Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
Typedeb
Namespacedebian
Namegst-plugins-base1.0
Version1.22.0-3+deb12u5
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-4xqt-vrk6-dyfr
vulnerability_id VCID-4xqt-vrk6-dyfr
summary Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47615.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47615.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47615
reference_id
reference_type
scores
0
value 0.00084
scoring_system epss
scoring_elements 0.24353
published_at 2026-04-21T12:55:00Z
1
value 0.00084
scoring_system epss
scoring_elements 0.24418
published_at 2026-04-08T12:55:00Z
2
value 0.00084
scoring_system epss
scoring_elements 0.24463
published_at 2026-04-09T12:55:00Z
3
value 0.00084
scoring_system epss
scoring_elements 0.24478
published_at 2026-04-11T12:55:00Z
4
value 0.00084
scoring_system epss
scoring_elements 0.24434
published_at 2026-04-12T12:55:00Z
5
value 0.00084
scoring_system epss
scoring_elements 0.24377
published_at 2026-04-13T12:55:00Z
6
value 0.00084
scoring_system epss
scoring_elements 0.24392
published_at 2026-04-16T12:55:00Z
7
value 0.00084
scoring_system epss
scoring_elements 0.24383
published_at 2026-04-18T12:55:00Z
8
value 0.00084
scoring_system epss
scoring_elements 0.24535
published_at 2026-04-02T12:55:00Z
9
value 0.00084
scoring_system epss
scoring_elements 0.24571
published_at 2026-04-04T12:55:00Z
10
value 0.00084
scoring_system epss
scoring_elements 0.2435
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47615
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47615
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2331740
reference_id 2331740
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2331740
5
reference_url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8038.patch
reference_id 8038.patch
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:18:36Z/
url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8038.patch
6
reference_url https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/
reference_id GHSL-2024-115_GHSL-2024-118_Gstreamer
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:18:36Z/
url https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/
7
reference_url https://security.gentoo.org/glsa/202506-02
reference_id GLSA-202506-02
reference_type
scores
url https://security.gentoo.org/glsa/202506-02
8
reference_url https://access.redhat.com/errata/RHSA-2024:11117
reference_id RHSA-2024:11117
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11117
9
reference_url https://access.redhat.com/errata/RHSA-2024:11118
reference_id RHSA-2024:11118
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11118
10
reference_url https://access.redhat.com/errata/RHSA-2024:11120
reference_id RHSA-2024:11120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11120
11
reference_url https://access.redhat.com/errata/RHSA-2024:11123
reference_id RHSA-2024:11123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11123
12
reference_url https://access.redhat.com/errata/RHSA-2024:11130
reference_id RHSA-2024:11130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11130
13
reference_url https://access.redhat.com/errata/RHSA-2024:11141
reference_id RHSA-2024:11141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11141
14
reference_url https://access.redhat.com/errata/RHSA-2024:11142
reference_id RHSA-2024:11142
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11142
15
reference_url https://access.redhat.com/errata/RHSA-2024:11143
reference_id RHSA-2024:11143
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11143
16
reference_url https://access.redhat.com/errata/RHSA-2024:11344
reference_id RHSA-2024:11344
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11344
17
reference_url https://access.redhat.com/errata/RHSA-2024:11345
reference_id RHSA-2024:11345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11345
18
reference_url https://gstreamer.freedesktop.org/security/sa-2024-0026.html
reference_id sa-2024-0026.html
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:18:36Z/
url https://gstreamer.freedesktop.org/security/sa-2024-0026.html
19
reference_url https://usn.ubuntu.com/7175-1/
reference_id USN-7175-1
reference_type
scores
url https://usn.ubuntu.com/7175-1/
20
reference_url https://usn.ubuntu.com/7807-1/
reference_id USN-7807-1
reference_type
scores
url https://usn.ubuntu.com/7807-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
purl pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5
aliases CVE-2024-47615
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4xqt-vrk6-dyfr
1
url VCID-64mw-yyjq-mqgp
