Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/gst-plugins-base1.0@1.10.4-1%2Bdeb9u1
Typedeb
Namespacedebian
Namegst-plugins-base1.0
Version1.10.4-1+deb9u1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.22.0-3+deb12u5
Latest_non_vulnerable_version1.22.0-3+deb12u5
Affected_by_vulnerabilities
0
url VCID-21tf-t9ww-ufg5
vulnerability_id VCID-21tf-t9ww-ufg5
summary
A heap-based buffer overflow in GStreamer Base Plugins might allow
    remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9928.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9928.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9928
reference_id
reference_type
scores
0
value 0.17337
scoring_system epss
scoring_elements 0.95015
published_at 2026-04-01T12:55:00Z
1
value 0.17337
scoring_system epss
scoring_elements 0.95026
published_at 2026-04-02T12:55:00Z
2
value 0.17337
scoring_system epss
scoring_elements 0.95027
published_at 2026-04-04T12:55:00Z
3
value 0.17337
scoring_system epss
scoring_elements 0.95029
published_at 2026-04-07T12:55:00Z
4
value 0.17337
scoring_system epss
scoring_elements 0.95037
published_at 2026-04-08T12:55:00Z
5
value 0.17337
scoring_system epss
scoring_elements 0.95041
published_at 2026-04-09T12:55:00Z
6
value 0.17337
scoring_system epss
scoring_elements 0.95047
published_at 2026-04-11T12:55:00Z
7
value 0.17337
scoring_system epss
scoring_elements 0.95048
published_at 2026-04-12T12:55:00Z
8
value 0.17337
scoring_system epss
scoring_elements 0.95051
published_at 2026-04-13T12:55:00Z
9
value 0.17337
scoring_system epss
scoring_elements 0.9506
published_at 2026-04-16T12:55:00Z
10
value 0.17337
scoring_system epss
scoring_elements 0.95063
published_at 2026-04-18T12:55:00Z
11
value 0.17337
scoring_system epss
scoring_elements 0.95065
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9928
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9928
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1724904
reference_id 1724904
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1724904
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927978
reference_id 927978
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927978
6
reference_url https://security.gentoo.org/glsa/202003-33
reference_id GLSA-202003-33
reference_type
scores
url https://security.gentoo.org/glsa/202003-33
7
reference_url https://usn.ubuntu.com/3958-1/
reference_id USN-3958-1
reference_type
scores
url https://usn.ubuntu.com/3958-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-base1.0@1.14.4-2%2Bdeb10u1
purl pkg:deb/debian/gst-plugins-base1.0@1.14.4-2%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-32zy-1a2y-nkdz
1
vulnerability VCID-4xqt-vrk6-dyfr
2
vulnerability VCID-64mw-yyjq-mqgp
3
vulnerability VCID-9wre-pzu1-y3a7
4
vulnerability VCID-a2rd-ntzd-2kdr
5
vulnerability VCID-b22v-3x5y-kbbx
6
vulnerability VCID-bd83-n2qx-gqeh
7
vulnerability VCID-gw57-rwva-r7fb
8
vulnerability VCID-j8pf-ztyq-1ufd
9
vulnerability VCID-jkag-wv9p-5yhm
10
vulnerability VCID-k198-ngub-ayfx
11
vulnerability VCID-rkb1-hqh5-uqcy
12
vulnerability VCID-ye91-ftez-j7bb
13
vulnerability VCID-ygdq-ef5t-e7bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.14.4-2%252Bdeb10u1
aliases CVE-2019-9928
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-21tf-t9ww-ufg5
1
url VCID-32zy-1a2y-nkdz
vulnerability_id VCID-32zy-1a2y-nkdz
summary Multiple vulnerabilities have been found in GStreamer and its plugins, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3522.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3522.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3522
reference_id
reference_type
scores
0
value 0.0013
scoring_system epss
scoring_elements 0.32402
published_at 2026-04-01T12:55:00Z
1
value 0.0013
scoring_system epss
scoring_elements 0.32552
published_at 2026-04-02T12:55:00Z
2
value 0.0013
scoring_system epss
scoring_elements 0.32588
published_at 2026-04-04T12:55:00Z
3
value 0.0013
scoring_system epss
scoring_elements 0.32412
published_at 2026-04-07T12:55:00Z
4
value 0.0013
scoring_system epss
scoring_elements 0.3246
published_at 2026-04-08T12:55:00Z
5
value 0.0013
scoring_system epss
scoring_elements 0.32487
published_at 2026-04-09T12:55:00Z
6
value 0.0013
scoring_system epss
scoring_elements 0.32491
published_at 2026-04-11T12:55:00Z
7
value 0.0013
scoring_system epss
scoring_elements 0.32452
published_at 2026-04-12T12:55:00Z
8
value 0.0013
scoring_system epss
scoring_elements 0.32426
published_at 2026-04-13T12:55:00Z
9
value 0.0013
scoring_system epss
scoring_elements 0.32461
published_at 2026-04-16T12:55:00Z
10
value 0.0013
scoring_system epss
scoring_elements 0.32439
published_at 2026-04-18T12:55:00Z
11
value 0.0013
scoring_system epss
scoring_elements 0.3241
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3522
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3522
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1954761
reference_id 1954761
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1954761
5
reference_url https://security.gentoo.org/glsa/202208-31
reference_id GLSA-202208-31
reference_type
scores
url https://security.gentoo.org/glsa/202208-31
6
reference_url https://usn.ubuntu.com/4959-1/
reference_id USN-4959-1
reference_type
scores
url https://usn.ubuntu.com/4959-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-base1.0@1.14.4-2%2Bdeb10u1
purl pkg:deb/debian/gst-plugins-base1.0@1.14.4-2%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-32zy-1a2y-nkdz
1
vulnerability VCID-4xqt-vrk6-dyfr
2
vulnerability VCID-64mw-yyjq-mqgp
3
vulnerability VCID-9wre-pzu1-y3a7
4
vulnerability VCID-a2rd-ntzd-2kdr
5
vulnerability VCID-b22v-3x5y-kbbx
6
vulnerability VCID-bd83-n2qx-gqeh
7
vulnerability VCID-gw57-rwva-r7fb
8
vulnerability VCID-j8pf-ztyq-1ufd
9
vulnerability VCID-jkag-wv9p-5yhm
10
vulnerability VCID-k198-ngub-ayfx
11
vulnerability VCID-rkb1-hqh5-uqcy
12
vulnerability VCID-ye91-ftez-j7bb
13
vulnerability VCID-ygdq-ef5t-e7bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.14.4-2%252Bdeb10u1
1
url pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%2Bdeb11u2
purl pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%2Bdeb11u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4xqt-vrk6-dyfr
1
vulnerability VCID-64mw-yyjq-mqgp
2
vulnerability VCID-9wre-pzu1-y3a7
3
vulnerability VCID-a2rd-ntzd-2kdr
4
vulnerability VCID-b22v-3x5y-kbbx
5
vulnerability VCID-bd83-n2qx-gqeh
6
vulnerability VCID-gw57-rwva-r7fb
7
vulnerability VCID-j8pf-ztyq-1ufd
8
vulnerability VCID-jkag-wv9p-5yhm
9
vulnerability VCID-k198-ngub-ayfx
10
vulnerability VCID-ye91-ftez-j7bb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%252Bdeb11u2
aliases CVE-2021-3522
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-32zy-1a2y-nkdz
2
url VCID-4xqt-vrk6-dyfr
vulnerability_id VCID-4xqt-vrk6-dyfr
summary Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47615.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47615.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47615
reference_id
reference_type
scores
0
value 0.00084
scoring_system epss
scoring_elements 0.24353
published_at 2026-04-21T12:55:00Z
1
value 0.00084
scoring_system epss
scoring_elements 0.24418
published_at 2026-04-08T12:55:00Z
2
value 0.00084
scoring_system epss
scoring_elements 0.24463
published_at 2026-04-09T12:55:00Z
3
value 0.00084
scoring_system epss
scoring_elements 0.24478
published_at 2026-04-11T12:55:00Z
4
value 0.00084
scoring_system epss
scoring_elements 0.24434
published_at 2026-04-12T12:55:00Z
5
value 0.00084
scoring_system epss
scoring_elements 0.24377
published_at 2026-04-13T12:55:00Z
6
value 0.00084
scoring_system epss
scoring_elements 0.24392
published_at 2026-04-16T12:55:00Z
7
value 0.00084
scoring_system epss
scoring_elements 0.24383
published_at 2026-04-18T12:55:00Z
8
value 0.00084
scoring_system epss
scoring_elements 0.24535
published_at 2026-04-02T12:55:00Z
9
value 0.00084
scoring_system epss
scoring_elements 0.24571
published_at 2026-04-04T12:55:00Z
10
value 0.00084
scoring_system epss
scoring_elements 0.2435
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47615
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47615
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2331740
reference_id 2331740
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2331740
5
reference_url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8038.patch
reference_id 8038.patch
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:18:36Z/
url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8038.patch
6
reference_url https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/
reference_id GHSL-2024-115_GHSL-2024-118_Gstreamer
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:18:36Z/
url https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/
7
reference_url https://security.gentoo.org/glsa/202506-02
reference_id GLSA-202506-02
reference_type
scores
url https://security.gentoo.org/glsa/202506-02
8
reference_url https://access.redhat.com/errata/RHSA-2024:11117
reference_id RHSA-2024:11117
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11117
9
reference_url https://access.redhat.com/errata/RHSA-2024:11118
reference_id RHSA-2024:11118
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11118
10
reference_url https://access.redhat.com/errata/RHSA-2024:11120
reference_id RHSA-2024:11120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11120
11
reference_url https://access.redhat.com/errata/RHSA-2024:11123
reference_id RHSA-2024:11123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11123
12
