx1-3zb9-5bf1" }, { "vulnerability": "VCID-e178-xa31-h3c4" }, { "vulnerability": "VCID-g1k8-4mbb-fyew" }, { "vulnerability": "VCID-m5db-wq6e-gqeu" }, { "vulnerability": "VCID-pfcp-7vj5-rqef" }, { "vulnerability": "VCID-tff5-wrpr-hbe1" }, { "vulnerability": "VCID-vnmz-rcby-n3gs" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.3.0-6" } ], "aliases": [ "CVE-2016-4352" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xxgu-jjrs-pkaz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34980?format=api", "vulnerability_id": "VCID-ybgy-yct3-6fba", "summary": "Multiple vulnerabilities have been found in MPlayer and the bundled\n FFmpeg, the worst of which may lead to the execution of arbitrary code.", "references": [ { "reference_url": "http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=dc74600c97eb834c08674676e209afa842053aca", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=dc74600c97eb834c08674676e209afa842053aca" }, { "reference_url": "http://openwall.com/lists/oss-security/2010/06/04/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2010/06/04/4" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2062", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02991", "scoring_system": "epss", "scoring_elements": "0.8656", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02991", "scoring_system": "epss", "scoring_elements": "0.86483", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02991", "scoring_system": "epss", "scoring_elements": "0.86493", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02991", "scoring_system": "epss", "scoring_elements": "0.86512", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02991", "scoring_system": "epss", "scoring_elements": "0.86511", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02991", "scoring_system": "epss", "scoring_elements": "0.86531", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02991", "scoring_system": "epss", "scoring_elements": "0.86541", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02991", "scoring_system": "epss", "scoring_elements": "0.86556", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02991", "scoring_system": "epss", "scoring_elements": "0.86552", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02991", "scoring_system": "epss", "scoring_elements": "0.86547", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02991", "scoring_system": "epss", "scoring_elements": "0.86561", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02991", "scoring_system": "epss", "scoring_elements": "0.86567", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2062" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2062", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2062" }, { "reference_url": "https://dzcore.wordpress.com/2009/07/27/dzc-2009-001-the-movie-player-and-vlc-media-player-real-data-transport-parsing-integer-underflow/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://dzcore.wordpress.com/2009/07/27/dzc-2009-001-the-movie-player-and-vlc-media-player-real-data-transport-parsing-integer-underflow/" }, { "reference_url": "http://seclists.org/fulldisclosure/2009/Jul/418", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2009/Jul/418" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=581245", "reference_id": "581245", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=581245" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1337:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.8.1337:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1337:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2062", "reference_id": "CVE-2010-2062", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2062" }, { "reference_url": "https://security.gentoo.org/glsa/201310-13", "reference_id": "GLSA-201310-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-13" }, { "reference_url": "https://security.gentoo.org/glsa/201411-01", "reference_id": "GLSA-201411-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201411-01" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035197?format=api", "purl": "pkg:deb/debian/mplayer@2:1.0~rc3%2B%2Bfinal.dfsg1-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4jd9-pt54-1bag" }, { "vulnerability": "VCID-8uk8-jxh7-k7aa" }, { "vulnerability": "VCID-9tg7-9r5m-dkgn" }, { "vulnerability": "VCID-9vx1-3zb9-5bf1" }, { "vulnerability": "VCID-e178-xa31-h3c4" }, { "vulnerability": "VCID-fjy3-bfzh-7beu" }, { "vulnerability": "VCID-g1k8-4mbb-fyew" }, { "vulnerability": "VCID-h9ks-v96k-wkf7" }, { "vulnerability": "VCID-m5db-wq6e-gqeu" }, { "vulnerability": "VCID-pfcp-7vj5-rqef" }, { "vulnerability": "VCID-tff5-wrpr-hbe1" }, { "vulnerability": "VCID-vnmz-rcby-n3gs" }, { "vulnerability": "VCID-xxgu-jjrs-pkaz" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.0~rc3%252B%252Bfinal.dfsg1-1" } ], "aliases": [ "CVE-2010-2062" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ybgy-yct3-6fba" } ], "fixing_vulnerabilities": [], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc1-12etch7" }