vulnerability_id VCID-64mw-yyjq-mqgp
summary Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47542.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47542.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47542
reference_id
reference_type
scores
0
value 0.00078
scoring_system epss
scoring_elements 0.23268
published_at 2026-04-04T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.23224
published_at 2026-04-02T12:55:00Z
2
value 0.00133
scoring_system epss
scoring_elements 0.32873
published_at 2026-04-09T12:55:00Z
3
value 0.00133
scoring_system epss
scoring_elements 0.32829
published_at 2026-04-18T12:55:00Z
4
value 0.00133
scoring_system epss
scoring_elements 0.32852
published_at 2026-04-16T12:55:00Z
5
value 0.00133
scoring_system epss
scoring_elements 0.3281
published_at 2026-04-13T12:55:00Z
6
value 0.00133
scoring_system epss
scoring_elements 0.32874
published_at 2026-04-11T12:55:00Z
7
value 0.00133
scoring_system epss
scoring_elements 0.32793
published_at 2026-04-21T12:55:00Z
8
value 0.00133
scoring_system epss
scoring_elements 0.32835
published_at 2026-04-12T12:55:00Z
9
value 0.00133
scoring_system epss
scoring_elements 0.32796
published_at 2026-04-07T12:55:00Z
10
value 0.00133
scoring_system epss
scoring_elements 0.32844
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47542
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47542
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47542
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2331717
reference_id 2331717
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2331717
5
reference_url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8033.patch
reference_id 8033.patch
reference_type
scores
0
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:30:59Z/
url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8033.patch
6
reference_url https://securitylab.github.com/advisories/GHSL-2024-235_Gstreamer/
reference_id GHSL-2024-235_Gstreamer
reference_type
scores
0
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:30:59Z/
url https://securitylab.github.com/advisories/GHSL-2024-235_Gstreamer/
7
reference_url https://security.gentoo.org/glsa/202506-02
reference_id GLSA-202506-02
reference_type
scores
url https://security.gentoo.org/glsa/202506-02
8
reference_url https://access.redhat.com/errata/RHSA-2025:7243
reference_id RHSA-2025:7243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7243
9
reference_url https://gstreamer.freedesktop.org/security/sa-2024-0008.html
reference_id sa-2024-0008.html
reference_type
scores
0
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:30:59Z/
url https://gstreamer.freedesktop.org/security/sa-2024-0008.html
10
reference_url https://usn.ubuntu.com/7175-1/
reference_id USN-7175-1
reference_type
scores
url https://usn.ubuntu.com/7175-1/
11
reference_url https://usn.ubuntu.com/7807-1/
reference_id USN-7807-1
reference_type
scores
url https://usn.ubuntu.com/7807-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
purl pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5
aliases CVE-2024-47542
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-64mw-yyjq-mqgp
2
url VCID-9wre-pzu1-y3a7
vulnerability_id VCID-9wre-pzu1-y3a7
summary Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47607.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47607.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47607
reference_id
reference_type
scores
0
value 0.00103
scoring_system epss
scoring_elements 0.28137
published_at 2026-04-21T12:55:00Z
1
value 0.00103
scoring_system epss
scoring_elements 0.2824
published_at 2026-04-08T12:55:00Z
2
value 0.00103
scoring_system epss
scoring_elements 0.28282
published_at 2026-04-09T12:55:00Z
3
value 0.00103
scoring_system epss
scoring_elements 0.28288
published_at 2026-04-11T12:55:00Z
4
value 0.00103
scoring_system epss
scoring_elements 0.28244
published_at 2026-04-12T12:55:00Z
5
value 0.00103
scoring_system epss
scoring_elements 0.28186
published_at 2026-04-13T12:55:00Z
6
value 0.00103
scoring_system epss
scoring_elements 0.28199
published_at 2026-04-16T12:55:00Z
7
value 0.00103
scoring_system epss
scoring_elements 0.28182
published_at 2026-04-18T12:55:00Z
8
value 0.00103
scoring_system epss
scoring_elements 0.28341
published_at 2026-04-02T12:55:00Z
9
value 0.00103
scoring_system epss
scoring_elements 0.28384
published_at 2026-04-04T12:55:00Z
10
value 0.00103
scoring_system epss
scoring_elements 0.28175
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47607
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47607
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2331754
reference_id 2331754