reference_url https://access.redhat.com/errata/RHSA-2024:11130
reference_id RHSA-2024:11130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11130
13
reference_url https://access.redhat.com/errata/RHSA-2024:11141
reference_id RHSA-2024:11141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11141
14
reference_url https://access.redhat.com/errata/RHSA-2024:11142
reference_id RHSA-2024:11142
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11142
15
reference_url https://access.redhat.com/errata/RHSA-2024:11143
reference_id RHSA-2024:11143
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11143
16
reference_url https://access.redhat.com/errata/RHSA-2024:11344
reference_id RHSA-2024:11344
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11344
17
reference_url https://access.redhat.com/errata/RHSA-2024:11345
reference_id RHSA-2024:11345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11345
18
reference_url https://gstreamer.freedesktop.org/security/sa-2024-0026.html
reference_id sa-2024-0026.html
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:18:36Z/
url https://gstreamer.freedesktop.org/security/sa-2024-0026.html
19
reference_url https://usn.ubuntu.com/7175-1/
reference_id USN-7175-1
reference_type
scores
url https://usn.ubuntu.com/7175-1/
20
reference_url https://usn.ubuntu.com/7807-1/
reference_id USN-7807-1
reference_type
scores
url https://usn.ubuntu.com/7807-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
purl pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5
aliases CVE-2024-47615
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4xqt-vrk6-dyfr
3
url VCID-64mw-yyjq-mqgp
vulnerability_id VCID-64mw-yyjq-mqgp
summary Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47542.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47542.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47542
reference_id
reference_type
scores
0
value 0.00078
scoring_system epss
scoring_elements 0.23268
published_at 2026-04-04T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.23224
published_at 2026-04-02T12:55:00Z
2
value 0.00133
scoring_system epss
scoring_elements 0.32873
published_at 2026-04-09T12:55:00Z
3
value 0.00133
scoring_system epss
scoring_elements 0.32829
published_at 2026-04-18T12:55:00Z
4
value 0.00133
scoring_system epss
scoring_elements 0.32852
published_at 2026-04-16T12:55:00Z
5
value 0.00133
scoring_system epss
scoring_elements 0.3281
published_at 2026-04-13T12:55:00Z
6
value 0.00133
scoring_system epss
scoring_elements 0.32874
published_at 2026-04-11T12:55:00Z
7
value 0.00133
scoring_system epss
scoring_elements 0.32793
published_at 2026-04-21T12:55:00Z
8
value 0.00133
scoring_system epss
scoring_elements 0.32835
published_at 2026-04-12T12:55:00Z
9
value 0.00133
scoring_system epss
scoring_elements 0.32796
published_at 2026-04-07T12:55:00Z
10
value 0.00133
scoring_system epss
scoring_elements 0.32844
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47542
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47542
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47542
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2331717
reference_id 2331717
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2331717
5
reference_url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8033.patch
reference_id 8033.patch
reference_type
scores
0
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:30:59Z/
url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8033.patch
6
reference_url https://securitylab.github.com/advisories/GHSL-2024-235_Gstreamer/
reference_id GHSL-2024-235_Gstreamer
reference_type
scores
0
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:30:59Z/
url https://securitylab.github.com/advisories/GHSL-2024-235_Gstreamer/
7
reference_url https://security.gentoo.org/glsa/202506-02
reference_id GLSA-202506-02
reference_type
scores
url https://security.gentoo.org/glsa/202506-02
8
reference_url https://access.redhat.com/errata/RHSA-2025:7243
reference_id RHSA-2025:7243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7243
9
reference_url https://gstreamer.freedesktop.org/security/sa-2024-0008.html
reference_id sa-2024-0008.html
reference_type
scores
0
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:30:59Z/
url https://gstreamer.freedesktop.org/security/sa-2024-0008.html
10
reference_url https://usn.ubuntu.com/7175-1/
reference_id USN-7175-1
reference_type
scores
url https://usn.ubuntu.com/7175-1/
11
reference_url https://usn.ubuntu.com/7807-1/
reference_id USN-7807-1
reference_type
scores
url https://usn.ubuntu.com/7807-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
purl pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5
aliases CVE-2024-47542
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-64mw-yyjq-mqgp
4
url VCID-9wre-pzu1-y3a7
vulnerability_id VCID-9wre-pzu1-y3a7
summary Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47607.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47607.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47607
reference_id
reference_type
scores
0
value 0.00103
scoring_system epss
scoring_elements 0.28137
published_at 2026-04-21T12:55:00Z
1
value 0.00103
scoring_system epss
scoring_elements 0.2824
published_at 2026-04-08T12:55:00Z
2
value 0.00103
scoring_system epss
scoring_elements 0.28282
published_at 2026-04-09T12:55:00Z
3
value 0.00103
scoring_system epss
scoring_elements 0.28288
published_at 2026-04-11T12:55:00Z
4
value 0.00103
scoring_system epss
scoring_elements 0.28244
published_at 2026-04-12T12:55:00Z
5
value 0.00103
scoring_system epss
scoring_elements 0.28186
published_at 2026-04-13T12:55:00Z
6
value 0.00103
scoring_system epss
scoring_elements 0.28199
published_at 2026-04-16T12:55:00Z
7
value 0.00103
scoring_system epss
scoring_elements 0.28182
published_at 2026-04-18T12:55:00Z
8
value 0.00103
scoring_system epss
scoring_elements 0.28341
published_at 2026-04-02T12:55:00Z
9
value 0.00103
scoring_system epss
scoring_elements 0.28384
published_at 2026-04-04T12:55:00Z
10
value 0.00103
scoring_system epss
scoring_elements 0.28175
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47607
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47607
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2331754
reference_id 2331754
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2331754
5
reference_url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8037.patch
reference_id 8037.patch
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:22:43Z/
url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8037.patch
6
reference_url https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/
reference_id GHSL-2024-115_GHSL-2024-118_Gstreamer
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:22:43Z/
url https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/
7
reference_url https://security.gentoo.org/glsa/202506-02
reference_id GLSA-202506-02
reference_type
scores
url https://security.gentoo.org/glsa/202506-02
8
reference_url https://access.redhat.com/errata/RHSA-2024:11117
reference_id RHSA-2024:11117
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11117
9
reference_url https://access.redhat.com/errata/RHSA-2024:11118
reference_id RHSA-2024:11118
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11118
10
reference_url https://access.redhat.com/errata/RHSA-2024:11120
reference_id RHSA-2024:11120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11120
11
reference_url https://access.redhat.com/errata/RHSA-2024:11123
reference_id RHSA-2024:11123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11123
12
reference_url https://access.redhat.com/errata/RHSA-2024:11130
reference_id RHSA-2024:11130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11130
13
reference_url https://access.redhat.com/errata/RHSA-2024:11141
reference_id RHSA-2024:11141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11141
14
reference_url https://access.redhat.com/errata/RHSA-2024:11142
reference_id RHSA-2024:11142
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11142
15
reference_url https://access.redhat.com/errata/RHSA-2024:11143
reference_id RHSA-2024:11143
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11143
16
reference_url https://access.redhat.com/errata/RHSA-2024:11344
reference_id RHSA-2024:11344
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11344
17
reference_url https://access.redhat.com/errata/RHSA-2024:11345
reference_id RHSA-2024:11345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11345
18
reference_url https://gstreamer.freedesktop.org/security/sa-2024-0024.html
reference_id sa-2024-0024.html
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:22:43Z/
url https://gstreamer.freedesktop.org/security/sa-2024-0024.html
19
reference_url https://usn.ubuntu.com/7175-1/
reference_id USN-7175-1
reference_type
scores
url https://usn.ubuntu.com/7175-1/
20
reference_url https://usn.ubuntu.com/7807-1/
reference_id USN-7807-1
reference_type
scores
url https://usn.ubuntu.com/7807-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
purl pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5
aliases CVE-2024-47607
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9wre-pzu1-y3a7
5
url VCID-a2rd-ntzd-2kdr
vulnerability_id VCID-a2rd-ntzd-2kdr
summary GStreamer: GStreamer: Arbitrary code execution via RIFF palette integer overflow in AVI file handling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2921.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2921.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2921
