Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/gst-plugins-good1.0@1.4.4-2
Typedeb
Namespacedebian
Namegst-plugins-good1.0
Version1.4.4-2
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.28.2-2
Latest_non_vulnerable_version1.28.2-2
Affected_by_vulnerabilities
0
url VCID-1kjc-6zdm-jkf3
vulnerability_id VCID-1kjc-6zdm-jkf3
summary Multiple vulnerabilities have been discovered in gst-plugins-good, the worst of which could lead to denial of service or arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1922.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1922.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1922
reference_id
reference_type
scores
0
value 0.00043
scoring_system epss
scoring_elements 0.13003
published_at 2026-04-21T12:55:00Z
1
value 0.00043
scoring_system epss
scoring_elements 0.12901
published_at 2026-04-16T12:55:00Z
2
value 0.00043
scoring_system epss
scoring_elements 0.12903
published_at 2026-04-18T12:55:00Z
3
value 0.00056
scoring_system epss
scoring_elements 0.17662
published_at 2026-04-02T12:55:00Z
4
value 0.00056
scoring_system epss
scoring_elements 0.17428
published_at 2026-04-07T12:55:00Z
5
value 0.00056
scoring_system epss
scoring_elements 0.1752
published_at 2026-04-08T12:55:00Z
6
value 0.00056
scoring_system epss
scoring_elements 0.17581
published_at 2026-04-09T12:55:00Z
7
value 0.00056
scoring_system epss
scoring_elements 0.17595
published_at 2026-04-11T12:55:00Z
8
value 0.00056
scoring_system epss
scoring_elements 0.17548
published_at 2026-04-12T12:55:00Z
9
value 0.00056
scoring_system epss
scoring_elements 0.17495
published_at 2026-04-13T12:55:00Z
10
value 0.00056
scoring_system epss
scoring_elements 0.17499
published_at 2026-04-01T12:55:00Z
11
value 0.00056
scoring_system epss
scoring_elements 0.17708
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1922
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2130955
reference_id 2130955
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2130955
11
reference_url https://security.gentoo.org/glsa/202409-13
reference_id GLSA-202409-13
reference_type
scores
url https://security.gentoo.org/glsa/202409-13
12
reference_url https://access.redhat.com/errata/RHSA-2023:2260
reference_id RHSA-2023:2260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2260
13
reference_url https://usn.ubuntu.com/5555-1/
reference_id USN-5555-1
reference_type
scores
url https://usn.ubuntu.com/5555-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2
purl pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1g9u-gemh-83bw
1
vulnerability VCID-2nz4-ctek-zbfy
2
vulnerability VCID-358j-grsx-27fn
3
vulnerability VCID-3qta-hpkg-hqad
4
vulnerability VCID-4ka2-hbcv-8uh2
5
vulnerability VCID-528p-7av9-1kgv
6
vulnerability VCID-5ry6-b22q-37gy
7
vulnerability VCID-6hjf-zva4-ekcv
8
vulnerability VCID-6rvw-7p62-rbdf
9
vulnerability VCID-92kd-us53-qubg
10
vulnerability VCID-a741-fvg4-h3at
11
vulnerability VCID-bpqa-ngtx-pbes
12
vulnerability VCID-f1qr-vrev-tbdc
13
vulnerability VCID-fp9x-81jx-fbhz
14
vulnerability VCID-h2zj-j6va-v7hs
15
vulnerability VCID-hatr-ngra-qqb6
16
vulnerability VCID-hmn3-mxh5-73fj
17
vulnerability VCID-hxhp-4xdt-fqfp
18
vulnerability VCID-jzft-takg-afb4
19
vulnerability VCID-kfe8-dy9e-ryc5
20
vulnerability VCID-n1x7-a5e5-ckec
21
vulnerability VCID-p46s-buwz-h3by
22
vulnerability VCID-t93h-vv13-4bck
23
vulnerability VCID-uj8y-np9h-8qg6
24
vulnerability VCID-upbh-pvqc-4ubn
25
vulnerability VCID-v4u8-zktd-cfaq
26
vulnerability VCID-wxcy-bnsr-qkdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2
aliases CVE-2022-1922
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1kjc-6zdm-jkf3
1
url VCID-1z2g-dxzn-27d2
vulnerability_id VCID-1z2g-dxzn-27d2
summary
Multiple vulnerabilities have been found in various GStreamer
    plug-ins, the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5845.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5845.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5845
reference_id
reference_type
scores
0
value 0.03108
scoring_system epss
scoring_elements 0.86758
published_at 2026-04-01T12:55:00Z
1
value 0.03108
scoring_system epss
scoring_elements 0.86838
published_at 2026-04-21T12:55:00Z
2
value 0.03108
scoring_system epss
scoring_elements 0.86835
published_at 2026-04-16T12:55:00Z
3
value 0.03108
scoring_system epss
scoring_elements 0.86839
published_at 2026-04-18T12:55:00Z
4
value 0.03108
scoring_system epss
scoring_elements 0.86769
published_at 2026-04-02T12:55:00Z
5
value 0.03108
scoring_system epss
scoring_elements 0.86787
published_at 2026-04-04T12:55:00Z
6
value 0.03108
scoring_system epss
scoring_elements 0.86785
published_at 2026-04-07T12:55:00Z
7
value 0.03108
scoring_system epss
scoring_elements 0.86805
published_at 2026-04-08T12:55:00Z
8
value 0.03108
scoring_system epss
scoring_elements 0.86813
published_at 2026-04-09T12:55:00Z
9
value 0.03108
scoring_system epss
scoring_elements 0.86827
published_at 2026-04-11T12:55:00Z
10
value 0.03108
scoring_system epss
scoring_elements 0.86823
published_at 2026-04-12T12:55:00Z
11
value 0.03108
scoring_system epss
scoring_elements 0.86819
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5845
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10198
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10199
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5840
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5841
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5841
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5845
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1419582
reference_id 1419582
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1419582
9
reference_url https://security.archlinux.org/ASA-201702-3
reference_id ASA-201702-3
reference_type
scores
url https://security.archlinux.org/ASA-201702-3
10
reference_url https://security.archlinux.org/AVG-163
reference_id AVG-163
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-163
11
reference_url https://security.gentoo.org/glsa/201705-10
reference_id GLSA-201705-10
reference_type
scores
url https://security.gentoo.org/glsa/201705-10
12
reference_url https://access.redhat.com/errata/RHSA-2017:2060
reference_id RHSA-2017:2060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2060
13
reference_url https://usn.ubuntu.com/3245-1/
reference_id USN-3245-1
reference_type
scores
url https://usn.ubuntu.com/3245-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.4.4-2%2Bdeb8u3
purl pkg:deb/debian/gst-plugins-good1.0@1.4.4-2%2Bdeb8u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1kjc-6zdm-jkf3
1
vulnerability VCID-1z2g-dxzn-27d2
2
vulnerability VCID-2nz4-ctek-zbfy
3
vulnerability VCID-358j-grsx-27fn
4
vulnerability VCID-3qta-hpkg-hqad
5
vulnerability VCID-521g-8qbp-cfh3
6
vulnerability VCID-528p-7av9-1kgv
7
vulnerability VCID-5ry6-b22q-37gy
8
vulnerability VCID-5vfg-uj1z-zudn
9
vulnerability VCID-6aaz-buqb-zfcm
10
vulnerability VCID-6hjf-zva4-ekcv
11
vulnerability VCID-6rvw-7p62-rbdf
12
vulnerability VCID-771b-5s45-hbhd
13
vulnerability VCID-7nn4-cj6x-uff8
14
vulnerability VCID-92kd-us53-qubg
15
vulnerability VCID-a741-fvg4-h3at
16
vulnerability VCID-bk2h-q83z-43cn
17
vulnerability VCID-bpqa-ngtx-pbes
18
vulnerability VCID-byg3-424m-w3gs
19
vulnerability VCID-cnza-7ar1-f7eh
20
vulnerability VCID-exgv-kz5w-w3bq
21
vulnerability VCID-f1k9-rdv3-nqen
22
vulnerability VCID-f1qr-vrev-tbdc
23
vulnerability VCID-fp9x-81jx-fbhz
24
vulnerability VCID-h2zj-j6va-v7hs
25
vulnerability VCID-hatr-ngra-qqb6
26
vulnerability VCID-hgch-q86h-4qcn
27
vulnerability VCID-hmn3-mxh5-73fj
28
vulnerability VCID-hxhp-4xdt-fqfp
29
vulnerability VCID-j1w1-4xvp-7bh8
30
vulnerability VCID-jzft-takg-afb4
31
vulnerability VCID-k1t8-1fq9-m3gg
32
vulnerability VCID-kfe8-dy9e-ryc5
33
vulnerability VCID-m2g4-ecf6-sufy
34
vulnerability VCID-mcdu-z138-vkgv
35
vulnerability VCID-n1tt-vu7b-skew
36
vulnerability VCID-n1x7-a5e5-ckec
37
vulnerability VCID-p46s-buwz-h3by
38
vulnerability VCID-t93h-vv13-4bck
39
vulnerability VCID-tf3v-37zu-pkaf
40
vulnerability VCID-uj8y-np9h-8qg6
41
vulnerability VCID-v4u8-zktd-cfaq
42
vulnerability VCID-wxcy-bnsr-qkdn
43
vulnerability VCID-zup8-xngn-7bh7
44
vulnerability VCID-zz2u-cmgw-k3c1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.4.4-2%252Bdeb8u3
1
url pkg:deb/debian/gst-plugins-good1.0@1.10.4-1
purl pkg:deb/debian/gst-plugins-good1.0@1.10.4-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1kjc-6zdm-jkf3
1
vulnerability VCID-2nz4-ctek-zbfy
2
vulnerability VCID-358j-grsx-27fn
3
vulnerability VCID-3qta-hpkg-hqad
4
vulnerability VCID-521g-8qbp-cfh3
5
vulnerability VCID-528p-7av9-1kgv
6
vulnerability VCID-5ry6-b22q-37gy
7
vulnerability VCID-6aaz-buqb-zfcm
8
vulnerability VCID-6hjf-zva4-ekcv
9
vulnerability VCID-6rvw-7p62-rbdf
10
vulnerability VCID-771b-5s45-hbhd
11
vulnerability VCID-7nn4-cj6x-uff8
12
vulnerability VCID-92kd-us53-qubg
13
vulnerability VCID-a741-fvg4-h3at
14
vulnerability VCID-bpqa-ngtx-pbes
15
vulnerability VCID-exgv-kz5w-w3bq
16
vulnerability VCID-f1qr-vrev-tbdc
17
vulnerability VCID-fp9x-81jx-fbhz
18
vulnerability VCID-h2zj-j6va-v7hs
19
vulnerability VCID-hatr-ngra-qqb6
20
vulnerability VCID-hmn3-mxh5-73fj
21
vulnerability VCID-hxhp-4xdt-fqfp
22
vulnerability VCID-jzft-takg-afb4
23
vulnerability VCID-kfe8-dy9e-ryc5
24
vulnerability VCID-m2g4-ecf6-sufy
25
vulnerability VCID-n1x7-a5e5-ckec
26
vulnerability VCID-p46s-buwz-h3by
27
vulnerability VCID-t93h-vv13-4bck
28
vulnerability VCID-tf3v-37zu-pkaf
29
vulnerability VCID-uj8y-np9h-8qg6
30
vulnerability VCID-v4u8-zktd-cfaq
31
vulnerability VCID-wxcy-bnsr-qkdn
32
vulnerability VCID-zup8-xngn-7bh7
33
vulnerability VCID-zz2u-cmgw-k3c1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.10.4-1
aliases CVE-2017-5845
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1z2g-dxzn-27d2
2
url VCID-2nz4-ctek-zbfy
vulnerability_id VCID-2nz4-ctek-zbfy
summary Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47603.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47603.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47603
reference_id
reference_type
scores
0
value 0.00114
scoring_system epss
scoring_elements 0.30196
published_at 2026-04-04T12:55:00Z
1
value 0.00114
scoring_system epss
scoring_elements 0.30149
published_at 2026-04-02T12:55:00Z
2
value 0.00196
scoring_system epss
scoring_elements 0.41564
published_at 2026-04-16T12:55:00Z
3
value 0.00196
scoring_system epss
scoring_elements 0.41544
published_at 2026-04-09T12:55:00Z
4
value 0.00196
scoring_system epss
scoring_elements 0.41566
published_at 2026-04-11T12:55:00Z
5
value 0.00196
scoring_system epss
scoring_elements 0.41533
published_at 2026-04-12T12:55:00Z
6
value 0.00196
scoring_system epss
scoring_elements 0.41519
published_at 2026-04-13T12:55:00Z
7
value 0.00196
scoring_system epss
scoring_elements 0.41538
published_at 2026-04-18T12:55:00Z
8
value 0.00196
scoring_system epss
scoring_elements 0.41463
published_at 2026-04-21T12:55:00Z
9
value 0.00196
scoring_system epss
scoring_elements 0.41486
published_at 2026-04-07T12:55:00Z
10
value 0.00196
scoring_system epss
scoring_elements 0.41536
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47603
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47603
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2331762
reference_id 2331762
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2331762
5
reference_url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch
reference_id 8057.patch
reference_type
scores
0
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T20:38:14Z/
url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch
6
reference_url https://securitylab.github.com/advisories/GHSL-2024-251_Gstreamer/
reference_id GHSL-2024-251_Gstreamer
reference_type
scores
0
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T20:38:14Z/
url https://securitylab.github.com/advisories/GHSL-2024-251_Gstreamer/
7
reference_url https://security.gentoo.org/glsa/202506-02
reference_id GLSA-202506-02
reference_type
scores
url https://security.gentoo.org/glsa/202506-02
8
reference_url https://access.redhat.com/errata/RHSA-2025:7242
reference_id RHSA-2025:7242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7242
9
reference_url https://gstreamer.freedesktop.org/security/sa-2024-0021.html
reference_id sa-2024-0021.html
reference_type
scores
0
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T20:38:14Z/
url https://gstreamer.freedesktop.org/security/sa-2024-0021.html
10
reference_url https://usn.ubuntu.com/7176-1/
reference_id USN-7176-1
reference_type
scores
url https://usn.ubuntu.com/7176-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
purl pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1g9u-gemh-83bw
1
vulnerability VCID-4ka2-hbcv-8uh2
2
vulnerability VCID-6rvw-7p62-rbdf
3
vulnerability VCID-upbh-pvqc-4ubn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3
aliases CVE-2024-47603
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2nz4-ctek-zbfy
3
url VCID-358j-grsx-27fn
vulnerability_id VCID-358j-grsx-27fn
summary Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47539.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47539.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47539
reference_id
reference_type
scores
0
value 0.00119
scoring_system epss
scoring_elements 0.31058
published_at 2026-04-04T12:55:00Z
1
value 0.00119
scoring_system epss
scoring_elements 0.3101
published_at 2026-04-02T12:55:00Z
2
value 0.00204
scoring_system epss
scoring_elements 0.4265
published_at 2026-04-16T12:55:00Z
3
value 0.00204
scoring_system epss
scoring_elements 0.42632
published_at 2026-04-09T12:55:00Z
4
value 0.00204
scoring_system epss
scoring_elements 0.42655
published_at 2026-04-11T12:55:00Z
5
value 0.00204
scoring_system epss
scoring_elements 0.42619
published_at 2026-04-12T12:55:00Z
6
value 0.00204
scoring_system epss
scoring_elements 0.42591
published_at 2026-04-13T12:55:00Z
7
value 0.00204
scoring_system epss
scoring_elements 0.42636
published_at 2026-04-18T12:55:00Z
8
value 0.00204
scoring_system epss
scoring_elements 0.4257
published_at 2026-04-21T12:55:00Z
9
value 0.00204
scoring_system epss
scoring_elements 0.42569
published_at 2026-04-07T12:55:00Z
10
value 0.00204
scoring_system epss
scoring_elements 0.42621
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47539
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47539
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47539
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2331726
reference_id 2331726
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2331726
5
reference_url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch
reference_id 8059.patch
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:41:01Z/
url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch
6
reference_url https://securitylab.github.com/advisories/GHSL-2024-195_Gstreamer/
reference_id GHSL-2024-195_Gstreamer
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:41:01Z/
url https://securitylab.github.com/advisories/GHSL-2024-195_Gstreamer/
7
reference_url https://security.gentoo.org/glsa/202506-02
reference_id GLSA-202506-02
reference_type
scores
url https://security.gentoo.org/glsa/202506-02
8
reference_url https://access.redhat.com/errata/RHSA-2024:11119
reference_id RHSA-2024:11119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11119
9
reference_url https://access.redhat.com/errata/RHSA-2024:11121
reference_id RHSA-2024:11121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11121
10
reference_url https://access.redhat.com/errata/RHSA-2024:11122
reference_id RHSA-2024:11122
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11122
11
reference_url https://access.redhat.com/errata/RHSA-2024:11148
reference_id RHSA-2024:11148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11148
12
reference_url https://access.redhat.com/errata/RHSA-2024:11149
reference_id RHSA-2024:11149
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11149
13
reference_url https://access.redhat.com/errata/RHSA-2024:11298
reference_id RHSA-2024:11298
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11298
14
reference_url https://access.redhat.com/errata/RHSA-2024:11299
reference_id RHSA-2024:11299
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11299
15
reference_url https://access.redhat.com/errata/RHSA-2024:11346
reference_id RHSA-2024:11346
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11346
16
reference_url https://access.redhat.com/errata/RHSA-2024:11348
reference_id RHSA-2024:11348
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11348
17
reference_url https://gstreamer.freedesktop.org/security/sa-2024-0007.html
reference_id sa-2024-0007.html
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:41:01Z/
url https://gstreamer.freedesktop.org/security/sa-2024-0007.html
18
reference_url https://usn.ubuntu.com/7176-1/
reference_id USN-7176-1
reference_type
scores
url https://usn.ubuntu.com/7176-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
purl pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1g9u-gemh-83bw
1
vulnerability VCID-4ka2-hbcv-8uh2
2
vulnerability VCID-6rvw-7p62-rbdf
3
vulnerability VCID-upbh-pvqc-4ubn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3
aliases CVE-2024-47539
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-358j-grsx-27fn
4
url VCID-3qta-hpkg-hqad
vulnerability_id VCID-3qta-hpkg-hqad
summary Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47834.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47834.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47834
reference_id
reference_type
scores
0
value 0.00069
scoring_system epss
scoring_elements 0.21403
published_at 2026-04-04T12:55:00Z
1
value 0.00069
scoring_system epss
scoring_elements 0.21348
published_at 2026-04-02T12:55:00Z
2
value 0.00118
scoring_system epss
scoring_elements 0.30766
published_at 2026-04-09T12:55:00Z
3
value 0.00118
scoring_system epss
scoring_elements 0.30686
published_at 2026-04-18T12:55:00Z
4
value 0.00118
scoring_system epss
scoring_elements 0.30704
published_at 2026-04-16T12:55:00Z
5
value 0.00118
scoring_system epss
scoring_elements 0.3068
published_at 2026-04-13T12:55:00Z
6
value 0.00118
scoring_system epss
scoring_elements 0.30769
published_at 2026-04-11T12:55:00Z
7
value 0.00118
scoring_system epss
scoring_elements 0.30653
published_at 2026-04-21T12:55:00Z
8
value 0.00118
scoring_system epss
scoring_elements 0.30726
published_at 2026-04-12T12:55:00Z
9
value 0.00118
scoring_system epss
scoring_elements 0.30675
published_at 2026-04-07T12:55:00Z
10
value 0.00118
scoring_system epss
scoring_elements 0.30734
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47834
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47834
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2331749
reference_id 2331749
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2331749
5
reference_url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch
reference_id 8057.patch
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:15:13Z/
url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch
6
reference_url https://securitylab.github.com/advisories/GHSL-2024-280_Gstreamer/
reference_id GHSL-2024-280_Gstreamer
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:15:13Z/
url https://securitylab.github.com/advisories/GHSL-2024-280_Gstreamer/
7
reference_url https://security.gentoo.org/glsa/202506-02
reference_id GLSA-202506-02
reference_type
scores
url https://security.gentoo.org/glsa/202506-02
8
reference_url https://access.redhat.com/errata/RHSA-2025:7242
reference_id RHSA-2025:7242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7242
9
reference_url https://gstreamer.freedesktop.org/security/sa-2024-0030.html
reference_id sa-2024-0030.html
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:15:13Z/
url https://gstreamer.freedesktop.org/security/sa-2024-0030.html
10
reference_url https://usn.ubuntu.com/7176-1/
reference_id USN-7176-1
reference_type
scores
url https://usn.ubuntu.com/7176-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
purl pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1g9u-gemh-83bw
1
vulnerability VCID-4ka2-hbcv-8uh2
2
vulnerability VCID-6rvw-7p62-rbdf
3
vulnerability VCID-upbh-pvqc-4ubn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3
aliases CVE-2024-47834
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3qta-hpkg-hqad
5
url VCID-521g-8qbp-cfh3
vulnerability_id VCID-521g-8qbp-cfh3
summary Multiple vulnerabilities have been discovered in gst-plugins-good, the worst of which could lead to denial of service or arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1921.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1921.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1921
reference_id
reference_type
scores
0
value 0.00043
scoring_system epss
scoring_elements 0.13203
published_at 2026-04-21T12:55:00Z
1
value 0.00043
scoring_system epss
scoring_elements 0.13109
published_at 2026-04-18T12:55:00Z
2
value 0.00056
scoring_system epss
scoring_elements 0.17843
published_at 2026-04-02T12:55:00Z
3
value 0.00056
scoring_system epss
scoring_elements 0.17897
published_at 2026-04-04T12:55:00Z
4
value 0.00056
scoring_system epss
scoring_elements 0.17599
published_at 2026-04-07T12:55:00Z
5
value 0.00056
scoring_system epss
scoring_elements 0.17688
published_at 2026-04-08T12:55:00Z
6
value 0.00056
scoring_system epss
scoring_elements 0.17749
published_at 2026-04-09T12:55:00Z
7
value 0.00056
scoring_system epss
scoring_elements 0.17767
published_at 2026-04-11T12:55:00Z
8
value 0.00056
scoring_system epss
scoring_elements 0.17722
published_at 2026-04-12T12:55:00Z
9
value 0.00056
scoring_system epss
scoring_elements 0.17671
published_at 2026-04-13T12:55:00Z
10
value 0.00056
scoring_system epss
scoring_elements 0.17681
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1921
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2130949
reference_id 2130949
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2130949
11
reference_url https://security.gentoo.org/glsa/202409-13
reference_id GLSA-202409-13
reference_type
scores
url https://security.gentoo.org/glsa/202409-13
12
reference_url https://access.redhat.com/errata/RHSA-2023:2260