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2331754
5
reference_url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8037.patch
reference_id 8037.patch
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:22:43Z/
url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8037.patch
6
reference_url https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/
reference_id GHSL-2024-115_GHSL-2024-118_Gstreamer
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:22:43Z/
url https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/
7
reference_url https://security.gentoo.org/glsa/202506-02
reference_id GLSA-202506-02
reference_type
scores
url https://security.gentoo.org/glsa/202506-02
8
reference_url https://access.redhat.com/errata/RHSA-2024:11117
reference_id RHSA-2024:11117
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11117
9
reference_url https://access.redhat.com/errata/RHSA-2024:11118
reference_id RHSA-2024:11118
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11118
10
reference_url https://access.redhat.com/errata/RHSA-2024:11120
reference_id RHSA-2024:11120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11120
11
reference_url https://access.redhat.com/errata/RHSA-2024:11123
reference_id RHSA-2024:11123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11123
12
reference_url https://access.redhat.com/errata/RHSA-2024:11130
reference_id RHSA-2024:11130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11130
13
reference_url https://access.redhat.com/errata/RHSA-2024:11141
reference_id RHSA-2024:11141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11141
14
reference_url https://access.redhat.com/errata/RHSA-2024:11142
reference_id RHSA-2024:11142
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11142
15
reference_url https://access.redhat.com/errata/RHSA-2024:11143
reference_id RHSA-2024:11143
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11143
16
reference_url https://access.redhat.com/errata/RHSA-2024:11344
reference_id RHSA-2024:11344
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11344
17
reference_url https://access.redhat.com/errata/RHSA-2024:11345
reference_id RHSA-2024:11345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11345
18
reference_url https://gstreamer.freedesktop.org/security/sa-2024-0024.html
reference_id sa-2024-0024.html
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:22:43Z/
url https://gstreamer.freedesktop.org/security/sa-2024-0024.html
19
reference_url https://usn.ubuntu.com/7175-1/
reference_id USN-7175-1
reference_type
scores
url https://usn.ubuntu.com/7175-1/
20
reference_url https://usn.ubuntu.com/7807-1/
reference_id USN-7807-1
reference_type
scores
url https://usn.ubuntu.com/7807-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
purl pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5
aliases CVE-2024-47607
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9wre-pzu1-y3a7
3
url VCID-a2rd-ntzd-2kdr
vulnerability_id VCID-a2rd-ntzd-2kdr
summary GStreamer: GStreamer: Arbitrary code execution via RIFF palette integer overflow in AVI file handling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2921.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2921.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2921
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09324
published_at 2026-04-02T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09285
published_at 2026-04-07T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09374
published_at 2026-04-04T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09361
published_at 2026-04-08T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09408
published_at 2026-04-09T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.0942
published_at 2026-04-11T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09391
published_at 2026-04-12T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09377
published_at 2026-04-13T12:55:00Z
8
value 0.00035
scoring_system epss
scoring_elements 0.10333
published_at 2026-04-16T12:55:00Z
9
value 0.00035
scoring_system epss
scoring_elements 0.10437
published_at 2026-04-21T12:55:00Z
10
value 0.00035
scoring_system epss
scoring_elements 0.10307
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2921
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2921
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2447496
reference_id 2447496
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2447496
5
reference_url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/e3a99c35266fc92dd6a18ac5fde028d0cda559e6
reference_id e3a99c35266fc92dd6a18ac5fde028d0cda559e6