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09324
published_at 2026-04-02T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09285
published_at 2026-04-07T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09374
published_at 2026-04-04T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09361
published_at 2026-04-08T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09408
published_at 2026-04-09T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.0942
published_at 2026-04-11T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09391
published_at 2026-04-12T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09377
published_at 2026-04-13T12:55:00Z
8
value 0.00035
scoring_system epss
scoring_elements 0.10333
published_at 2026-04-16T12:55:00Z
9
value 0.00035
scoring_system epss
scoring_elements 0.10437
published_at 2026-04-21T12:55:00Z
10
value 0.00035
scoring_system epss
scoring_elements 0.10307
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2921
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2921
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2447496
reference_id 2447496
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2447496
5
reference_url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/e3a99c35266fc92dd6a18ac5fde028d0cda559e6
reference_id e3a99c35266fc92dd6a18ac5fde028d0cda559e6
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-16T15:26:01Z/
url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/e3a99c35266fc92dd6a18ac5fde028d0cda559e6
6
reference_url https://access.redhat.com/errata/RHSA-2026:6259
reference_id RHSA-2026:6259
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6259
7
reference_url https://access.redhat.com/errata/RHSA-2026:6300
reference_id RHSA-2026:6300
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6300
8
reference_url https://access.redhat.com/errata/RHSA-2026:6750
reference_id RHSA-2026:6750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6750
9
reference_url https://access.redhat.com/errata/RHSA-2026:7673
reference_id RHSA-2026:7673
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7673
10
reference_url https://access.redhat.com/errata/RHSA-2026:7850
reference_id RHSA-2026:7850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7850
11
reference_url https://access.redhat.com/errata/RHSA-2026:8854
reference_id RHSA-2026:8854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8854
12
reference_url https://access.redhat.com/errata/RHSA-2026:8857
reference_id RHSA-2026:8857
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8857
13
reference_url https://access.redhat.com/errata/RHSA-2026:8862
reference_id RHSA-2026:8862
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8862
14
reference_url https://access.redhat.com/errata/RHSA-2026:8874
reference_id RHSA-2026:8874
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8874
15
reference_url https://access.redhat.com/errata/RHSA-2026:8876
reference_id RHSA-2026:8876
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8876
16
reference_url https://usn.ubuntu.com/8130-1/
reference_id USN-8130-1
reference_type
scores
url https://usn.ubuntu.com/8130-1/
17
reference_url https://www.zerodayinitiative.com/advisories/ZDI-26-168/
reference_id ZDI-26-168
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-16T15:26:01Z/
url https://www.zerodayinitiative.com/advisories/ZDI-26-168/
fixed_packages
0
url pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
purl pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5
aliases CVE-2026-2921
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a2rd-ntzd-2kdr
6
url VCID-b22v-3x5y-kbbx
vulnerability_id VCID-b22v-3x5y-kbbx
summary Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47600.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47600.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47600
reference_id
reference_type
scores
0
value 0.00102
scoring_system epss
scoring_elements 0.28156
published_at 2026-04-04T12:55:00Z
1
value 0.00102
scoring_system epss
scoring_elements 0.28113
published_at 2026-04-02T12:55:00Z
2
value 0.00174
scoring_system epss
scoring_elements 0.38853
published_at 2026-04-09T12:55:00Z
3
value 0.00174
scoring_system epss
scoring_elements 0.38826
published_at 2026-04-18T12:55:00Z
4
value 0.00174
scoring_system epss
scoring_elements 0.38848
published_at 2026-04-16T12:55:00Z
5
value 0.00174
scoring_system epss
scoring_elements 0.38802
published_at 2026-04-13T12:55:00Z
6
value 0.00174
scoring_system epss
scoring_elements 0.38866
published_at 2026-04-11T12:55:00Z
7
value 0.00174
scoring_system epss
scoring_elements 0.38746
published_at 2026-04-21T12:55:00Z
8
value 0.00174
scoring_system epss
scoring_elements 0.38829
published_at 2026-04-12T12:55:00Z
9
value 0.00174
scoring_system epss
scoring_elements 0.3879
published_at 2026-04-07T12:55:00Z
10
value 0.00174
scoring_system epss
scoring_elements 0.38842
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47600
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47600
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2331738
reference_id 2331738
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2331738
5
reference_url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8034.patch
reference_id 8034.patch
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:27:40Z/
url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8034.patch
6
reference_url https://securitylab.github.com/advisories/GHSL-2024-248_Gstreamer/
reference_id GHSL-2024-248_Gstreamer
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:27:40Z/
url https://securitylab.github.com/advisories/GHSL-2024-248_Gstreamer/
7
reference_url https://security.gentoo.org/glsa/202506-02
reference_id GLSA-202506-02
reference_type
scores
url https://security.gentoo.org/glsa/202506-02
8
reference_url https://access.redhat.com/errata/RHSA-2025:7243
reference_id RHSA-2025:7243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7243
9
reference_url https://gstreamer.freedesktop.org/security/sa-2024-0018.html
reference_id sa-2024-0018.html
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:27:40Z/
url https://gstreamer.freedesktop.org/security/sa-2024-0018.html
10
reference_url https://usn.ubuntu.com/7175-1/
reference_id USN-7175-1
reference_type
scores
url https://usn.ubuntu.com/7175-1/
11
reference_url https://usn.ubuntu.com/7807-1/
reference_id USN-7807-1
reference_type
scores
url https://usn.ubuntu.com/7807-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
purl pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5
aliases CVE-2024-47600
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b22v-3x5y-kbbx
7
url VCID-bd83-n2qx-gqeh
vulnerability_id VCID-bd83-n2qx-gqeh
summary gstreamer1-plugins-base: GStreamer Subparse NULL Pointer Dereference
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47807.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47807.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-47807
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07055
published_at 2026-04-02T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.07344
published_at 2026-04-21T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.07168
published_at 2026-04-11T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07301
published_at 2026-04-12T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.07292
published_at 2026-04-13T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.07223
published_at 2026-04-16T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.07218
published_at 2026-04-18T12:55:00Z
7
value 0.00026
scoring_system epss
scoring_elements 0.07111
published_at 2026-04-04T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.07086
published_at 2026-04-07T12:55:00Z
9
value 0.00026
scoring_system epss
scoring_elements 0.07139
published_at 2026-04-08T12:55:00Z
10
value 0.00026
scoring_system epss
scoring_elements 0.07171
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-47807
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47807
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2387143
reference_id 2387143
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2387143
5
reference_url https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md
reference_id ATREDIS-2025-0003.md
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-12T13:52:51Z/
url https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md
6
reference_url https://gstreamer.freedesktop.org/security/
reference_id security
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-12T13:52:51Z/
url https://gstreamer.freedesktop.org/security/
7
reference_url https://usn.ubuntu.com/7716-1/
reference_id USN-7716-1
reference_type
scores
url https://usn.ubuntu.com/7716-1/
8
reference_url https://usn.ubuntu.com/7827-1/
reference_id USN-7827-1
reference_type
scores
url https://usn.ubuntu.com/7827-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
purl pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5
aliases CVE-2025-47807
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bd83-n2qx-gqeh
8
url VCID-gw57-rwva-r7fb
vulnerability_id VCID-gw57-rwva-r7fb
summary Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47541.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47541.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47541
reference_id
reference_type
scores
0
value 0.00088
scoring_system epss
scoring_elements 0.25385
published_at 2026-04-04T12:55:00Z
1
value 0.00088
scoring_system epss
scoring_elements 0.25345
published_at 2026-04-02T12:55:00Z
2
value 0.00151