reference_id RHSA-2023:2260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2260
13
reference_url https://usn.ubuntu.com/5555-1/
reference_id USN-5555-1
reference_type
scores
url https://usn.ubuntu.com/5555-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2
purl pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1g9u-gemh-83bw
1
vulnerability VCID-2nz4-ctek-zbfy
2
vulnerability VCID-358j-grsx-27fn
3
vulnerability VCID-3qta-hpkg-hqad
4
vulnerability VCID-4ka2-hbcv-8uh2
5
vulnerability VCID-528p-7av9-1kgv
6
vulnerability VCID-5ry6-b22q-37gy
7
vulnerability VCID-6hjf-zva4-ekcv
8
vulnerability VCID-6rvw-7p62-rbdf
9
vulnerability VCID-92kd-us53-qubg
10
vulnerability VCID-a741-fvg4-h3at
11
vulnerability VCID-bpqa-ngtx-pbes
12
vulnerability VCID-f1qr-vrev-tbdc
13
vulnerability VCID-fp9x-81jx-fbhz
14
vulnerability VCID-h2zj-j6va-v7hs
15
vulnerability VCID-hatr-ngra-qqb6
16
vulnerability VCID-hmn3-mxh5-73fj
17
vulnerability VCID-hxhp-4xdt-fqfp
18
vulnerability VCID-jzft-takg-afb4
19
vulnerability VCID-kfe8-dy9e-ryc5
20
vulnerability VCID-n1x7-a5e5-ckec
21
vulnerability VCID-p46s-buwz-h3by
22
vulnerability VCID-t93h-vv13-4bck
23
vulnerability VCID-uj8y-np9h-8qg6
24
vulnerability VCID-upbh-pvqc-4ubn
25
vulnerability VCID-v4u8-zktd-cfaq
26
vulnerability VCID-wxcy-bnsr-qkdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2
aliases CVE-2022-1921
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-521g-8qbp-cfh3
6
url VCID-528p-7av9-1kgv
vulnerability_id VCID-528p-7av9-1kgv
summary Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47543.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47543.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47543
reference_id
reference_type
scores
0
value 0.00084
scoring_system epss
scoring_elements 0.24674
published_at 2026-04-04T12:55:00Z
1
value 0.00084
scoring_system epss
scoring_elements 0.24637
published_at 2026-04-02T12:55:00Z
2
value 0.00133
scoring_system epss
scoring_elements 0.32829
published_at 2026-04-18T12:55:00Z
3
value 0.00133
scoring_system epss
scoring_elements 0.32793
published_at 2026-04-21T12:55:00Z
4
value 0.00133
scoring_system epss
scoring_elements 0.32835
published_at 2026-04-12T12:55:00Z
5
value 0.00133
scoring_system epss
scoring_elements 0.3281
published_at 2026-04-13T12:55:00Z
6
value 0.00133
scoring_system epss
scoring_elements 0.32852
published_at 2026-04-16T12:55:00Z
7
value 0.00144
scoring_system epss
scoring_elements 0.3478
published_at 2026-04-11T12:55:00Z
8
value 0.00144
scoring_system epss
scoring_elements 0.34704
published_at 2026-04-07T12:55:00Z
9
value 0.00144
scoring_system epss
scoring_elements 0.34748
published_at 2026-04-08T12:55:00Z
10
value 0.00144
scoring_system epss
scoring_elements 0.34776
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47543
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47543
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2331723
reference_id 2331723
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2331723
5
reference_url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch
reference_id 8059.patch
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:29:43Z/
url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch
6
reference_url https://securitylab.github.com/advisories/GHSL-2024-236_Gstreamer/
reference_id GHSL-2024-236_Gstreamer
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:29:43Z/
url https://securitylab.github.com/advisories/GHSL-2024-236_Gstreamer/
7
reference_url https://security.gentoo.org/glsa/202506-02
reference_id GLSA-202506-02
reference_type
scores
url https://security.gentoo.org/glsa/202506-02
8
reference_url https://access.redhat.com/errata/RHSA-2025:7242
reference_id RHSA-2025:7242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7242
9
reference_url https://gstreamer.freedesktop.org/security/sa-2024-0009.html
reference_id sa-2024-0009.html
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:29:43Z/
url https://gstreamer.freedesktop.org/security/sa-2024-0009.html
10
reference_url https://usn.ubuntu.com/7176-1/
reference_id USN-7176-1
reference_type
scores
url https://usn.ubuntu.com/7176-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
purl pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1g9u-gemh-83bw
1
vulnerability VCID-4ka2-hbcv-8uh2
2
vulnerability VCID-6rvw-7p62-rbdf
3
vulnerability VCID-upbh-pvqc-4ubn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3
aliases CVE-2024-47543
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-528p-7av9-1kgv
7
url VCID-5ry6-b22q-37gy
vulnerability_id VCID-5ry6-b22q-37gy
summary Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47596.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47596.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47596
reference_id
reference_type
scores
0
value 0.00078
scoring_system epss
scoring_elements 0.23268
published_at 2026-04-04T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.23224
published_at 2026-04-02T12:55:00Z
2
value 0.00133
scoring_system epss
scoring_elements 0.32852
published_at 2026-04-16T12:55:00Z
3
value 0.00133
scoring_system epss
scoring_elements 0.32873
published_at 2026-04-09T12:55:00Z
4
value 0.00133
scoring_system epss
scoring_elements 0.32874
published_at 2026-04-11T12:55:00Z
5
value 0.00133
scoring_system epss
scoring_elements 0.32835
published_at 2026-04-12T12:55:00Z
6
value 0.00133
scoring_system epss
scoring_elements 0.3281
published_at 2026-04-13T12:55:00Z
7
value 0.00133
scoring_system epss
scoring_elements 0.32829
published_at 2026-04-18T12:55:00Z
8
value 0.00133
scoring_system epss
scoring_elements 0.32793
published_at 2026-04-21T12:55:00Z
9
value 0.00133
scoring_system epss
scoring_elements 0.32796
published_at 2026-04-07T12:55:00Z
10
value 0.00133
scoring_system epss
scoring_elements 0.32844
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47596
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47596
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2331747
reference_id 2331747
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2331747
5
reference_url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch
reference_id 8059.patch
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-13T17:41:58Z/
url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch
6
reference_url https://securitylab.github.com/advisories/GHSL-2024-244_Gstreamer/
reference_id GHSL-2024-244_Gstreamer
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-13T17:41:58Z/
url https://securitylab.github.com/advisories/GHSL-2024-244_Gstreamer/
7
reference_url https://security.gentoo.org/glsa/202506-02
reference_id GLSA-202506-02
reference_type
scores
url https://security.gentoo.org/glsa/202506-02
8
reference_url https://access.redhat.com/errata/RHSA-2025:7242
reference_id RHSA-2025:7242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7242
9
reference_url https://gstreamer.freedesktop.org/security/sa-2024-0015.html
reference_id sa-2024-0015.html
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-13T17:41:58Z/
url https://gstreamer.freedesktop.org/security/sa-2024-0015.html
10
reference_url https://usn.ubuntu.com/7176-1/
reference_id USN-7176-1
reference_type
scores
url https://usn.ubuntu.com/7176-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
purl pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1g9u-gemh-83bw
1
vulnerability VCID-4ka2-hbcv-8uh2
2
vulnerability VCID-6rvw-7p62-rbdf
3
vulnerability VCID-upbh-pvqc-4ubn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3
aliases CVE-2024-47596
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5ry6-b22q-37gy
8
url VCID-5vfg-uj1z-zudn
vulnerability_id VCID-5vfg-uj1z-zudn
summary
Multiple vulnerabilities have been found in various GStreamer
    plug-ins, the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10199.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10199.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-10199
reference_id
reference_type
scores
0
value 0.03126
scoring_system epss
scoring_elements 0.86792
published_at 2026-04-01T12:55:00Z
1
value 0.03126
scoring_system epss
scoring_elements 0.86871
published_at 2026-04-21T12:55:00Z
2
value 0.03126
scoring_system epss
scoring_elements 0.86865
published_at 2026-04-16T12:55:00Z
3
value 0.03126
scoring_system epss
scoring_elements 0.8687
published_at 2026-04-18T12:55:00Z
4
value 0.03126
scoring_system epss
scoring_elements 0.86803
published_at 2026-04-02T12:55:00Z
5
value 0.03126
scoring_system epss
scoring_elements 0.86822
published_at 2026-04-04T12:55:00Z
6
value 0.03126
scoring_system epss
scoring_elements 0.86815
published_at 2026-04-07T12:55:00Z
7
value 0.03126
scoring_system epss
scoring_elements 0.86835
published_at 2026-04-08T12:55:00Z
8
value 0.03126
scoring_system epss
scoring_elements 0.86844
published_at 2026-04-09T12:55:00Z
9
value 0.03126
scoring_system epss
scoring_elements 0.86857
published_at 2026-04-11T12:55:00Z
10
value 0.03126
scoring_system epss
scoring_elements 0.86852
published_at 2026-04-12T12:55:00Z
11
value 0.03126
scoring_system epss
scoring_elements 0.86848
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-10199
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10198
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10199
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5840
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5841
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5841
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5845
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1419580
reference_id 1419580
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1419580
9
reference_url https://security.archlinux.org/ASA-201702-3
reference_id ASA-201702-3
reference_type
scores
url https://security.archlinux.org/ASA-201702-3
10
reference_url https://security.archlinux.org/AVG-163
reference_id AVG-163
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-163
11
reference_url https://security.gentoo.org/glsa/201705-10
reference_id GLSA-201705-10
reference_type
scores
url https://security.gentoo.org/glsa/201705-10
12
reference_url https://access.redhat.com/errata/RHSA-2017:2060
reference_id RHSA-2017:2060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2060
13
reference_url https://usn.ubuntu.com/3245-1/
reference_id USN-3245-1
reference_type
scores
url https://usn.ubuntu.com/3245-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.4.4-2%2Bdeb8u3
purl pkg:deb/debian/gst-plugins-good1.0@1.4.4-2%2Bdeb8u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1kjc-6zdm-jkf3
1
vulnerability VCID-1z2g-dxzn-27d2
2
vulnerability VCID-2nz4-ctek-zbfy
3
vulnerability VCID-358j-grsx-27fn
4
vulnerability VCID-3qta-hpkg-hqad
5
vulnerability VCID-521g-8qbp-cfh3
6
vulnerability VCID-528p-7av9-1kgv
7
vulnerability VCID-5ry6-b22q-37gy
8
vulnerability VCID-5vfg-uj1z-zudn
9
vulnerability VCID-6aaz-buqb-zfcm
10
vulnerability VCID-6hjf-zva4-ekcv
11
vulnerability VCID-6rvw-7p62-rbdf
12
vulnerability VCID-771b-5s45-hbhd
13
vulnerability VCID-7nn4-cj6x-uff8
14
vulnerability VCID-92kd-us53-qubg
15
vulnerability VCID-a741-fvg4-h3at
16
vulnerability VCID-bk2h-q83z-43cn
17
vulnerability VCID-bpqa-ngtx-pbes
18
vulnerability VCID-byg3-424m-w3gs
19
vulnerability VCID-cnza-7ar1-f7eh
20
vulnerability VCID-exgv-kz5w-w3bq
21
vulnerability VCID-f1k9-rdv3-nqen
22
vulnerability VCID-f1qr-vrev-tbdc
23
vulnerability VCID-fp9x-81jx-fbhz
24
vulnerability VCID-h2zj-j6va-v7hs
25
vulnerability VCID-hatr-ngra-qqb6
26
vulnerability VCID-hgch-q86h-4qcn
27
vulnerability VCID-hmn3-mxh5-73fj
28
vulnerability VCID-hxhp-4xdt-fqfp
29
vulnerability VCID-j1w1-4xvp-7bh8
30
vulnerability VCID-jzft-takg-afb4
31
vulnerability VCID-k1t8-1fq9-m3gg
32
vulnerability VCID-kfe8-dy9e-ryc5
33
vulnerability VCID-m2g4-ecf6-sufy
34
vulnerability VCID-mcdu-z138-vkgv
35
vulnerability VCID-n1tt-vu7b-skew
36
vulnerability VCID-n1x7-a5e5-ckec
37
vulnerability VCID-p46s-buwz-h3by
38
vulnerability VCID-t93h-vv13-4bck
39
vulnerability VCID-tf3v-37zu-pkaf
40
vulnerability VCID-uj8y-np9h-8qg6
41
vulnerability VCID-v4u8-zktd-cfaq
42
vulnerability VCID-wxcy-bnsr-qkdn
43
vulnerability VCID-zup8-xngn-7bh7
44
vulnerability VCID-zz2u-cmgw-k3c1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.4.4-2%252Bdeb8u3
1
url pkg:deb/debian/gst-plugins-good1.0@1.10.4-1
purl pkg:deb/debian/gst-plugins-good1.0@1.10.4-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1kjc-6zdm-jkf3
1
vulnerability VCID-2nz4-ctek-zbfy
2
vulnerability VCID-358j-grsx-27fn
3
vulnerability VCID-3qta-hpkg-hqad
4
vulnerability VCID-521g-8qbp-cfh3
5
vulnerability VCID-528p-7av9-1kgv
6
vulnerability VCID-5ry6-b22q-37gy
7
vulnerability VCID-6aaz-buqb-zfcm
8
vulnerability VCID-6hjf-zva4-ekcv
9
vulnerability VCID-6rvw-7p62-rbdf
10
vulnerability VCID-771b-5s45-hbhd
11
vulnerability VCID-7nn4-cj6x-uff8
12
vulnerability VCID-92kd-us53-qubg
13
vulnerability VCID-a741-fvg4-h3at
14
vulnerability VCID-bpqa-ngtx-pbes
15
vulnerability VCID-exgv-kz5w-w3bq
16
vulnerability VCID-f1qr-vrev-tbdc
17
vulnerability VCID-fp9x-81jx-fbhz
18
vulnerability VCID-h2zj-j6va-v7hs
19
vulnerability VCID-hatr-ngra-qqb6
20
vulnerability VCID-hmn3-mxh5-73fj
21
vulnerability VCID-hxhp-4xdt-fqfp
22
vulnerability VCID-jzft-takg-afb4
23
vulnerability VCID-kfe8-dy9e-ryc5
24
vulnerability VCID-m2g4-ecf6-sufy
25
vulnerability VCID-n1x7-a5e5-ckec
26
vulnerability VCID-p46s-buwz-h3by
27
vulnerability VCID-t93h-vv13-4bck
28
vulnerability VCID-tf3v-37zu-pkaf
29
vulnerability VCID-uj8y-np9h-8qg6
30
vulnerability VCID-v4u8-zktd-cfaq
31
vulnerability VCID-wxcy-bnsr-qkdn
32
vulnerability VCID-zup8-xngn-7bh7
33
vulnerability VCID-zz2u-cmgw-k3c1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.10.4-1
aliases CVE-2016-10199
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5vfg-uj1z-zudn
9
url VCID-6aaz-buqb-zfcm
vulnerability_id VCID-6aaz-buqb-zfcm
summary Multiple vulnerabilities have been discovered in gst-plugins-good, the worst of which could lead to denial of service or arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1924.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1924.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1924
reference_id
reference_type
scores
0
value 0.00043
scoring_system epss
scoring_elements 0.13003
published_at 2026-04-21T12:55:00Z
1
value 0.00043
scoring_system epss
scoring_elements 0.12901
published_at 2026-04-16T12:55:00Z
2
value 0.00043
scoring_system epss
scoring_elements 0.12903
published_at 2026-04-18T12:55:00Z
3
value 0.00056
scoring_system epss
scoring_elements 0.17662
published_at 2026-04-02T12:55:00Z
4
value 0.00056
scoring_system epss
scoring_elements 0.17428
published_at 2026-04-07T12:55:00Z
5
value 0.00056
scoring_system epss
scoring_elements 0.1752
published_at 2026-04-08T12:55:00Z
6
value 0.00056
scoring_system epss
scoring_elements 0.17581
published_at 2026-04-09T12:55:00Z
7
value 0.00056
scoring_system epss
scoring_elements 0.17595
published_at 2026-04-11T12:55:00Z
8
value 0.00056
scoring_system epss
scoring_elements 0.17548
published_at 2026-04-12T12:55:00Z
9
value 0.00056
scoring_system epss
scoring_elements 0.17495
published_at 2026-04-13T12:55:00Z
10
value 0.00056
scoring_system epss
scoring_elements 0.17499
published_at 2026-04-01T12:55:00Z
11
value 0.00056
scoring_system epss
scoring_elements 0.17708
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1924
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2131003
reference_id 2131003
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2131003
11
reference_url https://security.gentoo.org/glsa/202409-13
reference_id GLSA-202409-13
reference_type
scores
url https://security.gentoo.org/glsa/202409-13
12
reference_url https://access.redhat.com/errata/RHSA-2023:2260
reference_id RHSA-2023:2260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2260
13
reference_url https://usn.ubuntu.com/5555-1/
reference_id USN-5555-1
reference_type
scores
url https://usn.ubuntu.com/5555-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2
purl pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1g9u-gemh-83bw
1
vulnerability VCID-2nz4-ctek-zbfy
2
vulnerability VCID-358j-grsx-27fn
3
vulnerability VCID-3qta-hpkg-hqad
4
vulnerability VCID-4ka2-hbcv-8uh2
5
vulnerability VCID-528p-7av9-1kgv
6
vulnerability VCID-5ry6-b22q-37gy
7
vulnerability VCID-6hjf-zva4-ekcv
8
vulnerability VCID-6rvw-7p62-rbdf
9
vulnerability VCID-92kd-us53-qubg
10
vulnerability VCID-a741-fvg4-h3at
11
vulnerability VCID-bpqa-ngtx-pbes
12
vulnerability VCID-f1qr-vrev-tbdc
13
vulnerability VCID-fp9x-81jx-fbhz
14
vulnerability VCID-h2zj-j6va-v7hs
15
vulnerability VCID-hatr-ngra-qqb6
16
vulnerability VCID-hmn3-mxh5-73fj
17
vulnerability VCID-hxhp-4xdt-fqfp
18
vulnerability VCID-jzft-takg-afb4
19
vulnerability VCID-kfe8-dy9e-ryc5
20
vulnerability VCID-n1x7-a5e5-ckec
21
vulnerability VCID-p46s-buwz-h3by
22
vulnerability VCID-t93h-vv13-4bck
23
vulnerability VCID-uj8y-np9h-8qg6
24
vulnerability VCID-upbh-pvqc-4ubn
25
vulnerability VCID-v4u8-zktd-cfaq
26
vulnerability VCID-wxcy-bnsr-qkdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2
aliases CVE-2022-1924
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6aaz-buqb-zfcm
10
url VCID-6hjf-zva4-ekcv
vulnerability_id VCID-6hjf-zva4-ekcv
summary Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47537.json
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47537.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47537
reference_id
reference_type
scores
0
value 0.00119
scoring_system epss
scoring_elements 0.31058
published_at 2026-04-04T12:55:00Z
1
value 0.00119
scoring_system epss
scoring_elements 0.3101
published_at 2026-04-02T12:55:00Z
2
value 0.00204
scoring_system epss
scoring_elements 0.42632
published_at 2026-04-09T12:55:00Z
3
value 0.00204
scoring_system epss
scoring_elements 0.42636
published_at 2026-04-18T12:55:00Z
4
value 0.00204
scoring_system epss
scoring_elements 0.4265
published_at 2026-04-16T12:55:00Z
5
value 0.00204
scoring_system epss
scoring_elements 0.42591
published_at 2026-04-13T12:55:00Z
6
value 0.00204
scoring_system epss
scoring_elements 0.42655
published_at 2026-04-11T12:55:00Z
7
value 0.00204
scoring_system epss
scoring_elements 0.4257
published_at 2026-04-21T12:55:00Z
8
value 0.00204
scoring_system epss
scoring_elements 0.42619
published_at 2026-04-12T12:55:00Z
9
value 0.00204
scoring_system epss
scoring_elements 0.42569
published_at 2026-04-07T12:55:00Z
10
value 0.00204
scoring_system epss
scoring_elements 0.42621
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47537
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47537
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47537
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2331722
reference_id 2331722
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2331722
5
reference_url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch
reference_id 8059.patch
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T19:15:39Z/
url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch
6
reference_url https://securitylab.github.com/advisories/GHSL-2024-094_Gstreamer/
reference_id GHSL-2024-094_Gstreamer
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T19:15:39Z/
url https://securitylab.github.com/advisories/GHSL-2024-094_Gstreamer/
7
reference_url https://security.gentoo.org/glsa/202506-02
reference_id GLSA-202506-02
reference_type
scores
url https://security.gentoo.org/glsa/202506-02
8
reference_url https://access.redhat.com/errata/RHSA-2024:11119
reference_id RHSA-2024:11119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11119
9
reference_url https://access.redhat.com/errata/RHSA-2024:11121
reference_id RHSA-2024:11121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11121
10
reference_url https://access.redhat.com/errata/RHSA-2024:11122
reference_id RHSA-2024:11122
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11122
11
reference_url https://access.redhat.com/errata/RHSA-2024:11148
reference_id RHSA-2024:11148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11148
12
reference_url https://access.redhat.com/errata/RHSA-2024:11149
reference_id RHSA-2024:11149
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11149
13
reference_url https://access.redhat.com/errata/RHSA-2024:11298
reference_id RHSA-2024:11298
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11298
14
reference_url https://access.redhat.com/errata/RHSA-2024:11299
reference_id RHSA-2024:11299
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11299
15
reference_url https://access.redhat.com/errata/RHSA-2024:11344
reference_id RHSA-2024:11344
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11344
16
reference_url https://access.redhat.com/errata/RHSA-2024:11346
reference_id RHSA-2024:11346
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11346
17
reference_url https://access.redhat.com/errata/RHSA-2024:11348
reference_id RHSA-2024:11348
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11348
18
reference_url https://gstreamer.freedesktop.org/security/sa-2024-0005.html
reference_id sa-2024-0005.html
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T19:15:39Z/
url https://gstreamer.freedesktop.org/security/sa-2024-0005.html
19
reference_url https://usn.ubuntu.com/7176-1/
reference_id USN-7176-1
reference_type
scores
url https://usn.ubuntu.com/7176-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
purl pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1g9u-gemh-83bw
1
vulnerability VCID-4ka2-hbcv-8uh2
2
vulnerability VCID-6rvw-7p62-rbdf
3
vulnerability VCID-upbh-pvqc-4ubn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3
aliases CVE-2024-47537
risk_score 3.8
exploitability 0.5
weighted_severity 7.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6hjf-zva4-ekcv
11
url VCID-6rvw-7p62-rbdf
vulnerability_id VCID-6rvw-7p62-rbdf
summary gstreamer1-plugins-good: GStreamer MP4 Parser Heap Overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47183.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47183.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-47183
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04027
published_at 2026-04-02T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04306