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-16T15:26:01Z/
url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/e3a99c35266fc92dd6a18ac5fde028d0cda559e6
6
reference_url https://access.redhat.com/errata/RHSA-2026:6259
reference_id RHSA-2026:6259
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6259
7
reference_url https://access.redhat.com/errata/RHSA-2026:6300
reference_id RHSA-2026:6300
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6300
8
reference_url https://access.redhat.com/errata/RHSA-2026:6750
reference_id RHSA-2026:6750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6750
9
reference_url https://access.redhat.com/errata/RHSA-2026:7673
reference_id RHSA-2026:7673
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7673
10
reference_url https://access.redhat.com/errata/RHSA-2026:7850
reference_id RHSA-2026:7850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7850
11
reference_url https://access.redhat.com/errata/RHSA-2026:8854
reference_id RHSA-2026:8854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8854
12
reference_url https://access.redhat.com/errata/RHSA-2026:8857
reference_id RHSA-2026:8857
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8857
13
reference_url https://access.redhat.com/errata/RHSA-2026:8862
reference_id RHSA-2026:8862
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8862
14
reference_url https://access.redhat.com/errata/RHSA-2026:8874
reference_id RHSA-2026:8874
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8874
15
reference_url https://access.redhat.com/errata/RHSA-2026:8876
reference_id RHSA-2026:8876
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8876
16
reference_url https://usn.ubuntu.com/8130-1/
reference_id USN-8130-1
reference_type
scores
url https://usn.ubuntu.com/8130-1/
17
reference_url https://www.zerodayinitiative.com/advisories/ZDI-26-168/
reference_id ZDI-26-168
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-16T15:26:01Z/
url https://www.zerodayinitiative.com/advisories/ZDI-26-168/
fixed_packages
0
url pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
purl pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5
aliases CVE-2026-2921
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a2rd-ntzd-2kdr
4
url VCID-b22v-3x5y-kbbx
vulnerability_id VCID-b22v-3x5y-kbbx
summary Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47600.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47600.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47600
reference_id
reference_type
scores
0
value 0.00102
scoring_system epss
scoring_elements 0.28156
published_at 2026-04-04T12:55:00Z
1
value 0.00102
scoring_system epss
scoring_elements 0.28113
published_at 2026-04-02T12:55:00Z
2
value 0.00174
scoring_system epss
scoring_elements 0.38853
published_at 2026-04-09T12:55:00Z
3
value 0.00174
scoring_system epss
scoring_elements 0.38826
published_at 2026-04-18T12:55:00Z
4
value 0.00174
scoring_system epss
scoring_elements 0.38848
published_at 2026-04-16T12:55:00Z
5
value 0.00174
scoring_system epss
scoring_elements 0.38802
published_at 2026-04-13T12:55:00Z
6
value 0.00174
scoring_system epss
scoring_elements 0.38866
published_at 2026-04-11T12:55:00Z
7
value 0.00174
scoring_system epss
scoring_elements 0.38746
published_at 2026-04-21T12:55:00Z
8
value 0.00174
scoring_system epss
scoring_elements 0.38829
published_at 2026-04-12T12:55:00Z
9
value 0.00174
scoring_system epss
scoring_elements 0.3879
published_at 2026-04-07T12:55:00Z
10
value 0.00174
scoring_system epss
scoring_elements 0.38842
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47600
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47600
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2331738
reference_id 2331738
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2331738
5
reference_url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8034.patch
reference_id 8034.patch
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:27:40Z/
url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8034.patch
6
reference_url https://securitylab.github.com/advisories/GHSL-2024-248_Gstreamer/
reference_id GHSL-2024-248_Gstreamer
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:27:40Z/
url https://securitylab.github.com/advisories/GHSL-2024-248_Gstreamer/
7
reference_url https://security.gentoo.org/glsa/202506-02
reference_id GLSA-202506-02
reference_type
scores
url https://security.gentoo.org/glsa/202506-02
8
reference_url https://access.redhat.com/errata/RHSA-2025:7243
reference_id RHSA-2025:7243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7243
9
reference_url https://gstreamer.freedesktop.org/security/sa-2024-0018.html