scoring_system epss
scoring_elements 0.3581
published_at 2026-04-09T12:55:00Z
3
value 0.00151
scoring_system epss
scoring_elements 0.35785
published_at 2026-04-18T12:55:00Z
4
value 0.00151
scoring_system epss
scoring_elements 0.35797
published_at 2026-04-16T12:55:00Z
5
value 0.00151
scoring_system epss
scoring_elements 0.35756
published_at 2026-04-13T12:55:00Z
6
value 0.00151
scoring_system epss
scoring_elements 0.35819
published_at 2026-04-11T12:55:00Z
7
value 0.00151
scoring_system epss
scoring_elements 0.35737
published_at 2026-04-21T12:55:00Z
8
value 0.00151
scoring_system epss
scoring_elements 0.35779
published_at 2026-04-12T12:55:00Z
9
value 0.00151
scoring_system epss
scoring_elements 0.35738
published_at 2026-04-07T12:55:00Z
10
value 0.00151
scoring_system epss
scoring_elements 0.35788
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47541
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47541
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2331724
reference_id 2331724
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2331724
5
reference_url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8036.patch
reference_id 8036.patch
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:33:06Z/
url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8036.patch
6
reference_url https://securitylab.github.com/advisories/GHSL-2024-228_GStreamer/
reference_id GHSL-2024-228_GStreamer
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:33:06Z/
url https://securitylab.github.com/advisories/GHSL-2024-228_GStreamer/
7
reference_url https://security.gentoo.org/glsa/202506-02
reference_id GLSA-202506-02
reference_type
scores
url https://security.gentoo.org/glsa/202506-02
8
reference_url https://access.redhat.com/errata/RHSA-2025:7243
reference_id RHSA-2025:7243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7243
9
reference_url https://gstreamer.freedesktop.org/security/sa-2024-0023.html
reference_id sa-2024-0023.html
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:33:06Z/
url https://gstreamer.freedesktop.org/security/sa-2024-0023.html
10
reference_url https://usn.ubuntu.com/7175-1/
reference_id USN-7175-1
reference_type
scores
url https://usn.ubuntu.com/7175-1/
11
reference_url https://usn.ubuntu.com/7807-1/
reference_id USN-7807-1
reference_type
scores
url https://usn.ubuntu.com/7807-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
purl pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5
aliases CVE-2024-47541
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gw57-rwva-r7fb
9
url VCID-j8pf-ztyq-1ufd
vulnerability_id VCID-j8pf-ztyq-1ufd
summary Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47538.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47538.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47538
reference_id
reference_type
scores
0
value 0.00103
scoring_system epss
scoring_elements 0.28137
published_at 2026-04-21T12:55:00Z
1
value 0.00103
scoring_system epss
scoring_elements 0.2824
published_at 2026-04-08T12:55:00Z
2
value 0.00103
scoring_system epss
scoring_elements 0.28282
published_at 2026-04-09T12:55:00Z
3
value 0.00103
scoring_system epss
scoring_elements 0.28288
published_at 2026-04-11T12:55:00Z
4
value 0.00103
scoring_system epss
scoring_elements 0.28244
published_at 2026-04-12T12:55:00Z
5
value 0.00103
scoring_system epss
scoring_elements 0.28186
published_at 2026-04-13T12:55:00Z
6
value 0.00103
scoring_system epss
scoring_elements 0.28199
published_at 2026-04-16T12:55:00Z
7
value 0.00103
scoring_system epss
scoring_elements 0.28182
published_at 2026-04-18T12:55:00Z
8
value 0.00103
scoring_system epss
scoring_elements 0.28341
published_at 2026-04-02T12:55:00Z
9
value 0.00103
scoring_system epss
scoring_elements 0.28384
published_at 2026-04-04T12:55:00Z
10
value 0.00103
scoring_system epss
scoring_elements 0.28175
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47538
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47538
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2331727
reference_id 2331727
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2331727
5
reference_url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8035.patch
reference_id 8035.patch
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:36:36Z/
url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8035.patch
6
reference_url https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/
reference_id GHSL-2024-115_GHSL-2024-118_Gstreamer
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:36:36Z/
url https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/
7
reference_url https://security.gentoo.org/glsa/202506-02
reference_id GLSA-202506-02
reference_type
scores
url https://security.gentoo.org/glsa/202506-02
8
reference_url https://access.redhat.com/errata/RHSA-2024:11117
reference_id RHSA-2024:11117
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11117
9
reference_url https://access.redhat.com/errata/RHSA-2024:11118
reference_id RHSA-2024:11118
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11118
10
reference_url https://access.redhat.com/errata/RHSA-2024:11120
reference_id RHSA-2024:11120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11120
11
reference_url https://access.redhat.com/errata/RHSA-2024:11123
reference_id RHSA-2024:11123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11123
12
reference_url https://access.redhat.com/errata/RHSA-2024:11130
reference_id RHSA-2024:11130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11130
13
reference_url https://access.redhat.com/errata/RHSA-2024:11141
reference_id RHSA-2024:11141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11141
14
reference_url https://access.redhat.com/errata/RHSA-2024:11142
reference_id RHSA-2024:11142
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11142
15
reference_url https://access.redhat.com/errata/RHSA-2024:11143
reference_id RHSA-2024:11143
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11143
16
reference_url https://access.redhat.com/errata/RHSA-2024:11344
reference_id RHSA-2024:11344
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11344
17
reference_url https://access.redhat.com/errata/RHSA-2024:11345
reference_id RHSA-2024:11345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11345
18
reference_url https://gstreamer.freedesktop.org/security/sa-2024-0022.html
reference_id sa-2024-0022.html
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:36:36Z/
url https://gstreamer.freedesktop.org/security/sa-2024-0022.html
19
reference_url https://usn.ubuntu.com/7175-1/
reference_id USN-7175-1
reference_type
scores
url https://usn.ubuntu.com/7175-1/
20
reference_url https://usn.ubuntu.com/7807-1/
reference_id USN-7807-1
reference_type
scores
url https://usn.ubuntu.com/7807-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
purl pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5
aliases CVE-2024-47538
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j8pf-ztyq-1ufd
10
url VCID-jkag-wv9p-5yhm
vulnerability_id VCID-jkag-wv9p-5yhm
summary Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47835.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47835.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47835
reference_id
reference_type
scores
0
value 0.00079
scoring_system epss
scoring_elements 0.23389
published_at 2026-04-21T12:55:00Z
1
value 0.00079
scoring_system epss
scoring_elements 0.2342
published_at 2026-04-08T12:55:00Z
2
value 0.00079
scoring_system epss
scoring_elements 0.2347
published_at 2026-04-09T12:55:00Z
3
value 0.00079
scoring_system epss
scoring_elements 0.23488
published_at 2026-04-11T12:55:00Z
4
value 0.00079
scoring_system epss
scoring_elements 0.2345
published_at 2026-04-12T12:55:00Z
5
value 0.00079
scoring_system epss
scoring_elements 0.23395
published_at 2026-04-13T12:55:00Z
6
value 0.00079
scoring_system epss
scoring_elements 0.23412
published_at 2026-04-16T12:55:00Z
7
value 0.00079
scoring_system epss
scoring_elements 0.23407
published_at 2026-04-18T12:55:00Z
8
value 0.00079
scoring_system epss
scoring_elements 0.23528
published_at 2026-04-02T12:55:00Z
9
value 0.00079
scoring_system epss
scoring_elements 0.23565
published_at 2026-04-04T12:55:00Z
10
value 0.00079
scoring_system epss
scoring_elements 0.23347
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47835
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47835
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2331742
reference_id 2331742
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2331742
5
reference_url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8039.patch
reference_id 8039.patch
reference_type
scores
0
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:14:03Z/
url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8039.patch
6
reference_url https://securitylab.github.com/advisories/GHSL-2024-263_Gstreamer/
reference_id GHSL-2024-263_Gstreamer
reference_type
scores
0
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:14:03Z/
url https://securitylab.github.com/advisories/GHSL-2024-263_Gstreamer/
7
reference_url https://security.gentoo.org/glsa/202506-02
reference_id GLSA-202506-02
reference_type
scores
url https://security.gentoo.org/glsa/202506-02
8
reference_url https://access.redhat.com/errata/RHSA-2025:7243
reference_id RHSA-2025:7243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7243
9
reference_url https://gstreamer.freedesktop.org/security/sa-2024-0029.html
reference_id sa-2024-0029.html
reference_type
scores
0
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:14:03Z/