published_at 2026-04-21T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04068
published_at 2026-04-11T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.04223
published_at 2026-04-12T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.04199
published_at 2026-04-13T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.04169
published_at 2026-04-16T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.04178
published_at 2026-04-18T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.04046
published_at 2026-04-04T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.0406
published_at 2026-04-07T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.04066
published_at 2026-04-08T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.04085
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-47183
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47183
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2387141
reference_id 2387141
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2387141
5
reference_url https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md
reference_id ATREDIS-2025-0003.md
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-11T19:44:07Z/
url https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md
6
reference_url https://gstreamer.freedesktop.org/security/
reference_id security
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-11T19:44:07Z/
url https://gstreamer.freedesktop.org/security/
7
reference_url https://usn.ubuntu.com/7717-1/
reference_id USN-7717-1
reference_type
scores
url https://usn.ubuntu.com/7717-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
purl pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1g9u-gemh-83bw
1
vulnerability VCID-4ka2-hbcv-8uh2
2
vulnerability VCID-6rvw-7p62-rbdf
3
vulnerability VCID-upbh-pvqc-4ubn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3
1
url pkg:deb/debian/gst-plugins-good1.0@1.26.2-1
purl pkg:deb/debian/gst-plugins-good1.0@1.26.2-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1g9u-gemh-83bw
1
vulnerability VCID-4ka2-hbcv-8uh2
2
vulnerability VCID-upbh-pvqc-4ubn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1
aliases CVE-2025-47183
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6rvw-7p62-rbdf
12
url VCID-771b-5s45-hbhd
vulnerability_id VCID-771b-5s45-hbhd
summary Multiple vulnerabilities have been found in GStreamer and its plugins, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3497.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3497.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3497
reference_id
reference_type
scores
0
value 0.00176
scoring_system epss
scoring_elements 0.38999
published_at 2026-04-01T12:55:00Z
1
value 0.00176
scoring_system epss
scoring_elements 0.39186
published_at 2026-04-02T12:55:00Z
2
value 0.00176
scoring_system epss
scoring_elements 0.39207
published_at 2026-04-04T12:55:00Z
3
value 0.00176
scoring_system epss
scoring_elements 0.39127
published_at 2026-04-07T12:55:00Z
4
value 0.00176
scoring_system epss
scoring_elements 0.39181
published_at 2026-04-08T12:55:00Z
5
value 0.00176
scoring_system epss
scoring_elements 0.39198
published_at 2026-04-09T12:55:00Z
6
value 0.00176
scoring_system epss
scoring_elements 0.39209
published_at 2026-04-11T12:55:00Z
7
value 0.00176
scoring_system epss
scoring_elements 0.39172
published_at 2026-04-12T12:55:00Z
8
value 0.00176
scoring_system epss
scoring_elements 0.39153
published_at 2026-04-13T12:55:00Z
9
value 0.00176
scoring_system epss
scoring_elements 0.39206
published_at 2026-04-16T12:55:00Z
10
value 0.00176
scoring_system epss
scoring_elements 0.39177
published_at 2026-04-18T12:55:00Z
11
value 0.00176
scoring_system epss
scoring_elements 0.39089
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3497
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3497
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3497
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3498
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1945339
reference_id 1945339
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1945339
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986910
reference_id 986910
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986910
7
reference_url https://security.gentoo.org/glsa/202208-31
reference_id GLSA-202208-31
reference_type
scores
url https://security.gentoo.org/glsa/202208-31
8
reference_url https://access.redhat.com/errata/RHSA-2022:7618
reference_id RHSA-2022:7618
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7618
9
reference_url https://usn.ubuntu.com/4928-1/
reference_id USN-4928-1
reference_type
scores
url https://usn.ubuntu.com/4928-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.14.4-1%2Bdeb10u1
purl pkg:deb/debian/gst-plugins-good1.0@1.14.4-1%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1kjc-6zdm-jkf3
1
vulnerability VCID-2nz4-ctek-zbfy
2
vulnerability VCID-358j-grsx-27fn
3
vulnerability VCID-3qta-hpkg-hqad
4
vulnerability VCID-521g-8qbp-cfh3
5
vulnerability VCID-528p-7av9-1kgv
6
vulnerability VCID-5ry6-b22q-37gy
7
vulnerability VCID-6aaz-buqb-zfcm
8
vulnerability VCID-6hjf-zva4-ekcv
9
vulnerability VCID-6rvw-7p62-rbdf
10
vulnerability VCID-771b-5s45-hbhd
11
vulnerability VCID-7nn4-cj6x-uff8
12
vulnerability VCID-92kd-us53-qubg
13
vulnerability VCID-a741-fvg4-h3at
14
vulnerability VCID-bpqa-ngtx-pbes
15
vulnerability VCID-exgv-kz5w-w3bq
16
vulnerability VCID-f1qr-vrev-tbdc
17
vulnerability VCID-fp9x-81jx-fbhz
18
vulnerability VCID-h2zj-j6va-v7hs
19
vulnerability VCID-hatr-ngra-qqb6
20
vulnerability VCID-hmn3-mxh5-73fj
21
vulnerability VCID-hxhp-4xdt-fqfp
22
vulnerability VCID-jzft-takg-afb4
23
vulnerability VCID-kfe8-dy9e-ryc5
24
vulnerability VCID-m2g4-ecf6-sufy
25
vulnerability VCID-n1x7-a5e5-ckec
26
vulnerability VCID-p46s-buwz-h3by
27
vulnerability VCID-t93h-vv13-4bck
28
vulnerability VCID-tf3v-37zu-pkaf
29
vulnerability VCID-uj8y-np9h-8qg6
30
vulnerability VCID-v4u8-zktd-cfaq
31
vulnerability VCID-wxcy-bnsr-qkdn
32
vulnerability VCID-zup8-xngn-7bh7
33
vulnerability VCID-zz2u-cmgw-k3c1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.14.4-1%252Bdeb10u1
1
url pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2
purl pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1g9u-gemh-83bw
1
vulnerability VCID-2nz4-ctek-zbfy
2
vulnerability VCID-358j-grsx-27fn
3
vulnerability VCID-3qta-hpkg-hqad
4
vulnerability VCID-4ka2-hbcv-8uh2
5
vulnerability VCID-528p-7av9-1kgv
6
vulnerability VCID-5ry6-b22q-37gy
7
vulnerability VCID-6hjf-zva4-ekcv
8
vulnerability VCID-6rvw-7p62-rbdf
9
vulnerability VCID-92kd-us53-qubg
10
vulnerability VCID-a741-fvg4-h3at
11
vulnerability VCID-bpqa-ngtx-pbes
12
vulnerability VCID-f1qr-vrev-tbdc
13
vulnerability VCID-fp9x-81jx-fbhz
14
vulnerability VCID-h2zj-j6va-v7hs
15
vulnerability VCID-hatr-ngra-qqb6
16
vulnerability VCID-hmn3-mxh5-73fj
17
vulnerability VCID-hxhp-4xdt-fqfp
18
vulnerability VCID-jzft-takg-afb4
19
vulnerability VCID-kfe8-dy9e-ryc5
20
vulnerability VCID-n1x7-a5e5-ckec
21
vulnerability VCID-p46s-buwz-h3by
22
vulnerability VCID-t93h-vv13-4bck
23
vulnerability VCID-uj8y-np9h-8qg6
24
vulnerability VCID-upbh-pvqc-4ubn
25
vulnerability VCID-v4u8-zktd-cfaq
26
vulnerability VCID-wxcy-bnsr-qkdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2
aliases CVE-2021-3497
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-771b-5s45-hbhd
13
url VCID-7nn4-cj6x-uff8
vulnerability_id VCID-7nn4-cj6x-uff8
summary Multiple vulnerabilities have been found in GStreamer and its plugins, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3498.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3498.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3498
reference_id
reference_type
scores
0
value 0.00238
scoring_system epss
scoring_elements 0.46817
published_at 2026-04-01T12:55:00Z
1
value 0.00238
scoring_system epss
scoring_elements 0.46855
published_at 2026-04-02T12:55:00Z
2
value 0.00238
scoring_system epss
scoring_elements 0.46872
published_at 2026-04-04T12:55:00Z
3
value 0.00238
scoring_system epss
scoring_elements 0.4682
published_at 2026-04-07T12:55:00Z
4
value 0.00238
scoring_system epss
scoring_elements 0.46875
published_at 2026-04-08T12:55:00Z
5
value 0.00238
scoring_system epss
scoring_elements 0.46874
published_at 2026-04-09T12:55:00Z
6
value 0.00238
scoring_system epss
scoring_elements 0.46897
published_at 2026-04-11T12:55:00Z
7
value 0.00238
scoring_system epss
scoring_elements 0.4687
published_at 2026-04-12T12:55:00Z
8
value 0.00238
scoring_system epss
scoring_elements 0.46877
published_at 2026-04-13T12:55:00Z
9
value 0.00238
scoring_system epss
scoring_elements 0.46933
published_at 2026-04-16T12:55:00Z
10
value 0.00238
scoring_system epss
scoring_elements 0.46929
published_at 2026-04-18T12:55:00Z
11
value 0.00238
scoring_system epss
scoring_elements 0.46878
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3498
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3497
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3497
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3498
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1945342
reference_id 1945342
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1945342
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986911
reference_id 986911
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986911
7
reference_url https://security.gentoo.org/glsa/202208-31
reference_id GLSA-202208-31
reference_type
scores
url https://security.gentoo.org/glsa/202208-31
8
reference_url https://usn.ubuntu.com/4928-1/
reference_id USN-4928-1
reference_type
scores
url https://usn.ubuntu.com/4928-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.14.4-1%2Bdeb10u1
purl pkg:deb/debian/gst-plugins-good1.0@1.14.4-1%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1kjc-6zdm-jkf3
1
vulnerability VCID-2nz4-ctek-zbfy
2
vulnerability VCID-358j-grsx-27fn
3
vulnerability VCID-3qta-hpkg-hqad
4
vulnerability VCID-521g-8qbp-cfh3
5
vulnerability VCID-528p-7av9-1kgv
6
vulnerability VCID-5ry6-b22q-37gy
7
vulnerability VCID-6aaz-buqb-zfcm
8
vulnerability VCID-6hjf-zva4-ekcv
9
vulnerability VCID-6rvw-7p62-rbdf
10
vulnerability VCID-771b-5s45-hbhd
11
vulnerability VCID-7nn4-cj6x-uff8
12
vulnerability VCID-92kd-us53-qubg
13
vulnerability VCID-a741-fvg4-h3at
14
vulnerability VCID-bpqa-ngtx-pbes
15
vulnerability VCID-exgv-kz5w-w3bq
16
vulnerability VCID-f1qr-vrev-tbdc
17
vulnerability VCID-fp9x-81jx-fbhz
18
vulnerability VCID-h2zj-j6va-v7hs
19
vulnerability VCID-hatr-ngra-qqb6
20
vulnerability VCID-hmn3-mxh5-73fj
21
vulnerability VCID-hxhp-4xdt-fqfp
22
vulnerability VCID-jzft-takg-afb4
23
vulnerability VCID-kfe8-dy9e-ryc5
24
vulnerability VCID-m2g4-ecf6-sufy
25
vulnerability VCID-n1x7-a5e5-ckec
26
vulnerability VCID-p46s-buwz-h3by
27
vulnerability VCID-t93h-vv13-4bck
28
vulnerability VCID-tf3v-37zu-pkaf
29
vulnerability VCID-uj8y-np9h-8qg6
30
vulnerability VCID-v4u8-zktd-cfaq
31
vulnerability VCID-wxcy-bnsr-qkdn
32
vulnerability VCID-zup8-xngn-7bh7
33
vulnerability VCID-zz2u-cmgw-k3c1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.14.4-1%252Bdeb10u1
1
url pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2
purl pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1g9u-gemh-83bw
1
vulnerability VCID-2nz4-ctek-zbfy
2
vulnerability VCID-358j-grsx-27fn
3
vulnerability VCID-3qta-hpkg-hqad
4
vulnerability VCID-4ka2-hbcv-8uh2
5
vulnerability VCID-528p-7av9-1kgv
6
vulnerability VCID-5ry6-b22q-37gy
7
vulnerability VCID-6hjf-zva4-ekcv
8
vulnerability VCID-6rvw-7p62-rbdf
9
vulnerability VCID-92kd-us53-qubg
10
vulnerability VCID-a741-fvg4-h3at
11
vulnerability VCID-bpqa-ngtx-pbes
12
vulnerability VCID-f1qr-vrev-tbdc
13
vulnerability VCID-fp9x-81jx-fbhz
14
vulnerability VCID-h2zj-j6va-v7hs
15
vulnerability VCID-hatr-ngra-qqb6
16
vulnerability VCID-hmn3-mxh5-73fj
17
vulnerability VCID-hxhp-4xdt-fqfp
18
vulnerability VCID-jzft-takg-afb4
19
vulnerability VCID-kfe8-dy9e-ryc5
20
vulnerability VCID-n1x7-a5e5-ckec
21
vulnerability VCID-p46s-buwz-h3by
22
vulnerability VCID-t93h-vv13-4bck
23
vulnerability VCID-uj8y-np9h-8qg6
24
vulnerability VCID-upbh-pvqc-4ubn
25
vulnerability VCID-v4u8-zktd-cfaq
26
vulnerability VCID-wxcy-bnsr-qkdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2
aliases CVE-2021-3498
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7nn4-cj6x-uff8
14
url VCID-92kd-us53-qubg
vulnerability_id VCID-92kd-us53-qubg
summary Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47598.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47598.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47598
reference_id
reference_type
scores
0
value 0.00064
scoring_system epss
scoring_elements 0.20013
published_at 2026-04-04T12:55:00Z
1
value 0.00064
scoring_system epss
scoring_elements 0.19956
published_at 2026-04-02T12:55:00Z
2
value 0.00109
scoring_system epss
scoring_elements 0.29151
published_at 2026-04-18T12:55:00Z
3
value 0.00109
scoring_system epss
scoring_elements 0.29199
published_at 2026-04-12T12:55:00Z
4
value 0.00109
scoring_system epss
scoring_elements 0.29239
published_at 2026-04-09T12:55:00Z
5
value 0.00109
scoring_system epss
scoring_elements 0.29245
published_at 2026-04-11T12:55:00Z
6
value 0.00109
scoring_system epss
scoring_elements 0.29147
published_at 2026-04-13T12:55:00Z
7
value 0.00109
scoring_system epss
scoring_elements 0.29174
published_at 2026-04-16T12:55:00Z
8
value 0.00109
scoring_system epss
scoring_elements 0.29102
published_at 2026-04-21T12:55:00Z
9
value 0.00109
scoring_system epss
scoring_elements 0.29135
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47598
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47598
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2331761
reference_id 2331761
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2331761
5
reference_url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch
reference_id 8059.patch
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:40:02Z/
url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch
6
reference_url https://securitylab.github.com/advisories/GHSL-2024-246_Gstreamer/
reference_id GHSL-2024-246_Gstreamer
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:40:02Z/
url https://securitylab.github.com/advisories/GHSL-2024-246_Gstreamer/
7
reference_url https://security.gentoo.org/glsa/202506-02
reference_id GLSA-202506-02
reference_type
scores
url https://security.gentoo.org/glsa/202506-02
8
reference_url https://access.redhat.com/errata/RHSA-2025:7242
reference_id RHSA-2025:7242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7242
9
reference_url https://gstreamer.freedesktop.org/security/sa-2024-0006.html
reference_id sa-2024-0006.html
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:40:02Z/
url https://gstreamer.freedesktop.org/security/sa-2024-0006.html
10
reference_url https://usn.ubuntu.com/7176-1/
reference_id USN-7176-1
reference_type
scores
url https://usn.ubuntu.com/7176-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
purl pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1g9u-gemh-83bw
1
vulnerability VCID-4ka2-hbcv-8uh2
2
vulnerability VCID-6rvw-7p62-rbdf
3
vulnerability VCID-upbh-pvqc-4ubn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3
aliases CVE-2024-47598
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-92kd-us53-qubg
15
url VCID-a741-fvg4-h3at
vulnerability_id VCID-a741-fvg4-h3at
summary Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47775.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47775.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47775
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20283
published_at 2026-04-04T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20224
published_at 2026-04-02T12:55:00Z
2
value 0.00111
scoring_system epss
scoring_elements 0.29425
published_at 2026-04-13T12:55:00Z
3
value 0.00111
scoring_system epss
scoring_elements 0.29418
published_at 2026-04-18T12:55:00Z
4
value 0.00111
scoring_system epss
scoring_elements 0.29518
published_at 2026-04-09T12:55:00Z
5
value 0.00111
scoring_system epss
scoring_elements 0.29522
published_at 2026-04-11T12:55:00Z
6
value 0.00111
scoring_system epss
scoring_elements 0.29477
published_at 2026-04-12T12:55:00Z
7
value 0.00111
scoring_system epss
scoring_elements 0.29445
published_at 2026-04-16T12:55:00Z
8
value 0.00111
scoring_system epss
scoring_elements 0.29372
published_at 2026-04-21T12:55:00Z
9
value 0.00111
scoring_system epss
scoring_elements 0.29415
published_at 2026-04-07T12:55:00Z
10
value 0.00111
scoring_system epss
scoring_elements 0.29478
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47775
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47775
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2331744
reference_id 2331744
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2331744
5
reference_url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8042.patch
reference_id 8042.patch
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:06:26Z/
url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8042.patch
6
reference_url https://securitylab.github.com/advisories/GHSL-2024-261_Gstreamer/
reference_id GHSL-2024-261_Gstreamer
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:06:26Z/
url https://securitylab.github.com/advisories/GHSL-2024-261_Gstreamer/
7
reference_url https://security.gentoo.org/glsa/202506-02
reference_id GLSA-202506-02
reference_type
scores
url https://security.gentoo.org/glsa/202506-02
8
reference_url https://access.redhat.com/errata/RHSA-2025:7242
reference_id RHSA-2025:7242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7242
9
reference_url https://gstreamer.freedesktop.org/security/sa-2024-0027.html
reference_id sa-2024-0027.html
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:06:26Z/
url https://gstreamer.freedesktop.org/security/sa-2024-0027.html
10
reference_url https://usn.ubuntu.com/7176-1/
reference_id USN-7176-1
reference_type
scores
url https://usn.ubuntu.com/7176-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
purl pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1g9u-gemh-83bw
1
vulnerability VCID-4ka2-hbcv-8uh2
2
vulnerability VCID-6rvw-7p62-rbdf
3
vulnerability VCID-upbh-pvqc-4ubn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3
aliases CVE-2024-47775
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a741-fvg4-h3at
16
url VCID-bk2h-q83z-43cn
vulnerability_id VCID-bk2h-q83z-43cn
summary
Multiple vulnerabilities have been found in various GStreamer
    plug-ins, the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10198.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10198.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-10198
reference_id
reference_type
scores
0
value 0.00756
scoring_system epss
scoring_elements 0.73208
published_at 2026-04-01T12:55:00Z
1
value 0.00756
scoring_system epss
scoring_elements 0.73311
published_at 2026-04-18T12:55:00Z
2
value 0.00756
scoring_system epss
scoring_elements 0.7326
published_at 2026-04-13T12:55:00Z
3
value 0.00756
scoring_system epss
scoring_elements 0.73303
published_at 2026-04-21T12:55:00Z
4
value 0.00756
scoring_system epss
scoring_elements 0.73218
published_at 2026-04-02T12:55:00Z
5
value 0.00756
scoring_system epss
scoring_elements 0.73239
published_at 2026-04-04T12:55:00Z
6
value 0.00756
scoring_system epss
scoring_elements 0.73212
published_at 2026-04-07T12:55:00Z
7
value 0.00756
scoring_system epss
scoring_elements 0.73248
published_at 2026-04-08T12:55:00Z
8
value 0.00756
scoring_system epss
scoring_elements 0.73262
published_at 2026-04-09T12:55:00Z
9
value 0.00756
scoring_system epss
scoring_elements 0.73287
published_at 2026-04-11T12:55:00Z
10
value 0.00756
scoring_system epss
scoring_elements 0.73267
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-10198
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10198
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10199
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5840
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5841
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5841
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5845
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1419558
reference_id 1419558
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1419558
9
reference_url https://security.archlinux.org/ASA-201702-3
reference_id ASA-201702-3
reference_type
scores
url https://security.archlinux.org/ASA-201702-3
10
reference_url https://security.archlinux.org/AVG-163
reference_id AVG-163
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-163
11
reference_url https://security.gentoo.org/glsa/201705-10
reference_id GLSA-201705-10
reference_type
scores
url https://security.gentoo.org/glsa/201705-10
12
reference_url https://access.redhat.com/errata/RHSA-2017:2060
reference_id RHSA-2017:2060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2060
13
reference_url https://usn.ubuntu.com/3245-1/
reference_id USN-3245-1
reference_type
scores
url https://usn.ubuntu.com/3245-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.4.4-2%2Bdeb8u3
purl pkg:deb/debian/gst-plugins-good1.0@1.4.4-2%2Bdeb8u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1kjc-6zdm-jkf3
1
vulnerability VCID-1z2g-dxzn-27d2
2
vulnerability VCID-2nz4-ctek-zbfy
3
vulnerability VCID-358j-grsx-27fn
4
vulnerability VCID-3qta-hpkg-hqad
5
vulnerability VCID-521g-8qbp-cfh3
6
vulnerability VCID-528p-7av9-1kgv
7
vulnerability VCID-5ry6-b22q-37gy
8
vulnerability VCID-5vfg-uj1z-zudn
9
vulnerability VCID-6aaz-buqb-zfcm
10
vulnerability VCID-6hjf-zva4-ekcv
11
vulnerability VCID-6rvw-7p62-rbdf
12
vulnerability VCID-771b-5s45-hbhd
13
vulnerability VCID-7nn4-cj6x-uff8
14
vulnerability VCID-92kd-us53-qubg
15
vulnerability VCID-a741-fvg4-h3at
16
vulnerability VCID-bk2h-q83z-43cn
17
vulnerability VCID-bpqa-ngtx-pbes
18
vulnerability VCID-byg3-424m-w3gs
19
vulnerability VCID-cnza-7ar1-f7eh
20
vulnerability VCID-exgv-kz5w-w3bq
21
vulnerability VCID-f1k9-rdv3-nqen
22
vulnerability VCID-f1qr-vrev-tbdc
23
vulnerability VCID-fp9x-81jx-fbhz
24
vulnerability VCID-h2zj-j6va-v7hs
25
vulnerability VCID-hatr-ngra-qqb6
26
vulnerability VCID-hgch-q86h-4qcn
27
vulnerability VCID-hmn3-mxh5-73fj
28
vulnerability VCID-hxhp-4xdt-fqfp
29
vulnerability VCID-j1w1-4xvp-7bh8