reference_id sa-2024-0018.html
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:27:40Z/
url https://gstreamer.freedesktop.org/security/sa-2024-0018.html
10
reference_url https://usn.ubuntu.com/7175-1/
reference_id USN-7175-1
reference_type
scores
url https://usn.ubuntu.com/7175-1/
11
reference_url https://usn.ubuntu.com/7807-1/
reference_id USN-7807-1
reference_type
scores
url https://usn.ubuntu.com/7807-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
purl pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5
aliases CVE-2024-47600
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b22v-3x5y-kbbx
5
url VCID-bd83-n2qx-gqeh
vulnerability_id VCID-bd83-n2qx-gqeh
summary gstreamer1-plugins-base: GStreamer Subparse NULL Pointer Dereference
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47807.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47807.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-47807
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07055
published_at 2026-04-02T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.07344
published_at 2026-04-21T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.07168
published_at 2026-04-11T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07301
published_at 2026-04-12T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.07292
published_at 2026-04-13T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.07223
published_at 2026-04-16T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.07218
published_at 2026-04-18T12:55:00Z
7
value 0.00026
scoring_system epss
scoring_elements 0.07111
published_at 2026-04-04T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.07086
published_at 2026-04-07T12:55:00Z
9
value 0.00026
scoring_system epss
scoring_elements 0.07139
published_at 2026-04-08T12:55:00Z
10
value 0.00026
scoring_system epss
scoring_elements 0.07171
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-47807
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47807
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2387143
reference_id 2387143
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2387143
5
reference_url https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md
reference_id ATREDIS-2025-0003.md
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-12T13:52:51Z/
url https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md
6
reference_url https://gstreamer.freedesktop.org/security/
reference_id security
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-12T13:52:51Z/
url https://gstreamer.freedesktop.org/security/
7
reference_url https://usn.ubuntu.com/7716-1/
reference_id USN-7716-1
reference_type
scores
url https://usn.ubuntu.com/7716-1/
8
reference_url https://usn.ubuntu.com/7827-1/
reference_id USN-7827-1
reference_type
scores
url https://usn.ubuntu.com/7827-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
purl pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5
aliases CVE-2025-47807
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bd83-n2qx-gqeh
6
url VCID-gw57-rwva-r7fb
vulnerability_id VCID-gw57-rwva-r7fb
summary Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47541.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47541.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47541
reference_id
reference_type
scores
0
value 0.00088
scoring_system epss
scoring_elements 0.25385
published_at 2026-04-04T12:55:00Z
1
value 0.00088
scoring_system epss
scoring_elements 0.25345
published_at 2026-04-02T12:55:00Z
2
value 0.00151
scoring_system epss
scoring_elements 0.3581
published_at 2026-04-09T12:55:00Z
3
value 0.00151
scoring_system epss
scoring_elements 0.35785
published_at 2026-04-18T12:55:00Z
4
value 0.00151
scoring_system epss
scoring_elements 0.35797
published_at 2026-04-16T12:55:00Z
5
value 0.00151
scoring_system epss
scoring_elements 0.35756
published_at 2026-04-13T12:55:00Z
6
value 0.00151
scoring_system epss
scoring_elements 0.35819
published_at 2026-04-11T12:55:00Z
7
value 0.00151
scoring_system epss
scoring_elements 0.35737
published_at 2026-04-21T12:55:00Z
8
value 0.00151
scoring_system epss
scoring_elements 0.35779
published_at 2026-04-12T12:55:00Z
9
value 0.00151
scoring_system epss
scoring_elements 0.35738
published_at 2026-04-07T12:55:00Z
10
value 0.00151
scoring_system epss
scoring_elements 0.35788
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47541
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47541
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2331724
reference_id 2331724
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2331724
5