url https://gstreamer.freedesktop.org/security/sa-2024-0029.html
10
reference_url https://usn.ubuntu.com/7175-1/
reference_id USN-7175-1
reference_type
scores
url https://usn.ubuntu.com/7175-1/
11
reference_url https://usn.ubuntu.com/7807-1/
reference_id USN-7807-1
reference_type
scores
url https://usn.ubuntu.com/7807-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
purl pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5
aliases CVE-2024-47835
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jkag-wv9p-5yhm
11
url VCID-k198-ngub-ayfx
vulnerability_id VCID-k198-ngub-ayfx
summary gstreamer1-plugins-base: GStreamer Subparse Stack Buffer Overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47806.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47806.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-47806
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22633
published_at 2026-04-02T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22466
published_at 2026-04-07T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22676
published_at 2026-04-04T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22548
published_at 2026-04-08T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22602
published_at 2026-04-09T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.22618
published_at 2026-04-11T12:55:00Z
6
value 0.00081
scoring_system epss
scoring_elements 0.23919
published_at 2026-04-12T12:55:00Z
7
value 0.00081
scoring_system epss
scoring_elements 0.23865
published_at 2026-04-18T12:55:00Z
8
value 0.00081
scoring_system epss
scoring_elements 0.23876
published_at 2026-04-16T12:55:00Z
9
value 0.00081
scoring_system epss
scoring_elements 0.23846
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-47806
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47806
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2387145
reference_id 2387145
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2387145
5
reference_url https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md
reference_id ATREDIS-2025-0003.md
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-08T15:45:02Z/
url https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md
6
reference_url https://gstreamer.freedesktop.org/security/
reference_id security
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-08T15:45:02Z/
url https://gstreamer.freedesktop.org/security/
7
reference_url https://usn.ubuntu.com/7716-1/
reference_id USN-7716-1
reference_type
scores
url https://usn.ubuntu.com/7716-1/
8
reference_url https://usn.ubuntu.com/7827-1/
reference_id USN-7827-1
reference_type
scores
url https://usn.ubuntu.com/7827-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
purl pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5
aliases CVE-2025-47806
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k198-ngub-ayfx
12
url VCID-rkb1-hqh5-uqcy
vulnerability_id VCID-rkb1-hqh5-uqcy
summary gstreamer-plugins-base: heap overwrite in subtitle parsing
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37328.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37328.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-37328
reference_id
reference_type
scores
0
value 0.07706
scoring_system epss
scoring_elements 0.91889
published_at 2026-04-02T12:55:00Z
1
value 0.07706
scoring_system epss
scoring_elements 0.91934
published_at 2026-04-21T12:55:00Z
2
value 0.07706
scoring_system epss
scoring_elements 0.91925
published_at 2026-04-11T12:55:00Z
3
value 0.07706
scoring_system epss
scoring_elements 0.91924
published_at 2026-04-12T12:55:00Z
4
value 0.07706
scoring_system epss
scoring_elements 0.91921
published_at 2026-04-13T12:55:00Z
5
value 0.07706
scoring_system epss
scoring_elements 0.9194
published_at 2026-04-16T12:55:00Z
6
value 0.07706
scoring_system epss
scoring_elements 0.91937
published_at 2026-04-18T12:55:00Z
7
value 0.07706
scoring_system epss
scoring_elements 0.91897
published_at 2026-04-04T12:55:00Z
8
value 0.07706
scoring_system epss
scoring_elements 0.91904
published_at 2026-04-07T12:55:00Z
9
value 0.07706
scoring_system epss
scoring_elements 0.91917
published_at 2026-04-08T12:55:00Z
10
value 0.07706
scoring_system epss
scoring_elements 0.91922
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-37328
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37328
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37328
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2254540
reference_id 2254540
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2254540
5
reference_url https://access.redhat.com/errata/RHSA-2024:2302
reference_id RHSA-2024:2302
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2302
6
reference_url https://access.redhat.com/errata/RHSA-2024:3088
reference_id RHSA-2024:3088
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3088
7
reference_url https://gstreamer.freedesktop.org/security/sa-2023-0003.html
reference_id sa-2023-0003.html
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-06T18:26:04Z/
url https://gstreamer.freedesktop.org/security/sa-2023-0003.html
8
reference_url https://usn.ubuntu.com/6268-1/
reference_id USN-6268-1
reference_type
scores
url https://usn.ubuntu.com/6268-1/
9
reference_url https://usn.ubuntu.com/7807-1/
reference_id USN-7807-1
reference_type
scores
url https://usn.ubuntu.com/7807-1/
10
reference_url https://www.zerodayinitiative.com/advisories/ZDI-23-901/
reference_id ZDI-23-901
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-06T18:26:04Z/
url https://www.zerodayinitiative.com/advisories/ZDI-23-901/
fixed_packages
0
url pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%2Bdeb11u2
purl pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%2Bdeb11u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4xqt-vrk6-dyfr
1
vulnerability VCID-64mw-yyjq-mqgp
2
vulnerability VCID-9wre-pzu1-y3a7
3
vulnerability VCID-a2rd-ntzd-2kdr
4
vulnerability VCID-b22v-3x5y-kbbx
5
vulnerability VCID-bd83-n2qx-gqeh
6
vulnerability VCID-gw57-rwva-r7fb
7
vulnerability VCID-j8pf-ztyq-1ufd
8
vulnerability VCID-jkag-wv9p-5yhm
9
vulnerability VCID-k198-ngub-ayfx
10
vulnerability VCID-ye91-ftez-j7bb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%252Bdeb11u2
aliases CVE-2023-37328
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rkb1-hqh5-uqcy
13
url VCID-ye91-ftez-j7bb
vulnerability_id VCID-ye91-ftez-j7bb
summary gstreamer1-plugins-base: GStreamer Subparse NULL Pointer Dereference
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47808.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47808.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-47808
reference_id
reference_type
scores
0
value 0.00089
scoring_system epss
scoring_elements 0.2548
published_at 2026-04-02T12:55:00Z
1
value 0.00089
scoring_system epss
scoring_elements 0.25288
published_at 2026-04-07T12:55:00Z
2
value 0.00089
scoring_system epss
scoring_elements 0.25517
published_at 2026-04-04T12:55:00Z
3
value 0.00089
scoring_system epss
scoring_elements 0.25355
published_at 2026-04-08T12:55:00Z
4
value 0.00089
scoring_system epss
scoring_elements 0.254
published_at 2026-04-09T12:55:00Z
5
value 0.00089
scoring_system epss
scoring_elements 0.25412
published_at 2026-04-11T12:55:00Z
6
value 0.00097
scoring_system epss
scoring_elements 0.26713
published_at 2026-04-13T12:55:00Z
7
value 0.00097
scoring_system epss
scoring_elements 0.26721
published_at 2026-04-16T12:55:00Z
8
value 0.00097
scoring_system epss
scoring_elements 0.26692
published_at 2026-04-18T12:55:00Z
9
value 0.00097
scoring_system epss
scoring_elements 0.26657
published_at 2026-04-21T12:55:00Z
10
value 0.00097
scoring_system epss
scoring_elements 0.2677
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-47808
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47808
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2387146
reference_id 2387146
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2387146
5
reference_url https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md
reference_id ATREDIS-2025-0003.md
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-07T19:49:18Z/
url https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md
6
reference_url https://gstreamer.freedesktop.org/security/
reference_id security
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-07T19:49:18Z/
url https://gstreamer.freedesktop.org/security/
7
reference_url https://usn.ubuntu.com/7716-1/
reference_id USN-7716-1
reference_type
scores
url https://usn.ubuntu.com/7716-1/
8
reference_url https://usn.ubuntu.com/7827-1/
reference_id USN-7827-1
reference_type
scores
url https://usn.ubuntu.com/7827-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
purl pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5
aliases CVE-2025-47808
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ye91-ftez-j7bb
14
url VCID-ygdq-ef5t-e7bc
vulnerability_id VCID-ygdq-ef5t-e7bc
summary gstreamer: EXIF Metadata Parsing Integer Overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4453.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4453.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-4453
reference_id
reference_type
scores
0
value 0.03337
scoring_system epss
scoring_elements 0.87309
published_at 2026-04-21T12:55:00Z
1
value 0.03337
scoring_system epss
scoring_elements 0.87285
published_at 2026-04-08T12:55:00Z
2
value 0.03337
scoring_system epss
scoring_elements 0.87293
published_at 2026-04-09T12:55:00Z
3
value 0.03337
scoring_system epss
scoring_elements 0.87306
published_at 2026-04-11T12:55:00Z
4