30
vulnerability VCID-jzft-takg-afb4
31
vulnerability VCID-k1t8-1fq9-m3gg
32
vulnerability VCID-kfe8-dy9e-ryc5
33
vulnerability VCID-m2g4-ecf6-sufy
34
vulnerability VCID-mcdu-z138-vkgv
35
vulnerability VCID-n1tt-vu7b-skew
36
vulnerability VCID-n1x7-a5e5-ckec
37
vulnerability VCID-p46s-buwz-h3by
38
vulnerability VCID-t93h-vv13-4bck
39
vulnerability VCID-tf3v-37zu-pkaf
40
vulnerability VCID-uj8y-np9h-8qg6
41
vulnerability VCID-v4u8-zktd-cfaq
42
vulnerability VCID-wxcy-bnsr-qkdn
43
vulnerability VCID-zup8-xngn-7bh7
44
vulnerability VCID-zz2u-cmgw-k3c1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.4.4-2%252Bdeb8u3
1
url pkg:deb/debian/gst-plugins-good1.0@1.10.4-1
purl pkg:deb/debian/gst-plugins-good1.0@1.10.4-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1kjc-6zdm-jkf3
1
vulnerability VCID-2nz4-ctek-zbfy
2
vulnerability VCID-358j-grsx-27fn
3
vulnerability VCID-3qta-hpkg-hqad
4
vulnerability VCID-521g-8qbp-cfh3
5
vulnerability VCID-528p-7av9-1kgv
6
vulnerability VCID-5ry6-b22q-37gy
7
vulnerability VCID-6aaz-buqb-zfcm
8
vulnerability VCID-6hjf-zva4-ekcv
9
vulnerability VCID-6rvw-7p62-rbdf
10
vulnerability VCID-771b-5s45-hbhd
11
vulnerability VCID-7nn4-cj6x-uff8
12
vulnerability VCID-92kd-us53-qubg
13
vulnerability VCID-a741-fvg4-h3at
14
vulnerability VCID-bpqa-ngtx-pbes
15
vulnerability VCID-exgv-kz5w-w3bq
16
vulnerability VCID-f1qr-vrev-tbdc
17
vulnerability VCID-fp9x-81jx-fbhz
18
vulnerability VCID-h2zj-j6va-v7hs
19
vulnerability VCID-hatr-ngra-qqb6
20
vulnerability VCID-hmn3-mxh5-73fj
21
vulnerability VCID-hxhp-4xdt-fqfp
22
vulnerability VCID-jzft-takg-afb4
23
vulnerability VCID-kfe8-dy9e-ryc5
24
vulnerability VCID-m2g4-ecf6-sufy
25
vulnerability VCID-n1x7-a5e5-ckec
26
vulnerability VCID-p46s-buwz-h3by
27
vulnerability VCID-t93h-vv13-4bck
28
vulnerability VCID-tf3v-37zu-pkaf
29
vulnerability VCID-uj8y-np9h-8qg6
30
vulnerability VCID-v4u8-zktd-cfaq
31
vulnerability VCID-wxcy-bnsr-qkdn
32
vulnerability VCID-zup8-xngn-7bh7
33
vulnerability VCID-zz2u-cmgw-k3c1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.10.4-1
aliases CVE-2016-10198
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bk2h-q83z-43cn
17
url VCID-bpqa-ngtx-pbes
vulnerability_id VCID-bpqa-ngtx-pbes
summary gstreamer1-plugins-good: GStreamer MP4 Parser Heap Overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47219.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47219.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-47219
reference_id
reference_type
scores
0
value 0.00093
scoring_system epss
scoring_elements 0.26095
published_at 2026-04-02T12:55:00Z
1
value 0.00093
scoring_system epss
scoring_elements 0.25901
published_at 2026-04-07T12:55:00Z
2
value 0.00093
scoring_system epss
scoring_elements 0.26135
published_at 2026-04-04T12:55:00Z
3
value 0.00093
scoring_system epss
scoring_elements 0.25969
published_at 2026-04-08T12:55:00Z
4
value 0.00093
scoring_system epss
scoring_elements 0.2602
published_at 2026-04-09T12:55:00Z
5
value 0.00093
scoring_system epss
scoring_elements 0.26031
published_at 2026-04-11T12:55:00Z
6
value 0.00101
scoring_system epss
scoring_elements 0.27924
published_at 2026-04-13T12:55:00Z
7
value 0.00101
scoring_system epss
scoring_elements 0.27935
published_at 2026-04-16T12:55:00Z
8
value 0.00101
scoring_system epss
scoring_elements 0.27917
published_at 2026-04-18T12:55:00Z
9
value 0.00101
scoring_system epss
scoring_elements 0.27874
published_at 2026-04-21T12:55:00Z
10
value 0.00101
scoring_system epss
scoring_elements 0.27982
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-47219
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47219
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2387142
reference_id 2387142
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2387142
5
reference_url https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md
reference_id ATREDIS-2025-0003.md
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-08-08T15:54:29Z/
url https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md
6
reference_url https://gstreamer.freedesktop.org/security/
reference_id security
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-08-08T15:54:29Z/
url https://gstreamer.freedesktop.org/security/
7
reference_url https://usn.ubuntu.com/7717-1/
reference_id USN-7717-1
reference_type
scores
url https://usn.ubuntu.com/7717-1/
8
reference_url https://usn.ubuntu.com/7837-1/
reference_id USN-7837-1
reference_type
scores
url https://usn.ubuntu.com/7837-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
purl pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1g9u-gemh-83bw
1
vulnerability VCID-4ka2-hbcv-8uh2
2
vulnerability VCID-6rvw-7p62-rbdf
3
vulnerability VCID-upbh-pvqc-4ubn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3
aliases CVE-2025-47219
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bpqa-ngtx-pbes
18
url VCID-byg3-424m-w3gs
vulnerability_id VCID-byg3-424m-w3gs
summary
Multiple vulnerabilities have been found in various GStreamer
    plug-ins, the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9634.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9634.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9634
reference_id
reference_type
scores
0
value 0.16094
scoring_system epss
scoring_elements 0.94755
published_at 2026-04-01T12:55:00Z
1
value 0.16094
scoring_system epss
scoring_elements 0.94764
published_at 2026-04-02T12:55:00Z
2
value 0.16094
scoring_system epss
scoring_elements 0.94768
published_at 2026-04-04T12:55:00Z
3
value 0.16094
scoring_system epss
scoring_elements 0.94769
published_at 2026-04-07T12:55:00Z
4
value 0.16094
scoring_system epss
scoring_elements 0.94779
published_at 2026-04-08T12:55:00Z
5
value 0.16094
scoring_system epss
scoring_elements 0.94783
published_at 2026-04-09T12:55:00Z
6
value 0.16094
scoring_system epss
scoring_elements 0.94787
published_at 2026-04-11T12:55:00Z
7
value 0.16094
scoring_system epss
scoring_elements 0.94791
published_at 2026-04-12T12:55:00Z
8
value 0.16094
scoring_system epss
scoring_elements 0.94792
published_at 2026-04-13T12:55:00Z
9
value 0.16094
scoring_system epss
scoring_elements 0.94799
published_at 2026-04-16T12:55:00Z
10
value 0.16094
scoring_system epss
scoring_elements 0.94803
published_at 2026-04-18T12:55:00Z
11
value 0.16094
scoring_system epss
scoring_elements 0.94806
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9634
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9634
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9634
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9635
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9636
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1397441
reference_id 1397441
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1397441
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845375
reference_id 845375
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845375
8
reference_url https://security.gentoo.org/glsa/201705-10
reference_id GLSA-201705-10
reference_type
scores
url https://security.gentoo.org/glsa/201705-10
9
reference_url https://access.redhat.com/errata/RHSA-2016:2975
reference_id RHSA-2016:2975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2975
10
reference_url https://access.redhat.com/errata/RHSA-2017:0019
reference_id RHSA-2017:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0019
11
reference_url https://access.redhat.com/errata/RHSA-2017:0020
reference_id RHSA-2017:0020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0020
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.4.4-2%2Bdeb8u3
purl pkg:deb/debian/gst-plugins-good1.0@1.4.4-2%2Bdeb8u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1kjc-6zdm-jkf3
1
vulnerability VCID-1z2g-dxzn-27d2
2
vulnerability VCID-2nz4-ctek-zbfy
3
vulnerability VCID-358j-grsx-27fn
4
vulnerability VCID-3qta-hpkg-hqad
5
vulnerability VCID-521g-8qbp-cfh3
6
vulnerability VCID-528p-7av9-1kgv
7
vulnerability VCID-5ry6-b22q-37gy
8
vulnerability VCID-5vfg-uj1z-zudn
9
vulnerability VCID-6aaz-buqb-zfcm
10
vulnerability VCID-6hjf-zva4-ekcv
11
vulnerability VCID-6rvw-7p62-rbdf
12
vulnerability VCID-771b-5s45-hbhd
13
vulnerability VCID-7nn4-cj6x-uff8
14
vulnerability VCID-92kd-us53-qubg
15
vulnerability VCID-a741-fvg4-h3at
16
vulnerability VCID-bk2h-q83z-43cn
17
vulnerability VCID-bpqa-ngtx-pbes
18
vulnerability VCID-byg3-424m-w3gs
19
vulnerability VCID-cnza-7ar1-f7eh
20
vulnerability VCID-exgv-kz5w-w3bq
21
vulnerability VCID-f1k9-rdv3-nqen
22
vulnerability VCID-f1qr-vrev-tbdc
23
vulnerability VCID-fp9x-81jx-fbhz
24
vulnerability VCID-h2zj-j6va-v7hs
25
vulnerability VCID-hatr-ngra-qqb6
26
vulnerability VCID-hgch-q86h-4qcn
27
vulnerability VCID-hmn3-mxh5-73fj
28
vulnerability VCID-hxhp-4xdt-fqfp
29
vulnerability VCID-j1w1-4xvp-7bh8
30
vulnerability VCID-jzft-takg-afb4
31
vulnerability VCID-k1t8-1fq9-m3gg
32
vulnerability VCID-kfe8-dy9e-ryc5
33
vulnerability VCID-m2g4-ecf6-sufy
34
vulnerability VCID-mcdu-z138-vkgv
35
vulnerability VCID-n1tt-vu7b-skew
36
vulnerability VCID-n1x7-a5e5-ckec
37
vulnerability VCID-p46s-buwz-h3by
38
vulnerability VCID-t93h-vv13-4bck
39
vulnerability VCID-tf3v-37zu-pkaf
40
vulnerability VCID-uj8y-np9h-8qg6
41
vulnerability VCID-v4u8-zktd-cfaq
42
vulnerability VCID-wxcy-bnsr-qkdn
43
vulnerability VCID-zup8-xngn-7bh7
44
vulnerability VCID-zz2u-cmgw-k3c1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.4.4-2%252Bdeb8u3
1
url pkg:deb/debian/gst-plugins-good1.0@1.10.4-1
purl pkg:deb/debian/gst-plugins-good1.0@1.10.4-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1kjc-6zdm-jkf3
1
vulnerability VCID-2nz4-ctek-zbfy
2
vulnerability VCID-358j-grsx-27fn
3
vulnerability VCID-3qta-hpkg-hqad
4
vulnerability VCID-521g-8qbp-cfh3
5
vulnerability VCID-528p-7av9-1kgv
6
vulnerability VCID-5ry6-b22q-37gy
7
vulnerability VCID-6aaz-buqb-zfcm
8
vulnerability VCID-6hjf-zva4-ekcv
9
vulnerability VCID-6rvw-7p62-rbdf
10
vulnerability VCID-771b-5s45-hbhd
11
vulnerability VCID-7nn4-cj6x-uff8
12
vulnerability VCID-92kd-us53-qubg
13
vulnerability VCID-a741-fvg4-h3at
14
vulnerability VCID-bpqa-ngtx-pbes
15
vulnerability VCID-exgv-kz5w-w3bq
16
vulnerability VCID-f1qr-vrev-tbdc
17
vulnerability VCID-fp9x-81jx-fbhz
18
vulnerability VCID-h2zj-j6va-v7hs
19
vulnerability VCID-hatr-ngra-qqb6
20
vulnerability VCID-hmn3-mxh5-73fj
21
vulnerability VCID-hxhp-4xdt-fqfp
22
vulnerability VCID-jzft-takg-afb4
23
vulnerability VCID-kfe8-dy9e-ryc5
24
vulnerability VCID-m2g4-ecf6-sufy
25
vulnerability VCID-n1x7-a5e5-ckec
26
vulnerability VCID-p46s-buwz-h3by
27
vulnerability VCID-t93h-vv13-4bck
28
vulnerability VCID-tf3v-37zu-pkaf
29
vulnerability VCID-uj8y-np9h-8qg6
30
vulnerability VCID-v4u8-zktd-cfaq
31
vulnerability VCID-wxcy-bnsr-qkdn
32
vulnerability VCID-zup8-xngn-7bh7
33
vulnerability VCID-zz2u-cmgw-k3c1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.10.4-1
aliases CVE-2016-9634
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-byg3-424m-w3gs
19
url VCID-cnza-7ar1-f7eh
vulnerability_id VCID-cnza-7ar1-f7eh
summary
Multiple vulnerabilities have been found in various GStreamer
    plug-ins, the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9808.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9808.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9808
reference_id
reference_type
scores
0
value 0.05492
scoring_system epss
scoring_elements 0.90177
published_at 2026-04-01T12:55:00Z
1
value 0.05492
scoring_system epss
scoring_elements 0.9018
published_at 2026-04-02T12:55:00Z
2
value 0.05492
scoring_system epss
scoring_elements 0.90192
published_at 2026-04-04T12:55:00Z
3
value 0.05492
scoring_system epss
scoring_elements 0.90197
published_at 2026-04-07T12:55:00Z
4
value 0.05492
scoring_system epss
scoring_elements 0.90213
published_at 2026-04-08T12:55:00Z
5
value 0.05492
scoring_system epss
scoring_elements 0.90218
published_at 2026-04-09T12:55:00Z
6
value 0.05492
scoring_system epss
scoring_elements 0.90227
published_at 2026-04-11T12:55:00Z
7
value 0.05492
scoring_system epss
scoring_elements 0.90226
published_at 2026-04-12T12:55:00Z
8
value 0.05492
scoring_system epss
scoring_elements 0.90221
published_at 2026-04-13T12:55:00Z
9
value 0.05492
scoring_system epss
scoring_elements 0.90239
published_at 2026-04-18T12:55:00Z
10
value 0.05492
scoring_system epss
scoring_elements 0.90235
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9808
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9808
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1397441
reference_id 1397441
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1397441
5
reference_url https://security.gentoo.org/glsa/201705-10
reference_id GLSA-201705-10
reference_type
scores
url https://security.gentoo.org/glsa/201705-10
6
reference_url https://access.redhat.com/errata/RHSA-2016:2975
reference_id RHSA-2016:2975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2975
7
reference_url https://access.redhat.com/errata/RHSA-2017:0019
reference_id RHSA-2017:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0019
8
reference_url https://access.redhat.com/errata/RHSA-2017:0020
reference_id RHSA-2017:0020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0020
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.10.4-1
purl pkg:deb/debian/gst-plugins-good1.0@1.10.4-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1kjc-6zdm-jkf3
1
vulnerability VCID-2nz4-ctek-zbfy
2
vulnerability VCID-358j-grsx-27fn
3
vulnerability VCID-3qta-hpkg-hqad
4
vulnerability VCID-521g-8qbp-cfh3
5
vulnerability VCID-528p-7av9-1kgv
6
vulnerability VCID-5ry6-b22q-37gy
7
vulnerability VCID-6aaz-buqb-zfcm
8
vulnerability VCID-6hjf-zva4-ekcv
9
vulnerability VCID-6rvw-7p62-rbdf
10
vulnerability VCID-771b-5s45-hbhd
11
vulnerability VCID-7nn4-cj6x-uff8
12
vulnerability VCID-92kd-us53-qubg
13
vulnerability VCID-a741-fvg4-h3at
14
vulnerability VCID-bpqa-ngtx-pbes
15
vulnerability VCID-exgv-kz5w-w3bq
16
vulnerability VCID-f1qr-vrev-tbdc
17
vulnerability VCID-fp9x-81jx-fbhz
18
vulnerability VCID-h2zj-j6va-v7hs
19
vulnerability VCID-hatr-ngra-qqb6
20
vulnerability VCID-hmn3-mxh5-73fj
21
vulnerability VCID-hxhp-4xdt-fqfp
22
vulnerability VCID-jzft-takg-afb4
23
vulnerability VCID-kfe8-dy9e-ryc5
24
vulnerability VCID-m2g4-ecf6-sufy
25
vulnerability VCID-n1x7-a5e5-ckec
26
vulnerability VCID-p46s-buwz-h3by
27
vulnerability VCID-t93h-vv13-4bck
28
vulnerability VCID-tf3v-37zu-pkaf
29
vulnerability VCID-uj8y-np9h-8qg6
30
vulnerability VCID-v4u8-zktd-cfaq
31
vulnerability VCID-wxcy-bnsr-qkdn
32
vulnerability VCID-zup8-xngn-7bh7
33
vulnerability VCID-zz2u-cmgw-k3c1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.10.4-1
aliases CVE-2016-9808
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cnza-7ar1-f7eh
20
url VCID-exgv-kz5w-w3bq
vulnerability_id VCID-exgv-kz5w-w3bq
summary Multiple vulnerabilities have been discovered in gst-plugins-good, the worst of which could lead to denial of service or arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1920.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1920.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1920
reference_id
reference_type
scores
0
value 0.00072
scoring_system epss
scoring_elements 0.21961
published_at 2026-04-01T12:55:00Z
1
value 0.00072
scoring_system epss
scoring_elements 0.2212
published_at 2026-04-02T12:55:00Z
2
value 0.00072
scoring_system epss
scoring_elements 0.22169
published_at 2026-04-04T12:55:00Z
3
value 0.00072
scoring_system epss
scoring_elements 0.21952
published_at 2026-04-07T12:55:00Z
4
value 0.00072
scoring_system epss
scoring_elements 0.22033
published_at 2026-04-08T12:55:00Z
5
value 0.00072
scoring_system epss
scoring_elements 0.22088
published_at 2026-04-09T12:55:00Z
6
value 0.00072
scoring_system epss
scoring_elements 0.22104
published_at 2026-04-11T12:55:00Z
7
value 0.00072
scoring_system epss
scoring_elements 0.22062
published_at 2026-04-12T12:55:00Z
8
value 0.00072
scoring_system epss
scoring_elements 0.22003
published_at 2026-04-13T12:55:00Z
9
value 0.00072
scoring_system epss
scoring_elements 0.22001
published_at 2026-04-16T12:55:00Z
10
value 0.00072
scoring_system epss
scoring_elements 0.21995
published_at 2026-04-18T12:55:00Z
11
value 0.00072
scoring_system epss
scoring_elements 0.21949
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1920
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2130935
reference_id 2130935
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2130935
11
reference_url https://security.gentoo.org/glsa/202409-13
reference_id GLSA-202409-13
reference_type
scores
url https://security.gentoo.org/glsa/202409-13
12
reference_url https://access.redhat.com/errata/RHSA-2023:2260
reference_id RHSA-2023:2260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2260
13
reference_url https://usn.ubuntu.com/5555-1/
reference_id USN-5555-1
reference_type
scores
url https://usn.ubuntu.com/5555-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2
purl pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1g9u-gemh-83bw
1
vulnerability VCID-2nz4-ctek-zbfy
2
vulnerability VCID-358j-grsx-27fn
3
vulnerability VCID-3qta-hpkg-hqad
4
vulnerability VCID-4ka2-hbcv-8uh2
5
vulnerability VCID-528p-7av9-1kgv
6
vulnerability VCID-5ry6-b22q-37gy
7
vulnerability VCID-6hjf-zva4-ekcv
8
vulnerability VCID-6rvw-7p62-rbdf
9
vulnerability VCID-92kd-us53-qubg
10
vulnerability VCID-a741-fvg4-h3at
11
vulnerability VCID-bpqa-ngtx-pbes
12
vulnerability VCID-f1qr-vrev-tbdc
13
vulnerability VCID-fp9x-81jx-fbhz
14
vulnerability VCID-h2zj-j6va-v7hs
15
vulnerability VCID-hatr-ngra-qqb6
16
vulnerability VCID-hmn3-mxh5-73fj
17
vulnerability VCID-hxhp-4xdt-fqfp
18
vulnerability VCID-jzft-takg-afb4
19
vulnerability VCID-kfe8-dy9e-ryc5
20
vulnerability VCID-n1x7-a5e5-ckec
21
vulnerability VCID-p46s-buwz-h3by
22
vulnerability VCID-t93h-vv13-4bck
23
vulnerability VCID-uj8y-np9h-8qg6
24
vulnerability VCID-upbh-pvqc-4ubn
25
vulnerability VCID-v4u8-zktd-cfaq
26
vulnerability VCID-wxcy-bnsr-qkdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2
aliases CVE-2022-1920
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-exgv-kz5w-w3bq
21
url VCID-f1k9-rdv3-nqen
vulnerability_id VCID-f1k9-rdv3-nqen
summary
Multiple vulnerabilities have been found in various GStreamer
    plug-ins, the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9807.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9807.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9807
reference_id
reference_type
scores
0
value 0.00765
scoring_system epss
scoring_elements 0.73389
published_at 2026-04-01T12:55:00Z
1
value 0.00765
scoring_system epss
scoring_elements 0.73397
published_at 2026-04-02T12:55:00Z
2
value 0.00765
scoring_system epss
scoring_elements 0.7342
published_at 2026-04-04T12:55:00Z
3
value 0.00765
scoring_system epss
scoring_elements 0.73393
published_at 2026-04-07T12:55:00Z
4
value 0.00765
scoring_system epss
scoring_elements 0.7343
published_at 2026-04-08T12:55:00Z
5
value 0.00765
scoring_system epss
scoring_elements 0.73443
published_at 2026-04-09T12:55:00Z
6
value 0.00765
scoring_system epss
scoring_elements 0.73467
published_at 2026-04-11T12:55:00Z
7
value 0.00765
scoring_system epss
scoring_elements 0.73447
published_at 2026-04-12T12:55:00Z
8
value 0.00765
scoring_system epss
scoring_elements 0.73439
published_at 2026-04-13T12:55:00Z
9
value 0.00765
scoring_system epss
scoring_elements 0.73482
published_at 2026-04-16T12:55:00Z
10
value 0.00765
scoring_system epss
scoring_elements 0.7349
published_at 2026-04-18T12:55:00Z
11
value 0.00765
scoring_system epss
scoring_elements 0.73484
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9807
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9807
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1401874
reference_id 1401874
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1401874
5
reference_url https://security.gentoo.org/glsa/201705-10
reference_id GLSA-201705-10
reference_type
scores
url https://security.gentoo.org/glsa/201705-10
6
reference_url https://access.redhat.com/errata/RHSA-2016:2975
reference_id RHSA-2016:2975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2975
7
reference_url https://access.redhat.com/errata/RHSA-2017:0019
reference_id RHSA-2017:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0019
8
reference_url https://access.redhat.com/errata/RHSA-2017:0020
reference_id RHSA-2017:0020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0020
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.10.4-1
purl pkg:deb/debian/gst-plugins-good1.0@1.10.4-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1kjc-6zdm-jkf3
1
vulnerability VCID-2nz4-ctek-zbfy
2
vulnerability VCID-358j-grsx-27fn
3
vulnerability VCID-3qta-hpkg-hqad
4
vulnerability VCID-521g-8qbp-cfh3
5
vulnerability VCID-528p-7av9-1kgv
6
vulnerability VCID-5ry6-b22q-37gy
7
vulnerability VCID-6aaz-buqb-zfcm
8
vulnerability VCID-6hjf-zva4-ekcv
9
vulnerability VCID-6rvw-7p62-rbdf
10
vulnerability VCID-771b-5s45-hbhd
11
vulnerability VCID-7nn4-cj6x-uff8
12
vulnerability VCID-92kd-us53-qubg
13
vulnerability VCID-a741-fvg4-h3at
14
vulnerability VCID-bpqa-ngtx-pbes
15
vulnerability VCID-exgv-kz5w-w3bq
16
vulnerability VCID-f1qr-vrev-tbdc
17
vulnerability VCID-fp9x-81jx-fbhz
18
vulnerability VCID-h2zj-j6va-v7hs
19
vulnerability VCID-hatr-ngra-qqb6
20
vulnerability VCID-hmn3-mxh5-73fj
21
vulnerability VCID-hxhp-4xdt-fqfp
22
vulnerability VCID-jzft-takg-afb4
23
vulnerability VCID-kfe8-dy9e-ryc5
24
vulnerability VCID-m2g4-ecf6-sufy
25
vulnerability VCID-n1x7-a5e5-ckec
26
vulnerability VCID-p46s-buwz-h3by
27
vulnerability VCID-t93h-vv13-4bck
28
vulnerability VCID-tf3v-37zu-pkaf
29
vulnerability VCID-uj8y-np9h-8qg6
30
vulnerability VCID-v4u8-zktd-cfaq
31
vulnerability VCID-wxcy-bnsr-qkdn
32
vulnerability VCID-zup8-xngn-7bh7
33
vulnerability VCID-zz2u-cmgw-k3c1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.10.4-1
aliases CVE-2016-9807
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f1k9-rdv3-nqen
22
url VCID-f1qr-vrev-tbdc
vulnerability_id VCID-f1qr-vrev-tbdc
summary Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47601.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47601.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47601
reference_id
reference_type