value 0.03337
scoring_system epss
scoring_elements 0.873
published_at 2026-04-12T12:55:00Z
5
value 0.03337
scoring_system epss
scoring_elements 0.87296
published_at 2026-04-13T12:55:00Z
6
value 0.03337
scoring_system epss
scoring_elements 0.87311
published_at 2026-04-16T12:55:00Z
7
value 0.03337
scoring_system epss
scoring_elements 0.87315
published_at 2026-04-18T12:55:00Z
8
value 0.03337
scoring_system epss
scoring_elements 0.87252
published_at 2026-04-02T12:55:00Z
9
value 0.03337
scoring_system epss
scoring_elements 0.87268
published_at 2026-04-04T12:55:00Z
10
value 0.03337
scoring_system epss
scoring_elements 0.87265
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-4453
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4453
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2282999
reference_id 2282999
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2282999
5
reference_url https://gitlab.freedesktop.org/tpm/gstreamer/-/commit/e68eccff103ab0e91e6d77a892f57131b33902f5
reference_id e68eccff103ab0e91e6d77a892f57131b33902f5
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-23T15:47:50Z/
url https://gitlab.freedesktop.org/tpm/gstreamer/-/commit/e68eccff103ab0e91e6d77a892f57131b33902f5
6
reference_url https://lists.debian.org/debian-lts-announce/2024/05/msg00019.html
reference_id msg00019.html
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-23T15:47:50Z/
url https://lists.debian.org/debian-lts-announce/2024/05/msg00019.html
7
reference_url https://access.redhat.com/errata/RHSA-2024:9056
reference_id RHSA-2024:9056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9056
8
reference_url https://access.redhat.com/errata/RHSA-2025:18416
reference_id RHSA-2025:18416
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18416
9
reference_url https://access.redhat.com/errata/RHSA-2025:7178
reference_id RHSA-2025:7178
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7178
10
reference_url https://usn.ubuntu.com/6798-1/
reference_id USN-6798-1
reference_type
scores
url https://usn.ubuntu.com/6798-1/
11
reference_url https://usn.ubuntu.com/7807-1/
reference_id USN-7807-1
reference_type
scores
url https://usn.ubuntu.com/7807-1/
12
reference_url https://www.zerodayinitiative.com/advisories/ZDI-24-467/
reference_id ZDI-24-467
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-23T15:47:50Z/
url https://www.zerodayinitiative.com/advisories/ZDI-24-467/
fixed_packages
0
url pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%2Bdeb11u2
purl pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%2Bdeb11u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4xqt-vrk6-dyfr
1
vulnerability VCID-64mw-yyjq-mqgp
2
vulnerability VCID-9wre-pzu1-y3a7
3
vulnerability VCID-a2rd-ntzd-2kdr
4
vulnerability VCID-b22v-3x5y-kbbx
5
vulnerability VCID-bd83-n2qx-gqeh
6
vulnerability VCID-gw57-rwva-r7fb
7
vulnerability VCID-j8pf-ztyq-1ufd
8
vulnerability VCID-jkag-wv9p-5yhm
9
vulnerability VCID-k198-ngub-ayfx
10
vulnerability VCID-ye91-ftez-j7bb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%252Bdeb11u2
aliases CVE-2024-4453
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ygdq-ef5t-e7bc
Fixing_vulnerabilities
0
url VCID-21tf-t9ww-ufg5
vulnerability_id VCID-21tf-t9ww-ufg5
summary
A heap-based buffer overflow in GStreamer Base Plugins might allow
    remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9928.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9928.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9928
reference_id
reference_type
scores
0
value 0.17337
scoring_system epss
scoring_elements 0.95015
published_at 2026-04-01T12:55:00Z
1
value 0.17337
scoring_system epss
scoring_elements 0.95026
published_at 2026-04-02T12:55:00Z
2
value 0.17337
scoring_system epss
scoring_elements 0.95027
published_at 2026-04-04T12:55:00Z
3
value 0.17337
scoring_system epss
scoring_elements 0.95029
published_at 2026-04-07T12:55:00Z
4
value 0.17337
scoring_system epss
scoring_elements 0.95037
published_at 2026-04-08T12:55:00Z
5
value 0.17337
scoring_system epss
scoring_elements 0.95041
published_at 2026-04-09T12:55:00Z
6
value 0.17337
scoring_system epss
scoring_elements 0.95047
published_at 2026-04-11T12:55:00Z
7
value 0.17337
scoring_system epss
scoring_elements 0.95048
published_at 2026-04-12T12:55:00Z
8
value 0.17337
scoring_system epss
scoring_elements 0.95051
published_at 2026-04-13T12:55:00Z
9
value 0.17337
scoring_system epss
scoring_elements 0.9506
published_at 2026-04-16T12:55:00Z
10
value 0.17337
scoring_system epss
scoring_elements 0.95063
published_at 2026-04-18T12:55:00Z
11
value 0.17337
scoring_system epss
scoring_elements 0.95065
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9928
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9928
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1724904
reference_id 1724904
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1724904
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927978
reference_id 927978
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927978
6
reference_url https://security.gentoo.org/glsa/202003-33
reference_id GLSA-202003-33
reference_type
scores
url https://security.gentoo.org/glsa/202003-33
7
reference_url https://usn.ubuntu.com/3958-1/
reference_id USN-3958-1
reference_type
scores
url https://usn.ubuntu.com/3958-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-base1.0@1.10.4-1%2Bdeb9u1
purl pkg:deb/debian/gst-plugins-base1.0@1.10.4-1%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-21tf-t9ww-ufg5
1
vulnerability VCID-32zy-1a2y-nkdz
2
vulnerability VCID-4xqt-vrk6-dyfr
3
vulnerability VCID-64mw-yyjq-mqgp
4
vulnerability VCID-9wre-pzu1-y3a7
5
vulnerability VCID-a2rd-ntzd-2kdr
6
vulnerability VCID-b22v-3x5y-kbbx
7
vulnerability VCID-bd83-n2qx-gqeh
8
vulnerability VCID-gw57-rwva-r7fb
9
vulnerability VCID-j8pf-ztyq-1ufd
10
vulnerability VCID-jkag-wv9p-5yhm
11
vulnerability VCID-k198-ngub-ayfx
12
vulnerability VCID-rkb1-hqh5-uqcy
13
vulnerability VCID-ye91-ftez-j7bb
14
vulnerability VCID-ygdq-ef5t-e7bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.10.4-1%252Bdeb9u1
1
url pkg:deb/debian/gst-plugins-base1.0@1.14.4-2%2Bdeb10u1
purl pkg:deb/debian/gst-plugins-base1.0@1.14.4-2%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-32zy-1a2y-nkdz
1
vulnerability VCID-4xqt-vrk6-dyfr
2
vulnerability VCID-64mw-yyjq-mqgp
3
vulnerability VCID-9wre-pzu1-y3a7
4
vulnerability VCID-a2rd-ntzd-2kdr
5
vulnerability VCID-b22v-3x5y-kbbx
6
vulnerability VCID-bd83-n2qx-gqeh
7
vulnerability VCID-gw57-rwva-r7fb
8
vulnerability VCID-j8pf-ztyq-1ufd
9
vulnerability VCID-jkag-wv9p-5yhm
10
vulnerability VCID-k198-ngub-ayfx
11
vulnerability VCID-rkb1-hqh5-uqcy
12
vulnerability VCID-ye91-ftez-j7bb
13
vulnerability VCID-ygdq-ef5t-e7bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.14.4-2%252Bdeb10u1
aliases CVE-2019-9928
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-21tf-t9ww-ufg5
1
url VCID-22k7-ftg2-w3ee
vulnerability_id VCID-22k7-ftg2-w3ee
summary
Multiple vulnerabilities have been found in various GStreamer
    plug-ins, the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5839.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5839.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5839
reference_id
reference_type
scores
0
value 0.03036
scoring_system epss
scoring_elements 0.86604
published_at 2026-04-01T12:55:00Z
1
value 0.03036
scoring_system epss
scoring_elements 0.86685
published_at 2026-04-18T12:55:00Z
2
value 0.03036
scoring_system epss
scoring_elements 0.86666
published_at 2026-04-13T12:55:00Z
3
value 0.03036
scoring_system epss
scoring_elements 0.86679
published_at 2026-04-21T12:55:00Z
4
value 0.03036
scoring_system epss
scoring_elements 0.86614
published_at 2026-04-02T12:55:00Z
5
value 0.03036
scoring_system epss
scoring_elements 0.86634
published_at 2026-04-04T12:55:00Z
6
value 0.03036
scoring_system epss
scoring_elements 0.86633
published_at 2026-04-07T12:55:00Z
7
value 0.03036
scoring_system epss
scoring_elements 0.86652
published_at 2026-04-08T12:55:00Z
8
value 0.03036
scoring_system epss
scoring_elements 0.86661
published_at 2026-04-09T12:55:00Z
9
value 0.03036
scoring_system epss
scoring_elements 0.86675
published_at 2026-04-11T12:55:00Z
10
value 0.03036
scoring_system epss
scoring_elements 0.86673
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5839
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9811
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5837
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5839
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5842
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5844
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1419586
reference_id 1419586
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1419586
9
reference_url https://security.archlinux.org/ASA-201702-4
reference_id ASA-201702-4
reference_type
scores
url https://security.archlinux.org/ASA-201702-4
10
reference_url https://security.archlinux.org/AVG-164
reference_id AVG-164
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-164
11
reference_url https://security.gentoo.org/glsa/201705-10
reference_id GLSA-201705-10
reference_type
scores
url https://security.gentoo.org/glsa/201705-10
12
reference_url https://access.redhat.com/errata/RHSA-2017:2060
reference_id RHSA-2017:2060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2060
13
reference_url https://usn.ubuntu.com/3244-1/
reference_id USN-3244-1
reference_type
scores
url https://usn.ubuntu.com/3244-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-base1.0@1.4.4-2%2Bdeb8u1