scores
0
value 0.00105
scoring_system epss
scoring_elements 0.28764
published_at 2026-04-04T12:55:00Z
1
value 0.00105
scoring_system epss
scoring_elements 0.28716
published_at 2026-04-02T12:55:00Z
2
value 0.0018
scoring_system epss
scoring_elements 0.39668
published_at 2026-04-09T12:55:00Z
3
value 0.0018
scoring_system epss
scoring_elements 0.39647
published_at 2026-04-18T12:55:00Z
4
value 0.0018
scoring_system epss
scoring_elements 0.39676
published_at 2026-04-16T12:55:00Z
5
value 0.0018
scoring_system epss
scoring_elements 0.39625
published_at 2026-04-13T12:55:00Z
6
value 0.0018
scoring_system epss
scoring_elements 0.39677
published_at 2026-04-11T12:55:00Z
7
value 0.0018
scoring_system epss
scoring_elements 0.39563
published_at 2026-04-21T12:55:00Z
8
value 0.0018
scoring_system epss
scoring_elements 0.39642
published_at 2026-04-12T12:55:00Z
9
value 0.0018
scoring_system epss
scoring_elements 0.39599
published_at 2026-04-07T12:55:00Z
10
value 0.0018
scoring_system epss
scoring_elements 0.39654
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47601
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47601
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2331752
reference_id 2331752
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2331752
5
reference_url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch
reference_id 8057.patch
reference_type
scores
0
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:25:58Z/
url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch
6
reference_url https://securitylab.github.com/advisories/GHSL-2024-249_Gstreamer/
reference_id GHSL-2024-249_Gstreamer
reference_type
scores
0
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:25:58Z/
url https://securitylab.github.com/advisories/GHSL-2024-249_Gstreamer/
7
reference_url https://security.gentoo.org/glsa/202506-02
reference_id GLSA-202506-02
reference_type
scores
url https://security.gentoo.org/glsa/202506-02
8
reference_url https://access.redhat.com/errata/RHSA-2025:7242
reference_id RHSA-2025:7242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7242
9
reference_url https://gstreamer.freedesktop.org/security/sa-2024-0020.html
reference_id sa-2024-0020.html
reference_type
scores
0
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:25:58Z/
url https://gstreamer.freedesktop.org/security/sa-2024-0020.html
10
reference_url https://usn.ubuntu.com/7176-1/
reference_id USN-7176-1
reference_type
scores
url https://usn.ubuntu.com/7176-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
purl pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1g9u-gemh-83bw
1
vulnerability VCID-4ka2-hbcv-8uh2
2
vulnerability VCID-6rvw-7p62-rbdf
3
vulnerability VCID-upbh-pvqc-4ubn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3
aliases CVE-2024-47601
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f1qr-vrev-tbdc
23
url VCID-fp9x-81jx-fbhz
vulnerability_id VCID-fp9x-81jx-fbhz
summary Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47776.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47776.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47776
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20283
published_at 2026-04-04T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20224
published_at 2026-04-02T12:55:00Z
2
value 0.00111
scoring_system epss
scoring_elements 0.29425
published_at 2026-04-13T12:55:00Z
3
value 0.00111
scoring_system epss
scoring_elements 0.29418
published_at 2026-04-18T12:55:00Z
4
value 0.00111
scoring_system epss
scoring_elements 0.29518
published_at 2026-04-09T12:55:00Z
5
value 0.00111
scoring_system epss
scoring_elements 0.29522
published_at 2026-04-11T12:55:00Z
6
value 0.00111
scoring_system epss
scoring_elements 0.29477
published_at 2026-04-12T12:55:00Z
7
value 0.00111
scoring_system epss
scoring_elements 0.29445
published_at 2026-04-16T12:55:00Z
8
value 0.00111
scoring_system epss
scoring_elements 0.29372
published_at 2026-04-21T12:55:00Z
9
value 0.00111
scoring_system epss
scoring_elements 0.29415
published_at 2026-04-07T12:55:00Z
10
value 0.00111
scoring_system epss
scoring_elements 0.29478
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47776
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47776
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2331750
reference_id 2331750
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2331750
5
reference_url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8042.patch
reference_id 8042.patch
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:06:46Z/
url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8042.patch
6
reference_url https://securitylab.github.com/advisories/GHSL-2024-260_Gstreamer/
reference_id GHSL-2024-260_Gstreamer
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:06:46Z/
url https://securitylab.github.com/advisories/GHSL-2024-260_Gstreamer/
7
reference_url https://security.gentoo.org/glsa/202506-02
reference_id GLSA-202506-02
reference_type
scores
url https://security.gentoo.org/glsa/202506-02
8
reference_url https://access.redhat.com/errata/RHSA-2025:7242
reference_id RHSA-2025:7242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7242
9
reference_url https://gstreamer.freedesktop.org/security/sa-2024-0027.html
reference_id sa-2024-0027.html
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:06:46Z/
url https://gstreamer.freedesktop.org/security/sa-2024-0027.html
10
reference_url https://usn.ubuntu.com/7176-1/
reference_id USN-7176-1
reference_type
scores
url https://usn.ubuntu.com/7176-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
purl pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1g9u-gemh-83bw
1
vulnerability VCID-4ka2-hbcv-8uh2
2
vulnerability VCID-6rvw-7p62-rbdf
3
vulnerability VCID-upbh-pvqc-4ubn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3
aliases CVE-2024-47776
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fp9x-81jx-fbhz
24
url VCID-h2zj-j6va-v7hs
vulnerability_id VCID-h2zj-j6va-v7hs
summary Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47613.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47613.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47613
reference_id
reference_type
scores
0
value 0.00078
scoring_system epss
scoring_elements 0.23235
published_at 2026-04-21T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.23268
published_at 2026-04-08T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.23318
published_at 2026-04-09T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.23339
published_at 2026-04-11T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.23301
published_at 2026-04-12T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23245
published_at 2026-04-13T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.2326
published_at 2026-04-16T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.23254
published_at 2026-04-18T12:55:00Z
8
value 0.00078
scoring_system epss
scoring_elements 0.23366
published_at 2026-04-02T12:55:00Z
9
value 0.00078
scoring_system epss
scoring_elements 0.23407
published_at 2026-04-04T12:55:00Z
10
value 0.00078
scoring_system epss
scoring_elements 0.23195
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47613
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47613
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47613
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2331753
reference_id 2331753
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2331753
5
reference_url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8041.patch
reference_id 8041.patch
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:17:34Z/
url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8041.patch
6
reference_url https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/
reference_id GHSL-2024-115_GHSL-2024-118_Gstreamer
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:17:34Z/
url https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/
7
reference_url https://security.gentoo.org/glsa/202506-02
reference_id GLSA-202506-02
reference_type
scores
url https://security.gentoo.org/glsa/202506-02
8
reference_url https://access.redhat.com/errata/RHSA-2024:11119
reference_id RHSA-2024:11119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11119
9
reference_url https://access.redhat.com/errata/RHSA-2024:11121
reference_id RHSA-2024:11121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11121
10
reference_url https://access.redhat.com/errata/RHSA-2024:11122
reference_id RHSA-2024:11122
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11122
11
reference_url https://access.redhat.com/errata/RHSA-2024:11148
reference_id RHSA-2024:11148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11148
12
reference_url https://access.redhat.com/errata/RHSA-2024:11149
reference_id RHSA-2024:11149
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11149
13
reference_url https://access.redhat.com/errata/RHSA-2024:11298
reference_id RHSA-2024:11298
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11298
14
reference_url https://access.redhat.com/errata/RHSA-2024:11299
reference_id RHSA-2024:11299
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11299
15
reference_url https://access.redhat.com/errata/RHSA-2024:11344
reference_id RHSA-2024:11344
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11344
16
reference_url https://access.redhat.com/errata/RHSA-2024:11346
reference_id RHSA-2024:11346
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11346
17
reference_url https://access.redhat.com/errata/RHSA-2024:11348
reference_id RHSA-2024:11348
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11348
18
reference_url https://gstreamer.freedesktop.org/security/sa-2024-0025.html
reference_id sa-2024-0025.html
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:17:34Z/
url https://gstreamer.freedesktop.org/security/sa-2024-0025.html
19
reference_url https://usn.ubuntu.com/7176-1/
reference_id USN-7176-1
reference_type
scores
url https://usn.ubuntu.com/7176-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
purl pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1g9u-gemh-83bw
1
vulnerability VCID-4ka2-hbcv-8uh2
2
vulnerability VCID-6rvw-7p62-rbdf
3
vulnerability VCID-upbh-pvqc-4ubn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3
aliases CVE-2024-47613
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h2zj-j6va-v7hs
25
url VCID-hatr-ngra-qqb6
vulnerability_id VCID-hatr-ngra-qqb6
summary Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47774.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47774.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47774
reference_id
reference_type
scores
0
value 0.00056
scoring_system epss
scoring_elements 0.17784
published_at 2026-04-04T12:55:00Z
1
value 0.00056
scoring_system epss
scoring_elements 0.17737
published_at 2026-04-02T12:55:00Z
2
value 0.00096
scoring_system epss
scoring_elements 0.26623
published_at 2026-04-09T12:55:00Z
3
value 0.00096
scoring_system epss
scoring_elements 0.26533
published_at 2026-04-16T12:55:00Z
4
value 0.00096
scoring_system epss
scoring_elements 0.26526
published_at 2026-04-13T12:55:00Z
5
value 0.00096
scoring_system epss
scoring_elements 0.26583
published_at 2026-04-12T12:55:00Z
6
value 0.00096
scoring_system epss
scoring_elements 0.26574
published_at 2026-04-08T12:55:00Z
7
value 0.00096
scoring_system epss
scoring_elements 0.26467
published_at 2026-04-21T12:55:00Z
8
value 0.00096
scoring_system epss
scoring_elements 0.26628
published_at 2026-04-11T12:55:00Z
9
value 0.00096
scoring_system epss
scoring_elements 0.26506
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47774
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47774
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/github/securitylab-vulnerabilities/issues/1826
reference_id 1826
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:15:00Z/
url https://github.com/github/securitylab-vulnerabilities/issues/1826
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2331739
reference_id 2331739
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2331739
6
reference_url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8043.patch
reference_id 8043.patch
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:15:00Z/
url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8043.patch
7
reference_url https://securitylab.github.com/advisories/GHSL-2024-262_Gstreamer/
reference_id GHSL-2024-262_Gstreamer
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:15:00Z/
url https://securitylab.github.com/advisories/GHSL-2024-262_Gstreamer/
8
reference_url https://security.gentoo.org/glsa/202506-02
reference_id GLSA-202506-02
reference_type
scores
url https://security.gentoo.org/glsa/202506-02
9
reference_url https://access.redhat.com/errata/RHSA-2025:7242
reference_id RHSA-2025:7242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7242
10
reference_url https://usn.ubuntu.com/7176-1/
reference_id USN-7176-1
reference_type
scores
url https://usn.ubuntu.com/7176-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
purl pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1g9u-gemh-83bw
1
vulnerability VCID-4ka2-hbcv-8uh2
2
vulnerability VCID-6rvw-7p62-rbdf
3
vulnerability VCID-upbh-pvqc-4ubn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3
aliases CVE-2024-47774
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hatr-ngra-qqb6
26
url VCID-hgch-q86h-4qcn
vulnerability_id VCID-hgch-q86h-4qcn
summary
Multiple vulnerabilities have been found in various GStreamer
    plug-ins, the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9810.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9810.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9810
reference_id
reference_type
scores
0
value 0.00665
scoring_system epss
scoring_elements 0.71162
published_at 2026-04-01T12:55:00Z
1
value 0.00665
scoring_system epss
scoring_elements 0.71171
published_at 2026-04-02T12:55:00Z
2
value 0.00665
scoring_system epss
scoring_elements 0.71188
published_at 2026-04-04T12:55:00Z
3
value 0.00665
scoring_system epss
scoring_elements 0.71163
published_at 2026-04-07T12:55:00Z
4
value 0.00665
scoring_system epss
scoring_elements 0.71205
published_at 2026-04-08T12:55:00Z
5
value 0.00665
scoring_system epss
scoring_elements 0.71219
published_at 2026-04-09T12:55:00Z
6
value 0.00665
scoring_system epss
scoring_elements 0.71241
published_at 2026-04-21T12:55:00Z
7
value 0.00665
scoring_system epss
scoring_elements 0.71227
published_at 2026-04-12T12:55:00Z
8
value 0.00665
scoring_system epss
scoring_elements 0.7121
published_at 2026-04-13T12:55:00Z
9
value 0.00665
scoring_system epss
scoring_elements 0.71257
published_at 2026-04-16T12:55:00Z
10
value 0.00665
scoring_system epss
scoring_elements 0.71264
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9810
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9810
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9810
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1401913
reference_id 1401913
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1401913
5
reference_url https://security.gentoo.org/glsa/201705-10
reference_id GLSA-201705-10
reference_type
scores
url https://security.gentoo.org/glsa/201705-10
6
reference_url https://access.redhat.com/errata/RHSA-2017:2060
reference_id RHSA-2017:2060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2060
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.10.4-1
purl pkg:deb/debian/gst-plugins-good1.0@1.10.4-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1kjc-6zdm-jkf3
1
vulnerability VCID-2nz4-ctek-zbfy
2
vulnerability VCID-358j-grsx-27fn
3
vulnerability VCID-3qta-hpkg-hqad
4
vulnerability VCID-521g-8qbp-cfh3
5
vulnerability VCID-528p-7av9-1kgv
6
vulnerability VCID-5ry6-b22q-37gy
7
vulnerability VCID-6aaz-buqb-zfcm
8
vulnerability VCID-6hjf-zva4-ekcv
9
vulnerability VCID-6rvw-7p62-rbdf
10
vulnerability VCID-771b-5s45-hbhd
11
vulnerability VCID-7nn4-cj6x-uff8
12
vulnerability VCID-92kd-us53-qubg
13
vulnerability VCID-a741-fvg4-h3at
14
vulnerability VCID-bpqa-ngtx-pbes
15
vulnerability VCID-exgv-kz5w-w3bq
16
vulnerability VCID-f1qr-vrev-tbdc
17
vulnerability VCID-fp9x-81jx-fbhz
18
vulnerability VCID-h2zj-j6va-v7hs
19
vulnerability VCID-hatr-ngra-qqb6
20
vulnerability VCID-hmn3-mxh5-73fj
21
vulnerability VCID-hxhp-4xdt-fqfp
22
vulnerability VCID-jzft-takg-afb4
23
vulnerability VCID-kfe8-dy9e-ryc5
24
vulnerability VCID-m2g4-ecf6-sufy
25
vulnerability VCID-n1x7-a5e5-ckec
26
vulnerability VCID-p46s-buwz-h3by
27
vulnerability VCID-t93h-vv13-4bck
28
vulnerability VCID-tf3v-37zu-pkaf
29
vulnerability VCID-uj8y-np9h-8qg6
30
vulnerability VCID-v4u8-zktd-cfaq
31
vulnerability VCID-wxcy-bnsr-qkdn
32
vulnerability VCID-zup8-xngn-7bh7
33
vulnerability VCID-zz2u-cmgw-k3c1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.10.4-1
aliases CVE-2016-9810
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hgch-q86h-4qcn
27
url VCID-hmn3-mxh5-73fj
vulnerability_id VCID-hmn3-mxh5-73fj
summary Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47602.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47602.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47602
reference_id
reference_type
scores
0
value 0.00078
scoring_system epss
scoring_elements 0.23268
published_at 2026-04-04T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.23224
published_at 2026-04-02T12:55:00Z
2
value 0.00133
scoring_system epss
scoring_elements 0.32852
published_at 2026-04-16T12:55:00Z
3
value 0.00133
scoring_system epss
scoring_elements 0.32873
published_at 2026-04-09T12:55:00Z
4
value 0.00133
scoring_system epss
scoring_elements 0.32874
published_at 2026-04-11T12:55:00Z
5
value 0.00133
scoring_system epss
scoring_elements 0.32835
published_at 2026-04-12T12:55:00Z
6
value 0.00133
scoring_system epss
scoring_elements 0.3281
published_at 2026-04-13T12:55:00Z
7
value 0.00133
scoring_system epss
scoring_elements 0.32829
published_at 2026-04-18T12:55:00Z
8
value 0.00133
scoring_system epss
scoring_elements 0.32793
published_at 2026-04-21T12:55:00Z
9
value 0.00133
scoring_system epss
scoring_elements 0.32796
published_at 2026-04-07T12:55:00Z
10
value 0.00133
scoring_system epss
scoring_elements 0.32844
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47602
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47602
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2331759
reference_id 2331759
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2331759
5
reference_url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch
reference_id 8057.patch
reference_type
scores
0
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:24:18Z/
url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch
6
reference_url https://securitylab.github.com/advisories/GHSL-2024-250_Gstreamer/
reference_id GHSL-2024-250_Gstreamer
reference_type
scores
0
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:24:18Z/
url https://securitylab.github.com/advisories/GHSL-2024-250_Gstreamer/
7
reference_url https://security.gentoo.org/glsa/202506-02
reference_id GLSA-202506-02
reference_type
scores
url https://security.gentoo.org/glsa/202506-02
8
reference_url https://access.redhat.com/errata/RHSA-2025:7242
reference_id RHSA-2025:7242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7242
9
reference_url https://gstreamer.freedesktop.org/security/sa-2024-0019.html
reference_id sa-2024-0019.html
reference_type
scores
0
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:24:18Z/
url https://gstreamer.freedesktop.org/security/sa-2024-0019.html
10
reference_url https://usn.ubuntu.com/7176-1/
reference_id USN-7176-1
reference_type
scores
url https://usn.ubuntu.com/7176-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
purl pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1g9u-gemh-83bw
1
vulnerability VCID-4ka2-hbcv-8uh2
2
vulnerability VCID-6rvw-7p62-rbdf
3
vulnerability VCID-upbh-pvqc-4ubn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3
aliases CVE-2024-47602
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hmn3-mxh5-73fj
28
url VCID-hxhp-4xdt-fqfp
vulnerability_id VCID-hxhp-4xdt-fqfp
summary Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47606.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47606.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47606
reference_id
reference_type
scores
0
value 0.00196
scoring_system epss
scoring_elements 0.41584
published_at 2026-04-04T12:55:00Z
1
value 0.00196
scoring_system epss
scoring_elements 0.41556
published_at 2026-04-02T12:55:00Z
2
value 0.00335
scoring_system epss
scoring_elements 0.56399
published_at 2026-04-16T12:55:00Z
3
value 0.00335
scoring_system epss
scoring_elements 0.564
published_at 2026-04-18T12:55:00Z
4
value 0.00335
scoring_system epss
scoring_elements 0.56367
published_at 2026-04-13T12:55:00Z
5
value 0.00335
scoring_system epss
scoring_elements 0.56385
published_at 2026-04-12T12:55:00Z
6
value 0.00335
scoring_system epss
scoring_elements 0.56394
published_at 2026-04-08T12:55:00Z
7
value 0.00335
scoring_system epss
scoring_elements 0.56369
published_at 2026-04-21T12:55:00Z
8
value 0.00335
scoring_system epss
scoring_elements 0.56409
published_at 2026-04-11T12:55:00Z
9
value 0.00335
scoring_system epss
scoring_elements 0.56343
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47606
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47606
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2331760
reference_id 2331760
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2331760
5
reference_url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8032.patch
reference_id 8032.patch
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-12-11T20:43:34Z/
url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8032.patch
6
reference_url https://securitylab.github.com/advisories/GHSL-2024-166_Gstreamer/
reference_id GHSL-2024-166_Gstreamer
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-12-11T20:43:34Z/
url https://securitylab.github.com/advisories/GHSL-2024-166_Gstreamer/
7
reference_url https://security.gentoo.org/glsa/202506-02
reference_id GLSA-202506-02
reference_type
scores
url https://security.gentoo.org/glsa/202506-02
8
reference_url https://access.redhat.com/errata/RHSA-2024:11119
reference_id RHSA-2024:11119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11119
9
reference_url https://access.redhat.com/errata/RHSA-2024:11121
reference_id RHSA-2024:11121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11121
10
reference_url https://access.redhat.com/errata/RHSA-2024:11122
reference_id RHSA-2024:11122
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11122
11
reference_url https://access.redhat.com/errata/RHSA-2024:11148
reference_id RHSA-2024:11148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11148
12
reference_url https://access.redhat.com/errata/RHSA-2024:11149
reference_id RHSA-2024:11149
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11149
13
reference_url https://access.redhat.com/errata/RHSA-2024:11298
reference_id RHSA-2024:11298
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11298
14
reference_url https://access.redhat.com/errata/RHSA-2024:11299
reference_id RHSA-2024:11299
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11299
15
reference_url https://access.redhat.com/errata/RHSA-2024:11344
reference_id RHSA-2024:11344
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11344
16
reference_url https://access.redhat.com/errata/RHSA-2024:11346
reference_id RHSA-2024:11346
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11346
17
reference_url https://access.redhat.com/errata/RHSA-2024:11348
reference_id RHSA-2024:11348
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11348
18
reference_url https://gstreamer.freedesktop.org/security/sa-2024-0014.html
reference_id sa-2024-0014.html
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-12-11T20:43:34Z/
url https://gstreamer.freedesktop.org/security/sa-2024-0014.html
19
reference_url https://usn.ubuntu.com/7174-1/
reference_id USN-7174-1
reference_type
scores
url https://usn.ubuntu.com/7174-1/
20
reference_url https://usn.ubuntu.com/7176-1/
reference_id USN-7176-1
reference_type
scores
url https://usn.ubuntu.com/7176-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
purl pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1g9u-gemh-83bw
1
vulnerability VCID-4ka2-hbcv-8uh2
2
vulnerability VCID-6rvw-7p62-rbdf
3
vulnerability VCID-upbh-pvqc-4ubn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3
aliases CVE-2024-47606
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hxhp-4xdt-fqfp
29
url VCID-j1w1-4xvp-7bh8
vulnerability_id VCID-j1w1-4xvp-7bh8
summary
Multiple vulnerabilities have been found in various GStreamer
    plug-ins, the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5840.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5840.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5840
reference_id
reference_type
scores
0
value 0.06856
scoring_system epss
scoring_elements 0.91316
published_at 2026-04-01T12:55:00Z
1
value 0.06856
scoring_system epss
scoring_elements 0.9139
published_at 2026-04-18T12:55:00Z
2
value 0.06856
scoring_system epss
scoring_elements 0.91367
published_at 2026-04-13T12:55:00Z
3
value 0.06856
scoring_system epss
scoring_elements 0.91392
published_at 2026-04-21T12:55:00Z
4
value 0.06856
scoring_system epss
scoring_elements 0.91321
published_at 2026-04-02T12:55:00Z
5
value 0.06856
scoring_system epss
scoring_elements 0.91331
published_at 2026-04-04T12:55:00Z
6
value 0.06856
scoring_system epss
scoring_elements 0.91338
published_at 2026-04-07T12:55:00Z
7
value 0.06856
scoring_system epss
scoring_elements 0.91351
published_at 2026-04-08T12:55:00Z
8
value 0.06856
scoring_system epss
scoring_elements 0.91358
published_at 2026-04-09T12:55:00Z
9
value 0.06856
scoring_system epss
scoring_elements 0.91364
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5840
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10198
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10199
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5840
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5841
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5841
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5845
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1419588
reference_id 1419588
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1419588
9
reference_url https://security.archlinux.org/ASA-201702-3
reference_id ASA-201702-3
reference_type
scores
url https://security.archlinux.org/ASA-201702-3
10
reference_url https://security.archlinux.org/AVG-163
reference_id AVG-163
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-163
11
reference_url https://security.gentoo.org/glsa/201705-10
reference_id GLSA-201705-10
reference_type
scores
url https://security.gentoo.org/glsa/201705-10
12
reference_url https://access.redhat.com/errata/RHSA-2017:2060
reference_id RHSA-2017:2060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2060
13
reference_url https://usn.ubuntu.com/3245-1/
reference_id USN-3245-1
reference_type
scores
url https://usn.ubuntu.com/3245-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.4.4-2%2Bdeb8u3
purl pkg:deb/debian/gst-plugins-good1.0@1.4.4-2%2Bdeb8u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1kjc-6zdm-jkf3
1
vulnerability VCID-1z2g-dxzn-27d2
2
vulnerability VCID-2nz4-ctek-zbfy
3
vulnerability VCID-358j-grsx-27fn
4
vulnerability VCID-3qta-hpkg-hqad
5
vulnerability VCID-521g-8qbp-cfh3
6
vulnerability VCID-528p-7av9-1kgv
7
vulnerability VCID-5ry6-b22q-37gy
8
vulnerability VCID-5vfg-uj1z-zudn
9
vulnerability VCID-6aaz-buqb-zfcm
10
vulnerability VCID-6hjf-zva4-ekcv
11
vulnerability VCID-6rvw-7p62-rbdf
12
vulnerability VCID-771b-5s45-hbhd
13
vulnerability VCID-7nn4-cj6x-uff8
14
vulnerability VCID-92kd-us53-qubg
15
vulnerability VCID-a741-fvg4-h3at
16
vulnerability VCID-bk2h-q83z-43cn
17
vulnerability VCID-bpqa-ngtx-pbes
18
vulnerability VCID-byg3-424m-w3gs
19
vulnerability VCID-cnza-7ar1-f7eh
20
vulnerability VCID-exgv-kz5w-w3bq
21
vulnerability VCID-f1k9-rdv3-nqen
22
vulnerability VCID-f1qr-vrev-tbdc
23
vulnerability VCID-fp9x-81jx-fbhz
24
vulnerability VCID-h2zj-j6va-v7hs
25
vulnerability VCID-hatr-ngra-qqb6
26
vulnerability VCID-hgch-q86h-4qcn
27
vulnerability VCID-hmn3-mxh5-73fj
28
vulnerability VCID-hxhp-4xdt-fqfp
29
vulnerability VCID-j1w1-4xvp-7bh8
30
vulnerability VCID-jzft-takg-afb4
31
vulnerability VCID-k1t8-1fq9-m3gg
32
vulnerability VCID-kfe8-dy9e-ryc5
33
vulnerability VCID-m2g4-ecf6-sufy
34
vulnerability VCID-mcdu-z138-vkgv
35
vulnerability VCID-n1tt-vu7b-skew
36
vulnerability VCID-n1x7-a5e5-ckec
37
vulnerability VCID-p46s-buwz-h3by
38
vulnerability VCID-t93h-vv13-4bck
39
vulnerability VCID-tf3v-37zu-pkaf
40
vulnerability VCID-uj8y-np9h-8qg6
41
vulnerability VCID-v4u8-zktd-cfaq
42
vulnerability VCID-wxcy-bnsr-qkdn
43
vulnerability VCID-zup8-xngn-7bh7
44
vulnerability VCID-zz2u-cmgw-k3c1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.4.4-2%252Bdeb8u3
1
url pkg:deb/debian/gst-plugins-good1.0@1.10.4-1
purl pkg:deb/debian/gst-plugins-good1.0@1.10.4-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1kjc-6zdm-jkf3
1
vulnerability VCID-2nz4-ctek-zbfy
2
vulnerability VCID-358j-grsx-27fn
3
vulnerability VCID-3qta-hpkg-hqad
4
vulnerability VCID-521g-8qbp-cfh3
5
vulnerability VCID-528p-7av9-1kgv
6
vulnerability VCID-5ry6-b22q-37gy
7
vulnerability VCID-6aaz-buqb-zfcm
8
vulnerability VCID-6hjf-zva4-ekcv
9
vulnerability VCID-6rvw-7p62-rbdf
10
vulnerability VCID-771b-5s45-hbhd
11
vulnerability VCID-7nn4-cj6x-uff8
12
vulnerability VCID-92kd-us53-qubg
13
vulnerability VCID-a741-fvg4-h3at
14
vulnerability VCID-bpqa-ngtx-pbes
15
vulnerability VCID-exgv-kz5w-w3bq
16
vulnerability VCID-f1qr-vrev-tbdc
17
vulnerability VCID-fp9x-81jx-fbhz
18
vulnerability VCID-h2zj-j6va-v7hs
19
vulnerability VCID-hatr-ngra-qqb6
20
vulnerability VCID-hmn3-mxh5-73fj
21
vulnerability VCID-hxhp-4xdt-fqfp
22
vulnerability VCID-jzft-takg-afb4
23
vulnerability VCID-kfe8-dy9e-ryc5
24
vulnerability VCID-m2g4-ecf6-sufy
25
vulnerability VCID-n1x7-a5e5-ckec
26
vulnerability VCID-p46s-buwz-h3by
27
vulnerability VCID-t93h-vv13-4bck
28
vulnerability VCID-tf3v-37zu-pkaf
29
vulnerability VCID-uj8y-np9h-8qg6
30
vulnerability VCID-v4u8-zktd-cfaq
31
vulnerability VCID-wxcy-bnsr-qkdn
32
vulnerability VCID-zup8-xngn-7bh7
33
vulnerability VCID-zz2u-cmgw-k3c1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.10.4-1
aliases CVE-2017-5840
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j1w1-4xvp-7bh8
30
url VCID-jzft-takg-afb4
vulnerability_id VCID-jzft-takg-afb4
summary Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47599.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47599.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47599
reference_id
reference_type
scores
0
value 0.00073
scoring_system epss
scoring_elements 0.22046
published_at 2026-04-21T12:55:00Z
1
value 0.00073
scoring_system epss
scoring_elements 0.22043
published_at 2026-04-07T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.22124
published_at 2026-04-08T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.22178
published_at 2026-04-09T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.22198
published_at 2026-04-11T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22158
published_at 2026-04-12T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.22098
published_at 2026-04-16T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.22092
published_at 2026-04-18T12:55:00Z
8
value 0.00073
scoring_system epss
scoring_elements 0.22212
published_at 2026-04-02T12:55:00Z
9
value 0.00073
scoring_system epss
scoring_elements 0.2226
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47599
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47599
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2331748
reference_id 2331748
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2331748
5
reference_url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8040.patch
reference_id 8040.patch
reference_type
scores
0
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:37:52Z/
url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8040.patch
6
reference_url https://securitylab.github.com/advisories/GHSL-2024-247_Gstreamer/
reference_id GHSL-2024-247_Gstreamer
reference_type
scores
0
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:37:52Z/
url https://securitylab.github.com/advisories/GHSL-2024-247_Gstreamer/
7
reference_url https://security.gentoo.org/glsa/202506-02
reference_id GLSA-202506-02
reference_type
scores
url https://security.gentoo.org/glsa/202506-02
8
reference_url https://access.redhat.com/errata/RHSA-2025:7242
reference_id RHSA-2025:7242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7242
9
reference_url https://gstreamer.freedesktop.org/security/sa-2024-0016.html
reference_id sa-2024-0016.html
reference_type
scores
0
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:37:52Z/
url https://gstreamer.freedesktop.org/security/sa-2024-0016.html
10
reference_url https://usn.ubuntu.com/7176-1/
reference_id USN-7176-1
reference_type
scores
url https://usn.ubuntu.com/7176-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
purl pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1g9u-gemh-83bw
1
vulnerability VCID-4ka2-hbcv-8uh2
2
vulnerability VCID-6rvw-7p62-rbdf
3
vulnerability VCID-upbh-pvqc-4ubn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3
aliases CVE-2024-47599
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jzft-takg-afb4
31
url VCID-k1t8-1fq9-m3gg
vulnerability_id VCID-k1t8-1fq9-m3gg
summary
Multiple vulnerabilities have been found in various GStreamer
    plug-ins, the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9635.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9635.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9635
reference_id
reference_type
scores
0
value 0.16094
scoring_system epss
scoring_elements 0.94755
published_at 2026-04-01T12:55:00Z
1
value 0.16094
scoring_system epss
scoring_elements 0.94764
published_at 2026-04-02T12:55:00Z
2
value 0.16094
scoring_system epss
scoring_elements 0.94768
published_at 2026-04-04T12:55:00Z
3
value 0.16094
scoring_system epss
scoring_elements 0.94769
published_at 2026-04-07T12:55:00Z
4
value 0.16094
scoring_system epss
scoring_elements 0.94779
published_at 2026-04-08T12:55:00Z
5
value 0.16094
scoring_system epss
scoring_elements 0.94783
published_at 2026-04-09T12:55:00Z
6
value 0.16094
scoring_system epss
scoring_elements 0.94787
published_at 2026-04-11T12:55:00Z
7
value 0.16094
scoring_system epss
scoring_elements 0.94791
published_at 2026-04-12T12:55:00Z
8
value 0.16094
scoring_system epss
scoring_elements 0.94792
published_at 2026-04-13T12:55:00Z
9
value 0.16094
scoring_system epss
scoring_elements 0.94799
published_at 2026-04-16T12:55:00Z
10
value 0.16094
scoring_system epss
scoring_elements 0.94803
published_at 2026-04-18T12:55:00Z
11
value 0.16094
scoring_system epss
scoring_elements 0.94806
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9635
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9634
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9634
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9635
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9636
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1397441
reference_id 1397441
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1397441
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845375
reference_id 845375
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845375
8
reference_url https://security.gentoo.org/glsa/201705-10
reference_id GLSA-201705-10
reference_type
scores
url https://security.gentoo.org/glsa/201705-10
9
reference_url https://access.redhat.com/errata/RHSA-2016:2975
reference_id RHSA-2016:2975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2975
10
reference_url https://access.redhat.com/errata/RHSA-2017:0019
reference_id RHSA-2017:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0019
11
reference_url https://access.redhat.com/errata/RHSA-2017:0020
reference_id RHSA-2017:0020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0020
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.4.4-2%2Bdeb8u3
purl pkg:deb/debian/gst-plugins-good1.0@1.4.4-2%2Bdeb8u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1kjc-6zdm-jkf3
1
vulnerability VCID-1z2g-dxzn-27d2
2
vulnerability VCID-2nz4-ctek-zbfy
3
vulnerability VCID-358j-grsx-27fn
4
vulnerability VCID-3qta-hpkg-hqad
5
vulnerability VCID-521g-8qbp-cfh3
6
vulnerability VCID-528p-7av9-1kgv
7
vulnerability VCID-5ry6-b22q-37gy
8
vulnerability VCID-5vfg-uj1z-zudn
9
vulnerability VCID-6aaz-buqb-zfcm
10
vulnerability VCID-6hjf-zva4-ekcv
11
vulnerability VCID-6rvw-7p62-rbdf
12
vulnerability VCID-771b-5s45-hbhd
13
vulnerability VCID-7nn4-cj6x-uff8
14
vulnerability VCID-92kd-us53-qubg
15
vulnerability VCID-a741-fvg4-h3at
16
vulnerability VCID-bk2h-q83z-43cn
17
vulnerability VCID-bpqa-ngtx-pbes
18
vulnerability VCID-byg3-424m-w3gs
19
vulnerability VCID-cnza-7ar1-f7eh
20
vulnerability VCID-exgv-kz5w-w3bq
21
vulnerability VCID-f1k9-rdv3-nqen
22
vulnerability VCID-f1qr-vrev-tbdc
23
vulnerability VCID-fp9x-81jx-fbhz
24
vulnerability VCID-h2zj-j6va-v7hs
25
vulnerability VCID-hatr-ngra-qqb6
26
vulnerability VCID-hgch-q86h-4qcn
27
vulnerability VCID-hmn3-mxh5-73fj
28
vulnerability VCID-hxhp-4xdt-fqfp
29
vulnerability VCID-j1w1-4xvp-7bh8
30
vulnerability VCID-jzft-takg-afb4
31
vulnerability VCID-k1t8-1fq9-m3gg
32
vulnerability VCID-kfe8-dy9e-ryc5
33
vulnerability VCID-m2g4-ecf6-sufy
34
vulnerability VCID-mcdu-z138-vkgv
35
vulnerability VCID-n1tt-vu7b-skew
36
vulnerability VCID-n1x7-a5e5-ckec
37
vulnerability VCID-p46s-buwz-h3by
38
vulnerability VCID-t93h-vv13-4bck
39
vulnerability VCID-tf3v-37zu-pkaf
40
vulnerability VCID-uj8y-np9h-8qg6
41
vulnerability VCID-v4u8-zktd-cfaq
42
vulnerability VCID-wxcy-bnsr-qkdn
43
vulnerability VCID-zup8-xngn-7bh7
44
vulnerability VCID-zz2u-cmgw-k3c1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.4.4-2%252Bdeb8u3
1
url pkg:deb/debian/gst-plugins-good1.0@1.10.4-1
purl pkg:deb/debian/gst-plugins-good1.0@1.10.4-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1kjc-6zdm-jkf3
1
vulnerability VCID-2nz4-ctek-zbfy
2
vulnerability VCID-358j-grsx-27fn
3
vulnerability VCID-3qta-hpkg-hqad
4
vulnerability VCID-521g-8qbp-cfh3
5
vulnerability VCID-528p-7av9-1kgv
6
vulnerability VCID-5ry6-b22q-37gy
7
vulnerability VCID-6aaz-buqb-zfcm
8
vulnerability VCID-6hjf-zva4-ekcv
9
vulnerability VCID-6rvw-7p62-rbdf
10
vulnerability VCID-771b-5s45-hbhd
11
vulnerability VCID-7nn4-cj6x-uff8
12
vulnerability VCID-92kd-us53-qubg
13
vulnerability VCID-a741-fvg4-h3at
14
vulnerability VCID-bpqa-ngtx-pbes
15
vulnerability VCID-exgv-kz5w-w3bq
16
vulnerability VCID-f1qr-vrev-tbdc
17
vulnerability VCID-fp9x-81jx-fbhz
18
vulnerability VCID-h2zj-j6va-v7hs
19
vulnerability VCID-hatr-ngra-qqb6
20
vulnerability VCID-hmn3-mxh5-73fj
21
vulnerability VCID-hxhp-4xdt-fqfp
22
vulnerability VCID-jzft-takg-afb4
23
vulnerability VCID-kfe8-dy9e-ryc5
24
vulnerability VCID-m2g4-ecf6-sufy
25
vulnerability VCID-n1x7-a5e5-ckec
26
vulnerability VCID-p46s-buwz-h3by
27
vulnerability VCID-t93h-vv13-4bck
28
vulnerability VCID-tf3v-37zu-pkaf
29
vulnerability VCID-uj8y-np9h-8qg6
30
vulnerability VCID-v4u8-zktd-cfaq
31
vulnerability VCID-wxcy-bnsr-qkdn
32
vulnerability VCID-zup8-xngn-7bh7
33
vulnerability VCID-zz2u-cmgw-k3c1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.10.4-1
aliases CVE-2016-9635
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k1t8-1fq9-m3gg
32
url VCID-kfe8-dy9e-ryc5
vulnerability_id VCID-kfe8-dy9e-ryc5
summary Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47778.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47778.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47778
reference_id
reference_type
scores
0
value 0.00084
scoring_system epss
scoring_elements 0.24659
published_at 2026-04-04T12:55:00Z
1
value 0.00084
scoring_system epss
scoring_elements 0.24622
published_at 2026-04-02T12:55:00Z
2
value 0.00144
scoring_system epss
scoring_elements 0.34755
published_at 2026-04-11T12:55:00Z
3
value 0.00144
scoring_system epss
scoring_elements 0.34711
published_at 2026-04-18T12:55:00Z
4
value 0.00144
scoring_system epss
scoring_elements 0.34726
published_at 2026-04-16T12:55:00Z
5
value 0.00144
scoring_system epss
scoring_elements 0.34691
published_at 2026-04-13T12:55:00Z
6
value 0.00144
scoring_system epss
scoring_elements 0.34723
published_at 2026-04-08T12:55:00Z
7
value 0.00144
scoring_system epss
scoring_elements 0.34751
published_at 2026-04-09T12:55:00Z
8
value 0.00144
scoring_system epss
scoring_elements 0.34716
published_at 2026-04-12T12:55:00Z
9
value 0.00144
scoring_system epss
scoring_elements 0.3468
published_at 2026-04-07T12:55:00Z
10
value 0.00266
scoring_system epss
scoring_elements 0.50078
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47778
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47778
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2331743
reference_id 2331743
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2331743
5
reference_url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8042.patch
reference_id 8042.patch
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:12:16Z/
url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8042.patch
6
reference_url https://securitylab.github.com/advisories/GHSL-2024-258_Gstreamer/
reference_id GHSL-2024-258_Gstreamer
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:12:16Z/
url https://securitylab.github.com/advisories/GHSL-2024-258_Gstreamer/
7
reference_url https://security.gentoo.org/glsa/202506-02
reference_id GLSA-202506-02
reference_type
scores
url https://security.gentoo.org/glsa/202506-02
8
reference_url https://access.redhat.com/errata/RHSA-2025:7242
reference_id RHSA-2025:7242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7242
9
reference_url https://gstreamer.freedesktop.org/security/sa-2024-0027.html
reference_id sa-2024-0027.html
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:12:16Z/
url https://gstreamer.freedesktop.org/security/sa-2024-0027.html
10
reference_url https://usn.ubuntu.com/7176-1/
reference_id USN-7176-1
reference_type
scores
url https://usn.ubuntu.com/7176-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
purl pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1g9u-gemh-83bw
1
vulnerability VCID-4ka2-hbcv-8uh2
2
vulnerability VCID-6rvw-7p62-rbdf
3
vulnerability VCID-upbh-pvqc-4ubn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3
aliases CVE-2024-47778
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kfe8-dy9e-ryc5
33
url VCID-m2g4-ecf6-sufy
vulnerability_id VCID-m2g4-ecf6-sufy
summary Multiple vulnerabilities have been discovered in gst-plugins-good, the worst of which could lead to denial of service or arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1923.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1923.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1923
reference_id
reference_type
scores
0
value 0.00043
scoring_system epss
scoring_elements 0.13044
published_at 2026-04-01T12:55:00Z
1
value 0.00043
scoring_system epss
scoring_elements 0.13137
published_at 2026-04-02T12:55:00Z
2
value 0.00043
scoring_system epss
scoring_elements 0.13191
published_at 2026-04-04T12:55:00Z
3
value 0.00043
scoring_system epss
scoring_elements 0.12989
published_at 2026-04-07T12:55:00Z
4
value 0.00043
scoring_system epss
scoring_elements 0.13068
published_at 2026-04-08T12:55:00Z
5
value 0.00043
scoring_system epss
scoring_elements 0.13118
published_at 2026-04-09T12:55:00Z
6
value 0.00043
scoring_system epss
scoring_elements 0.13088
published_at 2026-04-11T12:55:00Z
7
value 0.00043
scoring_system epss
scoring_elements 0.1305
published_at 2026-04-12T12:55:00Z
8
value 0.00043
scoring_system epss
scoring_elements 0.12999
published_at 2026-04-13T12:55:00Z
9
value 0.00043
scoring_system epss
scoring_elements 0.12901
published_at 2026-04-16T12:55:00Z
10
value 0.00043
scoring_system epss
scoring_elements 0.12903
published_at 2026-04-18T12:55:00Z
11
value 0.00043
scoring_system epss
scoring_elements 0.13003
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1923
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2130959
reference_id 2130959
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2130959
11