purl pkg:deb/debian/gst-plugins-base1.0@1.4.4-2%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-21tf-t9ww-ufg5
1
vulnerability VCID-22k7-ftg2-w3ee
2
vulnerability VCID-2ykm-esve-s3b9
3
vulnerability VCID-32zy-1a2y-nkdz
4
vulnerability VCID-4xqt-vrk6-dyfr
5
vulnerability VCID-64mw-yyjq-mqgp
6
vulnerability VCID-9wre-pzu1-y3a7
7
vulnerability VCID-a2rd-ntzd-2kdr
8
vulnerability VCID-aay9-3b4y-kbh1
9
vulnerability VCID-b22v-3x5y-kbbx
10
vulnerability VCID-bd83-n2qx-gqeh
11
vulnerability VCID-c9pa-ua87-tbdp
12
vulnerability VCID-gw57-rwva-r7fb
13
vulnerability VCID-j8pf-ztyq-1ufd
14
vulnerability VCID-jkag-wv9p-5yhm
15
vulnerability VCID-k198-ngub-ayfx
16
vulnerability VCID-rkb1-hqh5-uqcy
17
vulnerability VCID-vyzk-txky-muce
18
vulnerability VCID-ye91-ftez-j7bb
19
vulnerability VCID-ygdq-ef5t-e7bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.4.4-2%252Bdeb8u1
1
url pkg:deb/debian/gst-plugins-base1.0@1.10.4-1%2Bdeb9u1
purl pkg:deb/debian/gst-plugins-base1.0@1.10.4-1%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-21tf-t9ww-ufg5
1
vulnerability VCID-32zy-1a2y-nkdz
2
vulnerability VCID-4xqt-vrk6-dyfr
3
vulnerability VCID-64mw-yyjq-mqgp
4
vulnerability VCID-9wre-pzu1-y3a7
5
vulnerability VCID-a2rd-ntzd-2kdr
6
vulnerability VCID-b22v-3x5y-kbbx
7
vulnerability VCID-bd83-n2qx-gqeh
8
vulnerability VCID-gw57-rwva-r7fb
9
vulnerability VCID-j8pf-ztyq-1ufd
10
vulnerability VCID-jkag-wv9p-5yhm
11
vulnerability VCID-k198-ngub-ayfx
12
vulnerability VCID-rkb1-hqh5-uqcy
13
vulnerability VCID-ye91-ftez-j7bb
14
vulnerability VCID-ygdq-ef5t-e7bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.10.4-1%252Bdeb9u1
aliases CVE-2017-5839
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-22k7-ftg2-w3ee
2
url VCID-2ykm-esve-s3b9
vulnerability_id VCID-2ykm-esve-s3b9
summary
Multiple vulnerabilities have been found in various GStreamer
    plug-ins, the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5844.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5844.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5844
reference_id
reference_type
scores
0
value 0.00724
scoring_system epss
scoring_elements 0.72494
published_at 2026-04-07T12:55:00Z
1
value 0.00724
scoring_system epss
scoring_elements 0.72593
published_at 2026-04-18T12:55:00Z
2
value 0.00724
scoring_system epss
scoring_elements 0.72541
published_at 2026-04-13T12:55:00Z
3
value 0.00724
scoring_system epss
scoring_elements 0.72583
published_at 2026-04-21T12:55:00Z
4
value 0.00724
scoring_system epss
scoring_elements 0.725
published_at 2026-04-02T12:55:00Z
5
value 0.00724
scoring_system epss
scoring_elements 0.72517
published_at 2026-04-04T12:55:00Z
6
value 0.00724
scoring_system epss
scoring_elements 0.72532
published_at 2026-04-08T12:55:00Z
7
value 0.00724
scoring_system epss
scoring_elements 0.72544
published_at 2026-04-09T12:55:00Z
8
value 0.00724
scoring_system epss
scoring_elements 0.72568
published_at 2026-04-11T12:55:00Z
9
value 0.00724
scoring_system epss
scoring_elements 0.7255
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5844
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9811
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5837
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5839
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5842
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5844
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1419600
reference_id 1419600
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1419600
9
reference_url https://security.archlinux.org/ASA-201702-4
reference_id ASA-201702-4
reference_type
scores
url https://security.archlinux.org/ASA-201702-4
10
reference_url https://security.archlinux.org/AVG-164
reference_id AVG-164
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-164
11
reference_url https://security.gentoo.org/glsa/201705-10
reference_id GLSA-201705-10
reference_type
scores
url https://security.gentoo.org/glsa/201705-10
12
reference_url https://access.redhat.com/errata/RHSA-2017:2060
reference_id RHSA-2017:2060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2060
13
reference_url https://usn.ubuntu.com/3244-1/
reference_id USN-3244-1
reference_type
scores
url https://usn.ubuntu.com/3244-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-base1.0@1.4.4-2%2Bdeb8u1
purl pkg:deb/debian/gst-plugins-base1.0@1.4.4-2%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-21tf-t9ww-ufg5
1
vulnerability VCID-22k7-ftg2-w3ee
2
vulnerability VCID-2ykm-esve-s3b9
3
vulnerability VCID-32zy-1a2y-nkdz
4
vulnerability VCID-4xqt-vrk6-dyfr
5
vulnerability VCID-64mw-yyjq-mqgp
6
vulnerability VCID-9wre-pzu1-y3a7
7
vulnerability VCID-a2rd-ntzd-2kdr
8
vulnerability VCID-aay9-3b4y-kbh1
9
vulnerability VCID-b22v-3x5y-kbbx
10
vulnerability VCID-bd83-n2qx-gqeh
11
vulnerability VCID-c9pa-ua87-tbdp
12
vulnerability VCID-gw57-rwva-r7fb
13
vulnerability VCID-j8pf-ztyq-1ufd
14
vulnerability VCID-jkag-wv9p-5yhm
15
vulnerability VCID-k198-ngub-ayfx
16
vulnerability VCID-rkb1-hqh5-uqcy
17
vulnerability VCID-vyzk-txky-muce
18
vulnerability VCID-ye91-ftez-j7bb
19
vulnerability VCID-ygdq-ef5t-e7bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.4.4-2%252Bdeb8u1
1
url pkg:deb/debian/gst-plugins-base1.0@1.10.4-1%2Bdeb9u1
purl pkg:deb/debian/gst-plugins-base1.0@1.10.4-1%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-21tf-t9ww-ufg5
1
vulnerability VCID-32zy-1a2y-nkdz
2
vulnerability VCID-4xqt-vrk6-dyfr
3
vulnerability VCID-64mw-yyjq-mqgp
4
vulnerability VCID-9wre-pzu1-y3a7
5
vulnerability VCID-a2rd-ntzd-2kdr
6
vulnerability VCID-b22v-3x5y-kbbx
7
vulnerability VCID-bd83-n2qx-gqeh
8
vulnerability VCID-gw57-rwva-r7fb
9
vulnerability VCID-j8pf-ztyq-1ufd
10
vulnerability VCID-jkag-wv9p-5yhm
11
vulnerability VCID-k198-ngub-ayfx
12
vulnerability VCID-rkb1-hqh5-uqcy
13
vulnerability VCID-ye91-ftez-j7bb
14
vulnerability VCID-ygdq-ef5t-e7bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.10.4-1%252Bdeb9u1
aliases CVE-2017-5844
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2ykm-esve-s3b9
3
url VCID-aay9-3b4y-kbh1
vulnerability_id VCID-aay9-3b4y-kbh1
summary
Multiple vulnerabilities have been found in various GStreamer
    plug-ins, the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5842.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5842.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5842
reference_id
reference_type
scores
0
value 0.00795
scoring_system epss
scoring_elements 0.7391
published_at 2026-04-01T12:55:00Z
1
value 0.00795
scoring_system epss
scoring_elements 0.74001
published_at 2026-04-21T12:55:00Z
2
value 0.00795
scoring_system epss
scoring_elements 0.74
published_at 2026-04-16T12:55:00Z
3
value 0.00795
scoring_system epss
scoring_elements 0.7401
published_at 2026-04-18T12:55:00Z
4
value 0.00795
scoring_system epss
scoring_elements 0.7392
published_at 2026-04-02T12:55:00Z
5
value 0.00795
scoring_system epss
scoring_elements 0.73944
published_at 2026-04-04T12:55:00Z
6
value 0.00795
scoring_system epss
scoring_elements 0.73915
published_at 2026-04-07T12:55:00Z
7
value 0.00795
scoring_system epss
scoring_elements 0.73949
published_at 2026-04-08T12:55:00Z
8
value 0.00795
scoring_system epss
scoring_elements 0.73962
published_at 2026-04-09T12:55:00Z
9
value 0.00795
scoring_system epss
scoring_elements 0.73986
published_at 2026-04-11T12:55:00Z
10
value 0.00795
scoring_system epss
scoring_elements 0.73968
published_at 2026-04-12T12:55:00Z
11
value 0.00795
scoring_system epss
scoring_elements 0.7396
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5842
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9811
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5837
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5839
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5842
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5844
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1419591
reference_id 1419591
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1419591
9
reference_url https://security.archlinux.org/ASA-201702-4
reference_id ASA-201702-4
reference_type
scores
url https://security.archlinux.org/ASA-201702-4
10
reference_url https://security.archlinux.org/AVG-164
reference_id AVG-164
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-164
11
reference_url https://security.gentoo.org/glsa/201705-10
reference_id GLSA-201705-10
reference_type
scores
url https://security.gentoo.org/glsa/201705-10
12
reference_url https://access.redhat.com/errata/RHSA-2017:2060
reference_id RHSA-2017:2060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2060
13
reference_url https://usn.ubuntu.com/3244-1/
reference_id USN-3244-1
reference_type
scores
url https://usn.ubuntu.com/3244-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-base1.0@1.4.4-2%2Bdeb8u1
purl pkg:deb/debian/gst-plugins-base1.0@1.4.4-2%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-21tf-t9ww-ufg5
1
vulnerability VCID-22k7-ftg2-w3ee
2
vulnerability VCID-2ykm-esve-s3b9
3
vulnerability VCID-32zy-1a2y-nkdz
4
vulnerability VCID-4xqt-vrk6-dyfr
5
vulnerability VCID-64mw-yyjq-mqgp
6
vulnerability VCID-9wre-pzu1-y3a7
7
vulnerability VCID-a2rd-ntzd-2kdr
8
vulnerability VCID-aay9-3b4y-kbh1
9
vulnerability VCID-b22v-3x5y-kbbx
10
vulnerability VCID-bd83-n2qx-gqeh
11
vulnerability VCID-c9pa-ua87-tbdp
12
vulnerability VCID-gw57-rwva-r7fb
13
vulnerability VCID-j8pf-ztyq-1ufd
14
vulnerability VCID-jkag-wv9p-5yhm
15
vulnerability VCID-k198-ngub-ayfx
16
vulnerability VCID-rkb1-hqh5-uqcy
17
vulnerability VCID-vyzk-txky-muce
18