reference_url https://security.gentoo.org/glsa/202409-13
reference_id GLSA-202409-13
reference_type
scores
url https://security.gentoo.org/glsa/202409-13
12
reference_url https://access.redhat.com/errata/RHSA-2023:2260
reference_id RHSA-2023:2260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2260
13
reference_url https://usn.ubuntu.com/5555-1/
reference_id USN-5555-1
reference_type
scores
url https://usn.ubuntu.com/5555-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2
purl pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1g9u-gemh-83bw
1
vulnerability VCID-2nz4-ctek-zbfy
2
vulnerability VCID-358j-grsx-27fn
3
vulnerability VCID-3qta-hpkg-hqad
4
vulnerability VCID-4ka2-hbcv-8uh2
5
vulnerability VCID-528p-7av9-1kgv
6
vulnerability VCID-5ry6-b22q-37gy
7
vulnerability VCID-6hjf-zva4-ekcv
8
vulnerability VCID-6rvw-7p62-rbdf
9
vulnerability VCID-92kd-us53-qubg
10
vulnerability VCID-a741-fvg4-h3at
11
vulnerability VCID-bpqa-ngtx-pbes
12
vulnerability VCID-f1qr-vrev-tbdc
13
vulnerability VCID-fp9x-81jx-fbhz
14
vulnerability VCID-h2zj-j6va-v7hs
15
vulnerability VCID-hatr-ngra-qqb6
16
vulnerability VCID-hmn3-mxh5-73fj
17
vulnerability VCID-hxhp-4xdt-fqfp
18
vulnerability VCID-jzft-takg-afb4
19
vulnerability VCID-kfe8-dy9e-ryc5
20
vulnerability VCID-n1x7-a5e5-ckec
21
vulnerability VCID-p46s-buwz-h3by
22
vulnerability VCID-t93h-vv13-4bck
23
vulnerability VCID-uj8y-np9h-8qg6
24
vulnerability VCID-upbh-pvqc-4ubn
25
vulnerability VCID-v4u8-zktd-cfaq
26
vulnerability VCID-wxcy-bnsr-qkdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2
aliases CVE-2022-1923
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m2g4-ecf6-sufy
34
url VCID-mcdu-z138-vkgv
vulnerability_id VCID-mcdu-z138-vkgv
summary
Multiple vulnerabilities have been found in various GStreamer
    plug-ins, the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5841.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5841.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5841
reference_id
reference_type
scores
0
value 0.03108
scoring_system epss
scoring_elements 0.86758
published_at 2026-04-01T12:55:00Z
1
value 0.03108
scoring_system epss
scoring_elements 0.86838
published_at 2026-04-21T12:55:00Z
2
value 0.03108
scoring_system epss
scoring_elements 0.86835
published_at 2026-04-16T12:55:00Z
3
value 0.03108
scoring_system epss
scoring_elements 0.86839
published_at 2026-04-18T12:55:00Z
4
value 0.03108
scoring_system epss
scoring_elements 0.86769
published_at 2026-04-02T12:55:00Z
5
value 0.03108
scoring_system epss
scoring_elements 0.86787
published_at 2026-04-04T12:55:00Z
6
value 0.03108
scoring_system epss
scoring_elements 0.86785
published_at 2026-04-07T12:55:00Z
7
value 0.03108
scoring_system epss
scoring_elements 0.86805
published_at 2026-04-08T12:55:00Z
8
value 0.03108
scoring_system epss
scoring_elements 0.86813
published_at 2026-04-09T12:55:00Z
9
value 0.03108
scoring_system epss
scoring_elements 0.86827
published_at 2026-04-11T12:55:00Z
10
value 0.03108
scoring_system epss
scoring_elements 0.86823
published_at 2026-04-12T12:55:00Z
11
value 0.03108
scoring_system epss
scoring_elements 0.86819
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5841
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10198
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10199
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5840
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5841
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5841
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5845
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1419589
reference_id 1419589
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1419589
9
reference_url https://security.archlinux.org/ASA-201702-3
reference_id ASA-201702-3
reference_type
scores
url https://security.archlinux.org/ASA-201702-3
10
reference_url https://security.archlinux.org/AVG-163
reference_id AVG-163
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-163
11
reference_url https://security.gentoo.org/glsa/201705-10
reference_id GLSA-201705-10
reference_type
scores
url https://security.gentoo.org/glsa/201705-10
12
reference_url https://access.redhat.com/errata/RHSA-2017:2060
reference_id RHSA-2017:2060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2060
13
reference_url https://usn.ubuntu.com/3245-1/
reference_id USN-3245-1
reference_type
scores
url https://usn.ubuntu.com/3245-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.4.4-2%2Bdeb8u3
purl pkg:deb/debian/gst-plugins-good1.0@1.4.4-2%2Bdeb8u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1kjc-6zdm-jkf3
1
vulnerability VCID-1z2g-dxzn-27d2
2
vulnerability VCID-2nz4-ctek-zbfy
3
vulnerability VCID-358j-grsx-27fn
4
vulnerability VCID-3qta-hpkg-hqad
5
vulnerability VCID-521g-8qbp-cfh3
6
vulnerability VCID-528p-7av9-1kgv
7
vulnerability VCID-5ry6-b22q-37gy
8
vulnerability VCID-5vfg-uj1z-zudn
9
vulnerability VCID-6aaz-buqb-zfcm
10
vulnerability VCID-6hjf-zva4-ekcv
11
vulnerability VCID-6rvw-7p62-rbdf
12
vulnerability VCID-771b-5s45-hbhd
13
vulnerability VCID-7nn4-cj6x-uff8
14
vulnerability VCID-92kd-us53-qubg
15
vulnerability VCID-a741-fvg4-h3at
16
vulnerability VCID-bk2h-q83z-43cn
17
vulnerability VCID-bpqa-ngtx-pbes
18
vulnerability VCID-byg3-424m-w3gs
19
vulnerability VCID-cnza-7ar1-f7eh
20
vulnerability VCID-exgv-kz5w-w3bq
21
vulnerability VCID-f1k9-rdv3-nqen
22
vulnerability VCID-f1qr-vrev-tbdc
23
vulnerability VCID-fp9x-81jx-fbhz
24
vulnerability VCID-h2zj-j6va-v7hs
25
vulnerability VCID-hatr-ngra-qqb6
26
vulnerability VCID-hgch-q86h-4qcn
27
vulnerability VCID-hmn3-mxh5-73fj
28
vulnerability VCID-hxhp-4xdt-fqfp
29
vulnerability VCID-j1w1-4xvp-7bh8
30
vulnerability VCID-jzft-takg-afb4
31
vulnerability VCID-k1t8-1fq9-m3gg
32
vulnerability VCID-kfe8-dy9e-ryc5
33
vulnerability VCID-m2g4-ecf6-sufy
34
vulnerability VCID-mcdu-z138-vkgv
35
vulnerability VCID-n1tt-vu7b-skew
36
vulnerability VCID-n1x7-a5e5-ckec
37
vulnerability VCID-p46s-buwz-h3by
38
vulnerability VCID-t93h-vv13-4bck
39
vulnerability VCID-tf3v-37zu-pkaf
40
vulnerability VCID-uj8y-np9h-8qg6
41
vulnerability VCID-v4u8-zktd-cfaq
42
vulnerability VCID-wxcy-bnsr-qkdn
43
vulnerability VCID-zup8-xngn-7bh7
44
vulnerability VCID-zz2u-cmgw-k3c1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.4.4-2%252Bdeb8u3
1
url pkg:deb/debian/gst-plugins-good1.0@1.10.4-1
purl pkg:deb/debian/gst-plugins-good1.0@1.10.4-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1kjc-6zdm-jkf3
1
vulnerability VCID-2nz4-ctek-zbfy
2
vulnerability VCID-358j-grsx-27fn
3
vulnerability VCID-3qta-hpkg-hqad
4
vulnerability VCID-521g-8qbp-cfh3
5
vulnerability VCID-528p-7av9-1kgv
6
vulnerability VCID-5ry6-b22q-37gy
7
vulnerability VCID-6aaz-buqb-zfcm
8
vulnerability VCID-6hjf-zva4-ekcv
9
vulnerability VCID-6rvw-7p62-rbdf
10
vulnerability VCID-771b-5s45-hbhd
11
vulnerability VCID-7nn4-cj6x-uff8
12
vulnerability VCID-92kd-us53-qubg
13
vulnerability VCID-a741-fvg4-h3at
14
vulnerability VCID-bpqa-ngtx-pbes
15
vulnerability VCID-exgv-kz5w-w3bq
16
vulnerability VCID-f1qr-vrev-tbdc
17
vulnerability VCID-fp9x-81jx-fbhz
18
vulnerability VCID-h2zj-j6va-v7hs
19
vulnerability VCID-hatr-ngra-qqb6
20
vulnerability VCID-hmn3-mxh5-73fj
21
vulnerability VCID-hxhp-4xdt-fqfp
22
vulnerability VCID-jzft-takg-afb4
23
vulnerability VCID-kfe8-dy9e-ryc5
24
vulnerability VCID-m2g4-ecf6-sufy
25
vulnerability VCID-n1x7-a5e5-ckec
26
vulnerability VCID-p46s-buwz-h3by
27
vulnerability VCID-t93h-vv13-4bck
28
vulnerability VCID-tf3v-37zu-pkaf
29
vulnerability VCID-uj8y-np9h-8qg6
30
vulnerability VCID-v4u8-zktd-cfaq
31
vulnerability VCID-wxcy-bnsr-qkdn
32
vulnerability VCID-zup8-xngn-7bh7
33
vulnerability VCID-zz2u-cmgw-k3c1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.10.4-1
aliases CVE-2017-5841
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mcdu-z138-vkgv
35
url VCID-n1tt-vu7b-skew
vulnerability_id VCID-n1tt-vu7b-skew
summary
Multiple vulnerabilities have been found in various GStreamer
    plug-ins, the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9636.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9636.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9636
reference_id
reference_type
scores
0
value 0.1664
scoring_system epss
scoring_elements 0.94893
published_at 2026-04-01T12:55:00Z
1
value 0.1664
scoring_system epss
scoring_elements 0.94902
published_at 2026-04-02T12:55:00Z
2
value 0.1664
scoring_system epss
scoring_elements 0.94905
published_at 2026-04-04T12:55:00Z
3
value 0.1664
scoring_system epss
scoring_elements 0.94907
published_at 2026-04-07T12:55:00Z
4
value 0.1664
scoring_system epss
scoring_elements 0.94916
published_at 2026-04-08T12:55:00Z
5
value 0.1664
scoring_system epss
scoring_elements 0.94919
published_at 2026-04-09T12:55:00Z
6
value 0.1664
scoring_system epss
scoring_elements 0.94924
published_at 2026-04-11T12:55:00Z
7
value 0.1664
scoring_system epss
scoring_elements 0.94927
published_at 2026-04-12T12:55:00Z
8
value 0.1664
scoring_system epss
scoring_elements 0.94929
published_at 2026-04-13T12:55:00Z
9
value 0.1664
scoring_system epss
scoring_elements 0.94937
published_at 2026-04-16T12:55:00Z
10
value 0.1664
scoring_system epss
scoring_elements 0.9494
published_at 2026-04-18T12:55:00Z
11
value 0.1664
scoring_system epss
scoring_elements 0.94944
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9636
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9634
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9634
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9635
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9636
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1397441
reference_id 1397441
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1397441
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845375
reference_id 845375
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845375
8
reference_url https://security.gentoo.org/glsa/201705-10
reference_id GLSA-201705-10
reference_type
scores
url https://security.gentoo.org/glsa/201705-10
9
reference_url https://access.redhat.com/errata/RHSA-2016:2975
reference_id RHSA-2016:2975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2975
10
reference_url https://access.redhat.com/errata/RHSA-2017:0019
reference_id RHSA-2017:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0019
11
reference_url https://access.redhat.com/errata/RHSA-2017:0020
reference_id RHSA-2017:0020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0020
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.4.4-2%2Bdeb8u3
purl pkg:deb/debian/gst-plugins-good1.0@1.4.4-2%2Bdeb8u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1kjc-6zdm-jkf3
1
vulnerability VCID-1z2g-dxzn-27d2
2
vulnerability VCID-2nz4-ctek-zbfy
3
vulnerability VCID-358j-grsx-27fn
4
vulnerability VCID-3qta-hpkg-hqad
5
vulnerability VCID-521g-8qbp-cfh3
6
vulnerability VCID-528p-7av9-1kgv
7
vulnerability VCID-5ry6-b22q-37gy
8
vulnerability VCID-5vfg-uj1z-zudn
9
vulnerability VCID-6aaz-buqb-zfcm
10
vulnerability VCID-6hjf-zva4-ekcv
11
vulnerability VCID-6rvw-7p62-rbdf
12
vulnerability VCID-771b-5s45-hbhd
13
vulnerability VCID-7nn4-cj6x-uff8
14
vulnerability VCID-92kd-us53-qubg
15
vulnerability VCID-a741-fvg4-h3at
16
vulnerability VCID-bk2h-q83z-43cn
17
vulnerability VCID-bpqa-ngtx-pbes
18
vulnerability VCID-byg3-424m-w3gs
19
vulnerability VCID-cnza-7ar1-f7eh
20
vulnerability VCID-exgv-kz5w-w3bq
21
vulnerability VCID-f1k9-rdv3-nqen
22
vulnerability VCID-f1qr-vrev-tbdc
23
vulnerability VCID-fp9x-81jx-fbhz
24
vulnerability VCID-h2zj-j6va-v7hs
25
vulnerability VCID-hatr-ngra-qqb6
26
vulnerability VCID-hgch-q86h-4qcn
27
vulnerability VCID-hmn3-mxh5-73fj
28
vulnerability VCID-hxhp-4xdt-fqfp
29
vulnerability VCID-j1w1-4xvp-7bh8
30
vulnerability VCID-jzft-takg-afb4
31
vulnerability VCID-k1t8-1fq9-m3gg
32
vulnerability VCID-kfe8-dy9e-ryc5
33
vulnerability VCID-m2g4-ecf6-sufy
34
vulnerability VCID-mcdu-z138-vkgv
35
vulnerability VCID-n1tt-vu7b-skew
36
vulnerability VCID-n1x7-a5e5-ckec
37
vulnerability VCID-p46s-buwz-h3by
38
vulnerability VCID-t93h-vv13-4bck
39
vulnerability VCID-tf3v-37zu-pkaf
40
vulnerability VCID-uj8y-np9h-8qg6
41
vulnerability VCID-v4u8-zktd-cfaq
42
vulnerability VCID-wxcy-bnsr-qkdn
43
vulnerability VCID-zup8-xngn-7bh7
44
vulnerability VCID-zz2u-cmgw-k3c1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.4.4-2%252Bdeb8u3
1
url pkg:deb/debian/gst-plugins-good1.0@1.10.4-1
purl pkg:deb/debian/gst-plugins-good1.0@1.10.4-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1kjc-6zdm-jkf3
1
vulnerability VCID-2nz4-ctek-zbfy
2
vulnerability VCID-358j-grsx-27fn
3
vulnerability VCID-3qta-hpkg-hqad
4
vulnerability VCID-521g-8qbp-cfh3
5
vulnerability VCID-528p-7av9-1kgv
6
vulnerability VCID-5ry6-b22q-37gy
7
vulnerability VCID-6aaz-buqb-zfcm
8
vulnerability VCID-6hjf-zva4-ekcv
9
vulnerability VCID-6rvw-7p62-rbdf
10
vulnerability VCID-771b-5s45-hbhd
11
vulnerability VCID-7nn4-cj6x-uff8
12
vulnerability VCID-92kd-us53-qubg
13
vulnerability VCID-a741-fvg4-h3at
14
vulnerability VCID-bpqa-ngtx-pbes
15
vulnerability VCID-exgv-kz5w-w3bq
16
vulnerability VCID-f1qr-vrev-tbdc
17
vulnerability VCID-fp9x-81jx-fbhz
18
vulnerability VCID-h2zj-j6va-v7hs
19
vulnerability VCID-hatr-ngra-qqb6
20
vulnerability VCID-hmn3-mxh5-73fj
21
vulnerability VCID-hxhp-4xdt-fqfp
22
vulnerability VCID-jzft-takg-afb4
23
vulnerability VCID-kfe8-dy9e-ryc5
24
vulnerability VCID-m2g4-ecf6-sufy
25
vulnerability VCID-n1x7-a5e5-ckec
26
vulnerability VCID-p46s-buwz-h3by
27
vulnerability VCID-t93h-vv13-4bck
28
vulnerability VCID-tf3v-37zu-pkaf
29
vulnerability VCID-uj8y-np9h-8qg6
30
vulnerability VCID-v4u8-zktd-cfaq
31
vulnerability VCID-wxcy-bnsr-qkdn
32
vulnerability VCID-zup8-xngn-7bh7
33
vulnerability VCID-zz2u-cmgw-k3c1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.10.4-1
aliases CVE-2016-9636
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n1tt-vu7b-skew
36
url VCID-n1x7-a5e5-ckec
vulnerability_id VCID-n1x7-a5e5-ckec
summary Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47545.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47545.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47545
reference_id
reference_type
scores
0
value 0.00131
scoring_system epss
scoring_elements 0.32688
published_at 2026-04-04T12:55:00Z
1
value 0.00131
scoring_system epss
scoring_elements 0.32652
published_at 2026-04-02T12:55:00Z
2
value 0.00206
scoring_system epss
scoring_elements 0.42755
published_at 2026-04-18T12:55:00Z
3
value 0.00206
scoring_system epss
scoring_elements 0.42692
published_at 2026-04-21T12:55:00Z
4
value 0.00206
scoring_system epss
scoring_elements 0.42722
published_at 2026-04-12T12:55:00Z
5
value 0.00206
scoring_system epss
scoring_elements 0.42705
published_at 2026-04-13T12:55:00Z
6
value 0.00206
scoring_system epss
scoring_elements 0.42767
published_at 2026-04-16T12:55:00Z
7
value 0.00223
scoring_system epss
scoring_elements 0.45051
published_at 2026-04-11T12:55:00Z
8
value 0.00223
scoring_system epss
scoring_elements 0.44976
published_at 2026-04-07T12:55:00Z
9
value 0.00223
scoring_system epss
scoring_elements 0.45028
published_at 2026-04-08T12:55:00Z
10
value 0.00223
scoring_system epss
scoring_elements 0.45029
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47545
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47545
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2331763
reference_id 2331763
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2331763
5
reference_url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch
reference_id 8059.patch
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-13T17:44:03Z/
url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch
6
reference_url https://securitylab.github.com/advisories/GHSL-2024-242_Gstreamer/
reference_id GHSL-2024-242_Gstreamer
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-13T17:44:03Z/
url https://securitylab.github.com/advisories/GHSL-2024-242_Gstreamer/
7
reference_url https://security.gentoo.org/glsa/202506-02
reference_id GLSA-202506-02
reference_type
scores
url https://security.gentoo.org/glsa/202506-02
8
reference_url https://access.redhat.com/errata/RHSA-2025:7242
reference_id RHSA-2025:7242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7242
9
reference_url https://gstreamer.freedesktop.org/security/sa-2024-0010.html
reference_id sa-2024-0010.html
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-13T17:44:03Z/
url https://gstreamer.freedesktop.org/security/sa-2024-0010.html
10
reference_url https://usn.ubuntu.com/7176-1/
reference_id USN-7176-1
reference_type
scores
url https://usn.ubuntu.com/7176-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
purl pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1g9u-gemh-83bw
1
vulnerability VCID-4ka2-hbcv-8uh2
2
vulnerability VCID-6rvw-7p62-rbdf
3
vulnerability VCID-upbh-pvqc-4ubn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3
aliases CVE-2024-47545
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n1x7-a5e5-ckec
37
url VCID-p46s-buwz-h3by
vulnerability_id VCID-p46s-buwz-h3by
summary Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47540.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47540.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47540
reference_id
reference_type
scores
0
value 0.00418
scoring_system epss
scoring_elements 0.61782
published_at 2026-04-04T12:55:00Z
1
value 0.00418
scoring_system epss
scoring_elements 0.61752
published_at 2026-04-02T12:55:00Z
2
value 0.00713
scoring_system epss
scoring_elements 0.72322
published_at 2026-04-09T12:55:00Z
3
value 0.00713
scoring_system epss
scoring_elements 0.72366
published_at 2026-04-18T12:55:00Z
4
value 0.00713
scoring_system epss
scoring_elements 0.72357
published_at 2026-04-16T12:55:00Z
5
value 0.00713
scoring_system epss
scoring_elements 0.72315
published_at 2026-04-13T12:55:00Z
6
value 0.00713
scoring_system epss
scoring_elements 0.72345
published_at 2026-04-11T12:55:00Z
7
value 0.00713
scoring_system epss
scoring_elements 0.72354
published_at 2026-04-21T12:55:00Z
8
value 0.00713
scoring_system epss
scoring_elements 0.72328
published_at 2026-04-12T12:55:00Z
9
value 0.00713
scoring_system epss
scoring_elements 0.72272
published_at 2026-04-07T12:55:00Z
10
value 0.00713
scoring_system epss
scoring_elements 0.7231
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47540
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47540
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2331719
reference_id 2331719
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2331719
5
reference_url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch
reference_id 8057.patch
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:34:42Z/
url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch
6
reference_url https://securitylab.github.com/advisories/GHSL-2024-197_GStreamer/
reference_id GHSL-2024-197_GStreamer
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:34:42Z/
url https://securitylab.github.com/advisories/GHSL-2024-197_GStreamer/
7
reference_url https://security.gentoo.org/glsa/202506-02
reference_id GLSA-202506-02
reference_type
scores
url https://security.gentoo.org/glsa/202506-02
8
reference_url https://access.redhat.com/errata/RHSA-2024:11119
reference_id RHSA-2024:11119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11119
9
reference_url https://access.redhat.com/errata/RHSA-2024:11121
reference_id RHSA-2024:11121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11121
10
reference_url https://access.redhat.com/errata/RHSA-2024:11122
reference_id RHSA-2024:11122
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11122
11
reference_url https://access.redhat.com/errata/RHSA-2024:11148
reference_id RHSA-2024:11148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11148
12
reference_url https://access.redhat.com/errata/RHSA-2024:11149
reference_id RHSA-2024:11149
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11149
13
reference_url https://access.redhat.com/errata/RHSA-2024:11298
reference_id RHSA-2024:11298
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11298
14
reference_url https://access.redhat.com/errata/RHSA-2024:11299
reference_id RHSA-2024:11299
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11299
15
reference_url https://access.redhat.com/errata/RHSA-2024:11344
reference_id RHSA-2024:11344
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11344
16
reference_url https://access.redhat.com/errata/RHSA-2024:11346
reference_id RHSA-2024:11346
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11346
17
reference_url https://access.redhat.com/errata/RHSA-2024:11348
reference_id RHSA-2024:11348
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11348
18
reference_url https://gstreamer.freedesktop.org/security/sa-2024-0017.html
reference_id sa-2024-0017.html
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:34:42Z/
url https://gstreamer.freedesktop.org/security/sa-2024-0017.html
19
reference_url https://usn.ubuntu.com/7176-1/
reference_id USN-7176-1
reference_type
scores
url https://usn.ubuntu.com/7176-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
purl pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1g9u-gemh-83bw
1
vulnerability VCID-4ka2-hbcv-8uh2
2
vulnerability VCID-6rvw-7p62-rbdf
3
vulnerability VCID-upbh-pvqc-4ubn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3
aliases CVE-2024-47540
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p46s-buwz-h3by
38
url VCID-t93h-vv13-4bck
vulnerability_id VCID-t93h-vv13-4bck
summary Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47777.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47777.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47777
reference_id
reference_type
scores
0
value 0.00069
scoring_system epss
scoring_elements 0.21403
published_at 2026-04-04T12:55:00Z
1
value 0.00069
scoring_system epss
scoring_elements 0.21348
published_at 2026-04-02T12:55:00Z
2
value 0.00118
scoring_system epss
scoring_elements 0.3068
published_at 2026-04-13T12:55:00Z
3
value 0.00118
scoring_system epss
scoring_elements 0.30686
published_at 2026-04-18T12:55:00Z
4
value 0.00118
scoring_system epss
scoring_elements 0.30766
published_at 2026-04-09T12:55:00Z
5
value 0.00118
scoring_system epss
scoring_elements 0.30769
published_at 2026-04-11T12:55:00Z
6
value 0.00118
scoring_system epss
scoring_elements 0.30726
published_at 2026-04-12T12:55:00Z
7
value 0.00118
scoring_system epss
scoring_elements 0.30704
published_at 2026-04-16T12:55:00Z
8
value 0.00118
scoring_system epss
scoring_elements 0.30653
published_at 2026-04-21T12:55:00Z
9
value 0.00118
scoring_system epss
scoring_elements 0.30675
published_at 2026-04-07T12:55:00Z
10
value 0.00118
scoring_system epss
scoring_elements 0.30734
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47777
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47777
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2331741
reference_id 2331741
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2331741
5
reference_url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8042.patch
reference_id 8042.patch
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:07:19Z/
url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8042.patch
6
reference_url https://securitylab.github.com/advisories/GHSL-2024-259_Gstreamer/
reference_id GHSL-2024-259_Gstreamer
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:07:19Z/
url https://securitylab.github.com/advisories/GHSL-2024-259_Gstreamer/
7
reference_url https://security.gentoo.org/glsa/202506-02
reference_id GLSA-202506-02
reference_type
scores
url https://security.gentoo.org/glsa/202506-02
8
reference_url https://access.redhat.com/errata/RHSA-2025:7242
reference_id RHSA-2025:7242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7242
9
reference_url https://gstreamer.freedesktop.org/security/sa-2024-0027.html
reference_id sa-2024-0027.html
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:07:19Z/
url https://gstreamer.freedesktop.org/security/sa-2024-0027.html
10
reference_url https://usn.ubuntu.com/7176-1/
reference_id USN-7176-1
reference_type
scores
url https://usn.ubuntu.com/7176-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
purl pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1g9u-gemh-83bw
1
vulnerability VCID-4ka2-hbcv-8uh2
2
vulnerability VCID-6rvw-7p62-rbdf
3
vulnerability VCID-upbh-pvqc-4ubn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3
aliases CVE-2024-47777
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t93h-vv13-4bck
39
url VCID-tf3v-37zu-pkaf
vulnerability_id VCID-tf3v-37zu-pkaf
summary Multiple vulnerabilities have been discovered in gst-plugins-good, the worst of which could lead to denial of service or arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1925.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1925.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1925
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.13771
published_at 2026-04-01T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.13865
published_at 2026-04-02T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.13922
published_at 2026-04-04T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13724
published_at 2026-04-07T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13806
published_at 2026-04-08T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13857
published_at 2026-04-09T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13825
published_at 2026-04-11T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13789
published_at 2026-04-12T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.13741
published_at 2026-04-13T12:55:00Z
9
value 0.00045
scoring_system epss
scoring_elements 0.13649
published_at 2026-04-16T12:55:00Z
10
value 0.00045
scoring_system epss
scoring_elements 0.13646
published_at 2026-04-18T12:55:00Z
11
value 0.00045
scoring_system epss
scoring_elements 0.13718
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1925
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2131007
reference_id 2131007
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2131007
11
reference_url https://security.gentoo.org/glsa/202409-13
reference_id GLSA-202409-13
reference_type
scores
url https://security.gentoo.org/glsa/202409-13
12
reference_url https://access.redhat.com/errata/RHSA-2023:2260
reference_id RHSA-2023:2260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2260
13
reference_url https://usn.ubuntu.com/5555-1/
reference_id USN-5555-1
reference_type
scores
url https://usn.ubuntu.com/5555-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2
purl pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1g9u-gemh-83bw
1
vulnerability VCID-2nz4-ctek-zbfy
2
vulnerability VCID-358j-grsx-27fn
3
vulnerability VCID-3qta-hpkg-hqad
4
vulnerability VCID-4ka2-hbcv-8uh2
5
vulnerability VCID-528p-7av9-1kgv
6
vulnerability VCID-5ry6-b22q-37gy
7
vulnerability VCID-6hjf-zva4-ekcv
8
vulnerability VCID-6rvw-7p62-rbdf
9
vulnerability VCID-92kd-us53-qubg
10
vulnerability VCID-a741-fvg4-h3at
11
vulnerability VCID-bpqa-ngtx-pbes
12
vulnerability VCID-f1qr-vrev-tbdc
13
vulnerability VCID-fp9x-81jx-fbhz
14
vulnerability VCID-h2zj-j6va-v7hs
15
vulnerability VCID-hatr-ngra-qqb6
16
vulnerability VCID-hmn3-mxh5-73fj
17
vulnerability VCID-hxhp-4xdt-fqfp
18
vulnerability VCID-jzft-takg-afb4
19
vulnerability VCID-kfe8-dy9e-ryc5
20
vulnerability VCID-n1x7-a5e5-ckec
21
vulnerability VCID-p46s-buwz-h3by
22
vulnerability VCID-t93h-vv13-4bck
23
vulnerability VCID-uj8y-np9h-8qg6
24
vulnerability VCID-upbh-pvqc-4ubn
25
vulnerability VCID-v4u8-zktd-cfaq
26
vulnerability VCID-wxcy-bnsr-qkdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2
aliases CVE-2022-1925
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tf3v-37zu-pkaf
40
url VCID-uj8y-np9h-8qg6
vulnerability_id VCID-uj8y-np9h-8qg6
summary Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47546.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47546.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47546
reference_id
reference_type
scores
0
value 0.00114
scoring_system epss
scoring_elements 0.30213
published_at 2026-04-04T12:55:00Z
1
value 0.00114
scoring_system epss
scoring_elements 0.30166
published_at 2026-04-02T12:55:00Z
2
value 0.0018
scoring_system epss
scoring_elements 0.39563
published_at 2026-04-21T12:55:00Z
3
value 0.0018
scoring_system epss
scoring_elements 0.39647
published_at 2026-04-18T12:55:00Z
4
value 0.0018
scoring_system epss
scoring_elements 0.39676
published_at 2026-04-16T12:55:00Z
5
value 0.0018
scoring_system epss
scoring_elements 0.39625
published_at 2026-04-13T12:55:00Z
6
value 0.0018
scoring_system epss
scoring_elements 0.39642
published_at 2026-04-12T12:55:00Z
7
value 0.00196
scoring_system epss
scoring_elements 0.41569
published_at 2026-04-09T12:55:00Z
8
value 0.00196
scoring_system epss
scoring_elements 0.4159
published_at 2026-04-11T12:55:00Z
9
value 0.00196
scoring_system epss
scoring_elements 0.4151
published_at 2026-04-07T12:55:00Z
10
value 0.00196
scoring_system epss
scoring_elements 0.4156
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47546
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47546
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2331756
reference_id 2331756
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2331756
5
reference_url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch
reference_id 8059.patch
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-13T17:42:31Z/
url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch
6
reference_url https://securitylab.github.com/advisories/GHSL-2024-243_Gstreamer/
reference_id GHSL-2024-243_Gstreamer
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-13T17:42:31Z/
url https://securitylab.github.com/advisories/GHSL-2024-243_Gstreamer/
7
reference_url https://security.gentoo.org/glsa/202506-02
reference_id GLSA-202506-02
reference_type
scores
url https://security.gentoo.org/glsa/202506-02
8
reference_url https://access.redhat.com/errata/RHSA-2025:7242
reference_id RHSA-2025:7242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7242
9
reference_url https://gstreamer.freedesktop.org/security/sa-2024-0013.html
reference_id sa-2024-0013.html
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-13T17:42:31Z/
url https://gstreamer.freedesktop.org/security/sa-2024-0013.html
10
reference_url https://usn.ubuntu.com/7176-1/
reference_id USN-7176-1
reference_type
scores
url https://usn.ubuntu.com/7176-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
purl pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1g9u-gemh-83bw
1
vulnerability VCID-4ka2-hbcv-8uh2
2
vulnerability VCID-6rvw-7p62-rbdf
3
vulnerability VCID-upbh-pvqc-4ubn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3
aliases CVE-2024-47546
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uj8y-np9h-8qg6
41
url VCID-v4u8-zktd-cfaq
vulnerability_id VCID-v4u8-zktd-cfaq
summary Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47597.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47597.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47597
reference_id
reference_type
scores
0
value 0.00079
scoring_system epss
scoring_elements 0.23539
published_at 2026-04-04T12:55:00Z
1
value 0.00079
scoring_system epss
scoring_elements 0.23502
published_at 2026-04-02T12:55:00Z
2
value 0.00124
scoring_system epss
scoring_elements 0.31578
published_at 2026-04-21T12:55:00Z
3
value 0.00124
scoring_system epss
scoring_elements 0.3161
published_at 2026-04-18T12:55:00Z
4
value 0.00124
scoring_system epss
scoring_elements 0.31632
published_at 2026-04-16T12:55:00Z
5
value 0.00124
scoring_system epss
scoring_elements 0.31598
published_at 2026-04-13T12:55:00Z
6
value 0.00124
scoring_system epss
scoring_elements 0.31634
published_at 2026-04-12T12:55:00Z
7
value 0.00135
scoring_system epss
scoring_elements 0.33216
published_at 2026-04-09T12:55:00Z
8
value 0.00135
scoring_system epss
scoring_elements 0.33219
published_at 2026-04-11T12:55:00Z
9
value 0.00135
scoring_system epss
scoring_elements 0.3314
published_at 2026-04-07T12:55:00Z
10
value 0.00135
scoring_system epss
scoring_elements 0.33183
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47597
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47597
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2331755
reference_id 2331755
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2331755
5
reference_url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch
reference_id 8059.patch
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:50:51Z/
url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch
6
reference_url https://securitylab.github.com/advisories/GHSL-2024-245_Gstreamer/
reference_id GHSL-2024-245_Gstreamer
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:50:51Z/
url https://securitylab.github.com/advisories/GHSL-2024-245_Gstreamer/
7
reference_url https://security.gentoo.org/glsa/202506-02
reference_id GLSA-202506-02
reference_type
scores
url https://security.gentoo.org/glsa/202506-02
8
reference_url https://access.redhat.com/errata/RHSA-2025:7242
reference_id RHSA-2025:7242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7242
9
reference_url https://gstreamer.freedesktop.org/security/sa-2024-0012.html
reference_id sa-2024-0012.html
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:50:51Z/
url https://gstreamer.freedesktop.org/security/sa-2024-0012.html
10
reference_url https://usn.ubuntu.com/7176-1/
reference_id USN-7176-1
reference_type
scores
url https://usn.ubuntu.com/7176-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
purl pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1g9u-gemh-83bw
1
vulnerability VCID-4ka2-hbcv-8uh2
2
vulnerability VCID-6rvw-7p62-rbdf
3
vulnerability VCID-upbh-pvqc-4ubn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3
aliases CVE-2024-47597
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v4u8-zktd-cfaq
42
url VCID-wxcy-bnsr-qkdn
vulnerability_id VCID-wxcy-bnsr-qkdn
summary Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47544.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47544.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47544
reference_id
reference_type
scores
0
value 0.00105
scoring_system epss
scoring_elements 0.28764
published_at 2026-04-04T12:55:00Z
1
value 0.00105
scoring_system epss
scoring_elements 0.28716
published_at 2026-04-02T12:55:00Z
2
value 0.0018
scoring_system epss
scoring_elements 0.39668
published_at 2026-04-09T12:55:00Z
3
value 0.0018
scoring_system epss
scoring_elements 0.39647
published_at 2026-04-18T12:55:00Z
4
value 0.0018
scoring_system epss
scoring_elements 0.39676
published_at 2026-04-16T12:55:00Z
5
value 0.0018
scoring_system epss
scoring_elements 0.39625
published_at 2026-04-13T12:55:00Z
6
value 0.0018
scoring_system epss
scoring_elements 0.39677
published_at 2026-04-11T12:55:00Z
7
value 0.0018
scoring_system epss
scoring_elements 0.39563
published_at 2026-04-21T12:55:00Z
8
value 0.0018
scoring_system epss
scoring_elements 0.39642
published_at 2026-04-12T12:55:00Z
9
value 0.0018
scoring_system epss
scoring_elements 0.39599
published_at 2026-04-07T12:55:00Z
10
value 0.0018
scoring_system epss
scoring_elements 0.39654
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47544
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47544
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47544
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2331751
reference_id 2331751
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2331751
5
reference_url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch
reference_id 8059.patch
reference_type
scores
0
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T16:37:30Z/
url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch
6
reference_url https://securitylab.github.com/advisories/GHSL-2024-238_Gstreamer/
reference_id GHSL-2024-238_Gstreamer
reference_type
scores
0
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T16:37:30Z/
url https://securitylab.github.com/advisories/GHSL-2024-238_Gstreamer/
7
reference_url https://security.gentoo.org/glsa/202506-02
reference_id GLSA-202506-02
reference_type
scores
url https://security.gentoo.org/glsa/202506-02
8
reference_url https://access.redhat.com/errata/RHSA-2025:7242
reference_id RHSA-2025:7242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7242
9
reference_url https://gstreamer.freedesktop.org/security/sa-2024-0011.html
reference_id sa-2024-0011.html
reference_type
scores
0
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T16:37:30Z/
url https://gstreamer.freedesktop.org/security/sa-2024-0011.html
10
reference_url https://usn.ubuntu.com/7176-1/
reference_id USN-7176-1
reference_type
scores
url https://usn.ubuntu.com/7176-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
purl pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1g9u-gemh-83bw
1
vulnerability VCID-4ka2-hbcv-8uh2
2
vulnerability VCID-6rvw-7p62-rbdf
3
vulnerability VCID-upbh-pvqc-4ubn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3
aliases CVE-2024-47544
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wxcy-bnsr-qkdn
43
url VCID-zup8-xngn-7bh7
vulnerability_id VCID-zup8-xngn-7bh7
summary gstreamer-plugins-good: integer overflow leading to heap overwrite in FLAC image tag handling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37327.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37327.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-37327
reference_id
reference_type
scores
0
value 0.05336
scoring_system epss
scoring_elements 0.90016
published_at 2026-04-02T12:55:00Z
1
value 0.05336
scoring_system epss
scoring_elements 0.90069
published_at 2026-04-21T12:55:00Z
2
value 0.05336
scoring_system epss
scoring_elements 0.90053
published_at 2026-04-09T12:55:00Z
3
value 0.05336
scoring_system epss
scoring_elements 0.90063
published_at 2026-04-11T12:55:00Z
4
value 0.05336
scoring_system epss
scoring_elements 0.90061
published_at 2026-04-12T12:55:00Z
5
value 0.05336
scoring_system epss
scoring_elements 0.90055
published_at 2026-04-13T12:55:00Z
6
value 0.05336
scoring_system epss
scoring_elements 0.90072
published_at 2026-04-18T12:55:00Z
7
value 0.05336
scoring_system epss
scoring_elements 0.90028
published_at 2026-04-04T12:55:00Z
8
value 0.05336
scoring_system epss
scoring_elements 0.90033
published_at 2026-04-07T12:55:00Z
9
value 0.05336
scoring_system epss
scoring_elements 0.90048
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-37327
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37327
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37327
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2254539
reference_id 2254539
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2254539
5
reference_url https://access.redhat.com/errata/RHSA-2024:2303
reference_id RHSA-2024:2303
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2303
6
reference_url https://access.redhat.com/errata/RHSA-2024:3089
reference_id RHSA-2024:3089
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3089
7
reference_url https://gstreamer.freedesktop.org/security/sa-2023-0001.html
reference_id sa-2023-0001.html
reference_type
scores
0
value 7.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-05T18:28:13Z/
url https://gstreamer.freedesktop.org/security/sa-2023-0001.html
8
reference_url https://usn.ubuntu.com/6268-1/
reference_id USN-6268-1
reference_type
scores
url https://usn.ubuntu.com/6268-1/
9
reference_url https://usn.ubuntu.com/6269-1/
reference_id USN-6269-1
reference_type
scores
url https://usn.ubuntu.com/6269-1/
10
reference_url https://usn.ubuntu.com/7807-1/
reference_id USN-7807-1
reference_type
scores
url https://usn.ubuntu.com/7807-1/
11
reference_url https://www.zerodayinitiative.com/advisories/ZDI-23-903/
reference_id ZDI-23-903
reference_type
scores
0
value 7.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-05T18:28:13Z/
url https://www.zerodayinitiative.com/advisories/ZDI-23-903/
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2
purl pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1g9u-gemh-83bw
1
vulnerability VCID-2nz4-ctek-zbfy
2
vulnerability VCID-358j-grsx-27fn
3
vulnerability VCID-3qta-hpkg-hqad
4
vulnerability VCID-4ka2-hbcv-8uh2
5
vulnerability VCID-528p-7av9-1kgv
6
vulnerability VCID-5ry6-b22q-37gy
7
vulnerability VCID-6hjf-zva4-ekcv
8
vulnerability VCID-6rvw-7p62-rbdf
9
vulnerability VCID-92kd-us53-qubg
10
vulnerability VCID-a741-fvg4-h3at
11
vulnerability VCID-bpqa-ngtx-pbes
12
vulnerability VCID-f1qr-vrev-tbdc
13
vulnerability VCID-fp9x-81jx-fbhz
14
vulnerability VCID-h2zj-j6va-v7hs
15
vulnerability VCID-hatr-ngra-qqb6
16
vulnerability VCID-hmn3-mxh5-73fj
17
vulnerability VCID-hxhp-4xdt-fqfp
18
vulnerability VCID-jzft-takg-afb4
19
vulnerability VCID-kfe8-dy9e-ryc5
20
vulnerability VCID-n1x7-a5e5-ckec
21
vulnerability VCID-p46s-buwz-h3by
22
vulnerability VCID-t93h-vv13-4bck
23
vulnerability VCID-uj8y-np9h-8qg6
24
vulnerability VCID-upbh-pvqc-4ubn
25
vulnerability VCID-v4u8-zktd-cfaq
26
vulnerability VCID-wxcy-bnsr-qkdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2
aliases CVE-2023-37327
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zup8-xngn-7bh7
44
url VCID-zz2u-cmgw-k3c1
vulnerability_id VCID-zz2u-cmgw-k3c1
summary Multiple vulnerabilities have been discovered in gst-plugins-good, the worst of which could lead to denial of service or arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2122.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2122.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2122
reference_id
reference_type
scores
0
value 0.00046
scoring_system epss
scoring_elements 0.14244
published_at 2026-04-21T12:55:00Z
1
value 0.00046
scoring_system epss
scoring_elements 0.14176
published_at 2026-04-16T12:55:00Z
2
value 0.00046
scoring_system epss
scoring_elements 0.14173
published_at 2026-04-18T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.19203
published_at 2026-04-04T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.18999
published_at 2026-04-08T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.19053
published_at 2026-04-09T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.19059
published_at 2026-04-11T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.19013
published_at 2026-04-12T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.18961
published_at 2026-04-13T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.18919
published_at 2026-04-07T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.19151
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2122
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2131018
reference_id 2131018
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2131018
11
reference_url https://security.gentoo.org/glsa/202409-13
reference_id GLSA-202409-13
reference_type
scores
url https://security.gentoo.org/glsa/202409-13
12
reference_url https://access.redhat.com/errata/RHSA-2023:2260
reference_id RHSA-2023:2260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2260
13
reference_url https://usn.ubuntu.com/5555-1/
reference_id USN-5555-1
reference_type
scores
url https://usn.ubuntu.com/5555-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2
purl pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1g9u-gemh-83bw
1
vulnerability VCID-2nz4-ctek-zbfy
2
vulnerability VCID-358j-grsx-27fn
3
vulnerability VCID-3qta-hpkg-hqad
4
vulnerability VCID-4ka2-hbcv-8uh2
5
vulnerability VCID-528p-7av9-1kgv
6
vulnerability VCID-5ry6-b22q-37gy
7
vulnerability VCID-6hjf-zva4-ekcv
8
vulnerability VCID-6rvw-7p62-rbdf
9
vulnerability VCID-92kd-us53-qubg
10
vulnerability VCID-a741-fvg4-h3at
11
vulnerability VCID-bpqa-ngtx-pbes
12
vulnerability VCID-f1qr-vrev-tbdc
13
vulnerability VCID-fp9x-81jx-fbhz
14
vulnerability VCID-h2zj-j6va-v7hs
15
vulnerability VCID-hatr-ngra-qqb6
16
vulnerability VCID-hmn3-mxh5-73fj
17
vulnerability VCID-hxhp-4xdt-fqfp
18
vulnerability VCID-jzft-takg-afb4
19
vulnerability VCID-kfe8-dy9e-ryc5
20
vulnerability VCID-n1x7-a5e5-ckec
21
vulnerability VCID-p46s-buwz-h3by
22
vulnerability VCID-t93h-vv13-4bck
23
vulnerability VCID-uj8y-np9h-8qg6
24
vulnerability VCID-upbh-pvqc-4ubn
25
vulnerability VCID-v4u8-zktd-cfaq
26
vulnerability VCID-wxcy-bnsr-qkdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2
aliases CVE-2022-2122
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zz2u-cmgw-k3c1
Fixing_vulnerabilities
Risk_score4.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.4.4-2