vulnerability VCID-ye91-ftez-j7bb
19
vulnerability VCID-ygdq-ef5t-e7bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.4.4-2%252Bdeb8u1
1
url pkg:deb/debian/gst-plugins-base1.0@1.10.4-1%2Bdeb9u1
purl pkg:deb/debian/gst-plugins-base1.0@1.10.4-1%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-21tf-t9ww-ufg5
1
vulnerability VCID-32zy-1a2y-nkdz
2
vulnerability VCID-4xqt-vrk6-dyfr
3
vulnerability VCID-64mw-yyjq-mqgp
4
vulnerability VCID-9wre-pzu1-y3a7
5
vulnerability VCID-a2rd-ntzd-2kdr
6
vulnerability VCID-b22v-3x5y-kbbx
7
vulnerability VCID-bd83-n2qx-gqeh
8
vulnerability VCID-gw57-rwva-r7fb
9
vulnerability VCID-j8pf-ztyq-1ufd
10
vulnerability VCID-jkag-wv9p-5yhm
11
vulnerability VCID-k198-ngub-ayfx
12
vulnerability VCID-rkb1-hqh5-uqcy
13
vulnerability VCID-ye91-ftez-j7bb
14
vulnerability VCID-ygdq-ef5t-e7bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.10.4-1%252Bdeb9u1
aliases CVE-2017-5842
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aay9-3b4y-kbh1
4
url VCID-c9pa-ua87-tbdp
vulnerability_id VCID-c9pa-ua87-tbdp
summary
Multiple vulnerabilities have been found in various GStreamer
    plug-ins, the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9811.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9811.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9811
reference_id
reference_type
scores
0
value 0.00485
scoring_system epss
scoring_elements 0.65282
published_at 2026-04-01T12:55:00Z
1
value 0.00485
scoring_system epss
scoring_elements 0.65331
published_at 2026-04-02T12:55:00Z
2
value 0.00485
scoring_system epss
scoring_elements 0.65357
published_at 2026-04-04T12:55:00Z
3
value 0.00485
scoring_system epss
scoring_elements 0.65321
published_at 2026-04-07T12:55:00Z
4
value 0.00485
scoring_system epss
scoring_elements 0.65373
published_at 2026-04-08T12:55:00Z
5
value 0.00485
scoring_system epss
scoring_elements 0.65384
published_at 2026-04-09T12:55:00Z
6
value 0.00485
scoring_system epss
scoring_elements 0.65403
published_at 2026-04-11T12:55:00Z
7
value 0.00485
scoring_system epss
scoring_elements 0.6539
published_at 2026-04-12T12:55:00Z
8
value 0.00485
scoring_system epss
scoring_elements 0.65362
published_at 2026-04-13T12:55:00Z
9
value 0.00485
scoring_system epss
scoring_elements 0.65398
published_at 2026-04-16T12:55:00Z
10
value 0.00485
scoring_system epss
scoring_elements 0.65409
published_at 2026-04-18T12:55:00Z
11
value 0.00485
scoring_system epss
scoring_elements 0.65393
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9811
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9811
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5837
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5839
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5842
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5844
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1401918
reference_id 1401918
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1401918
9
reference_url https://security.gentoo.org/glsa/201705-10
reference_id GLSA-201705-10
reference_type
scores
url https://security.gentoo.org/glsa/201705-10
10
reference_url https://access.redhat.com/errata/RHSA-2017:2060
reference_id RHSA-2017:2060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2060
11
reference_url https://usn.ubuntu.com/3244-1/
reference_id USN-3244-1
reference_type
scores
url https://usn.ubuntu.com/3244-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-base1.0@1.4.4-2%2Bdeb8u1
purl pkg:deb/debian/gst-plugins-base1.0@1.4.4-2%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-21tf-t9ww-ufg5
1
vulnerability VCID-22k7-ftg2-w3ee
2
vulnerability VCID-2ykm-esve-s3b9
3
vulnerability VCID-32zy-1a2y-nkdz
4
vulnerability VCID-4xqt-vrk6-dyfr
5
vulnerability VCID-64mw-yyjq-mqgp
6
vulnerability VCID-9wre-pzu1-y3a7
7
vulnerability VCID-a2rd-ntzd-2kdr
8
vulnerability VCID-aay9-3b4y-kbh1
9
vulnerability VCID-b22v-3x5y-kbbx
10
vulnerability VCID-bd83-n2qx-gqeh
11
vulnerability VCID-c9pa-ua87-tbdp
12
vulnerability VCID-gw57-rwva-r7fb
13
vulnerability VCID-j8pf-ztyq-1ufd
14
vulnerability VCID-jkag-wv9p-5yhm
15
vulnerability VCID-k198-ngub-ayfx
16
vulnerability VCID-rkb1-hqh5-uqcy
17
vulnerability VCID-vyzk-txky-muce
18
vulnerability VCID-ye91-ftez-j7bb
19
vulnerability VCID-ygdq-ef5t-e7bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.4.4-2%252Bdeb8u1
1
url pkg:deb/debian/gst-plugins-base1.0@1.10.4-1%2Bdeb9u1
purl pkg:deb/debian/gst-plugins-base1.0@1.10.4-1%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-21tf-t9ww-ufg5
1
vulnerability VCID-32zy-1a2y-nkdz
2
vulnerability VCID-4xqt-vrk6-dyfr
3
vulnerability VCID-64mw-yyjq-mqgp
4
vulnerability VCID-9wre-pzu1-y3a7
5
vulnerability VCID-a2rd-ntzd-2kdr
6
vulnerability VCID-b22v-3x5y-kbbx
7
vulnerability VCID-bd83-n2qx-gqeh
8
vulnerability VCID-gw57-rwva-r7fb
9
vulnerability VCID-j8pf-ztyq-1ufd
10
vulnerability VCID-jkag-wv9p-5yhm
11
vulnerability VCID-k198-ngub-ayfx
12
vulnerability VCID-rkb1-hqh5-uqcy
13
vulnerability VCID-ye91-ftez-j7bb
14
vulnerability VCID-ygdq-ef5t-e7bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.10.4-1%252Bdeb9u1
aliases CVE-2016-9811
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c9pa-ua87-tbdp
5
url VCID-vyzk-txky-muce
vulnerability_id VCID-vyzk-txky-muce
summary
Multiple vulnerabilities have been found in various GStreamer
    plug-ins, the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5837.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5837.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5837
reference_id
reference_type
scores
0
value 0.00724
scoring_system epss
scoring_elements 0.72494
published_at 2026-04-07T12:55:00Z
1
value 0.00724
scoring_system epss
scoring_elements 0.72593
published_at 2026-04-18T12:55:00Z
2
value 0.00724
scoring_system epss
scoring_elements 0.72541
published_at 2026-04-13T12:55:00Z
3
value 0.00724
scoring_system epss
scoring_elements 0.72583
published_at 2026-04-21T12:55:00Z
4
value 0.00724
scoring_system epss
scoring_elements 0.725
published_at 2026-04-02T12:55:00Z
5
value 0.00724
scoring_system epss
scoring_elements 0.72517
published_at 2026-04-04T12:55:00Z
6
value 0.00724
scoring_system epss
scoring_elements 0.72532
published_at 2026-04-08T12:55:00Z
7
value 0.00724
scoring_system epss
scoring_elements 0.72544
published_at 2026-04-09T12:55:00Z
8
value 0.00724
scoring_system epss
scoring_elements 0.72568
published_at 2026-04-11T12:55:00Z
9
value 0.00724
scoring_system epss
scoring_elements 0.7255
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5837
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9811
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5837
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5839
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5842
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5844
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1419584
reference_id 1419584
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1419584
9
reference_url https://security.archlinux.org/ASA-201702-4
reference_id ASA-201702-4
reference_type
scores
url https://security.archlinux.org/ASA-201702-4
10
reference_url https://security.archlinux.org/AVG-164
reference_id AVG-164
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-164
11
reference_url https://security.gentoo.org/glsa/201705-10
reference_id GLSA-201705-10
reference_type
scores
url https://security.gentoo.org/glsa/201705-10
12
reference_url https://access.redhat.com/errata/RHSA-2017:2060
reference_id RHSA-2017:2060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2060
13
reference_url https://usn.ubuntu.com/3244-1/
reference_id USN-3244-1
reference_type
scores
url https://usn.ubuntu.com/3244-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-base1.0@1.4.4-2%2Bdeb8u1
purl pkg:deb/debian/gst-plugins-base1.0@1.4.4-2%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-21tf-t9ww-ufg5
1
vulnerability VCID-22k7-ftg2-w3ee
2
vulnerability VCID-2ykm-esve-s3b9
3
vulnerability VCID-32zy-1a2y-nkdz
4
vulnerability VCID-4xqt-vrk6-dyfr
5
vulnerability VCID-64mw-yyjq-mqgp
6
vulnerability VCID-9wre-pzu1-y3a7
7
vulnerability VCID-a2rd-ntzd-2kdr
8
vulnerability VCID-aay9-3b4y-kbh1
9
vulnerability VCID-b22v-3x5y-kbbx
10
vulnerability VCID-bd83-n2qx-gqeh
11
vulnerability VCID-c9pa-ua87-tbdp
12
vulnerability VCID-gw57-rwva-r7fb
13
vulnerability VCID-j8pf-ztyq-1ufd
14
vulnerability VCID-jkag-wv9p-5yhm
15
vulnerability VCID-k198-ngub-ayfx
16
vulnerability VCID-rkb1-hqh5-uqcy
17
vulnerability VCID-vyzk-txky-muce
18
vulnerability VCID-ye91-ftez-j7bb
19
vulnerability VCID-ygdq-ef5t-e7bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.4.4-2%252Bdeb8u1
1
url pkg:deb/debian/gst-plugins-base1.0@1.10.4-1%2Bdeb9u1
purl pkg:deb/debian/gst-plugins-base1.0@1.10.4-1%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-21tf-t9ww-ufg5
1
vulnerability VCID-32zy-1a2y-nkdz
2
vulnerability VCID-4xqt-vrk6-dyfr
3
vulnerability VCID-64mw-yyjq-mqgp
4
vulnerability VCID-9wre-pzu1-y3a7
5
vulnerability VCID-a2rd-ntzd-2kdr
6
vulnerability VCID-b22v-3x5y-kbbx
7
vulnerability VCID-bd83-n2qx-gqeh
8
vulnerability VCID-gw57-rwva-r7fb
9
vulnerability VCID-j8pf-ztyq-1ufd
10
vulnerability VCID-jkag-wv9p-5yhm
11
vulnerability VCID-k198-ngub-ayfx
12
vulnerability VCID-rkb1-hqh5-uqcy
13
vulnerability VCID-ye91-ftez-j7bb
14
vulnerability VCID-ygdq-ef5t-e7bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.10.4-1%252Bdeb9u1
aliases CVE-2017-5837
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vyzk-txky-muce
Risk_score4.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.10.4-1%252Bdeb9u1