reference_url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8036.patch
reference_id 8036.patch
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:33:06Z/
url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8036.patch
6
reference_url https://securitylab.github.com/advisories/GHSL-2024-228_GStreamer/
reference_id GHSL-2024-228_GStreamer
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:33:06Z/
url https://securitylab.github.com/advisories/GHSL-2024-228_GStreamer/
7
reference_url https://security.gentoo.org/glsa/202506-02
reference_id GLSA-202506-02
reference_type
scores
url https://security.gentoo.org/glsa/202506-02
8
reference_url https://access.redhat.com/errata/RHSA-2025:7243
reference_id RHSA-2025:7243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7243
9
reference_url https://gstreamer.freedesktop.org/security/sa-2024-0023.html
reference_id sa-2024-0023.html
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:33:06Z/
url https://gstreamer.freedesktop.org/security/sa-2024-0023.html
10
reference_url https://usn.ubuntu.com/7175-1/
reference_id USN-7175-1
reference_type
scores
url https://usn.ubuntu.com/7175-1/
11
reference_url https://usn.ubuntu.com/7807-1/
reference_id USN-7807-1
reference_type
scores
url https://usn.ubuntu.com/7807-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
purl pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5
aliases CVE-2024-47541
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gw57-rwva-r7fb
7
url VCID-j8pf-ztyq-1ufd
vulnerability_id VCID-j8pf-ztyq-1ufd
summary Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47538.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47538.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47538
reference_id
reference_type
scores
0
value 0.00103
scoring_system epss
scoring_elements 0.28137
published_at 2026-04-21T12:55:00Z
1
value 0.00103
scoring_system epss
scoring_elements 0.2824
published_at 2026-04-08T12:55:00Z
2
value 0.00103
scoring_system epss
scoring_elements 0.28282
published_at 2026-04-09T12:55:00Z
3
value 0.00103
scoring_system epss
scoring_elements 0.28288
published_at 2026-04-11T12:55:00Z
4
value 0.00103
scoring_system epss
scoring_elements 0.28244
published_at 2026-04-12T12:55:00Z
5
value 0.00103
scoring_system epss
scoring_elements 0.28186
published_at 2026-04-13T12:55:00Z
6
value 0.00103
scoring_system epss
scoring_elements 0.28199
published_at 2026-04-16T12:55:00Z
7
value 0.00103
scoring_system epss
scoring_elements 0.28182
published_at 2026-04-18T12:55:00Z
8
value 0.00103
scoring_system epss
scoring_elements 0.28341
published_at 2026-04-02T12:55:00Z
9
value 0.00103
scoring_system epss
scoring_elements 0.28384
published_at 2026-04-04T12:55:00Z
10
value 0.00103
scoring_system epss
scoring_elements 0.28175
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47538
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47538
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2331727
reference_id 2331727
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2331727
5
reference_url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8035.patch
reference_id 8035.patch
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:36:36Z/
url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8035.patch
6
reference_url https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/
reference_id GHSL-2024-115_GHSL-2024-118_Gstreamer
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:36:36Z/
url https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/
7
reference_url https://security.gentoo.org/glsa/202506-02
reference_id GLSA-202506-02
reference_type
scores
url https://security.gentoo.org/glsa/202506-02
8
reference_url https://access.redhat.com/errata/RHSA-2024:11117
reference_id RHSA-2024:11117
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11117
9
reference_url https://access.redhat.com/errata/RHSA-2024:11118
reference_id RHSA-2024:11118
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11118
10
reference_url https://access.redhat.com/errata/RHSA-2024:11120
reference_id RHSA-2024:11120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11120
11
reference_url https://access.redhat.com/errata/RHSA-2024:11123
reference_id RHSA-2024:11123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11123
12
reference_url https://access.redhat.com/errata/RHSA-2024:11130
reference_id RHSA-2024:11130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11130
13
reference_url https://access.redhat.com/errata/RHSA-2024:11141
reference_id RHSA-2024:11141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11141
14
reference_url https://access.redhat.com/errata/RHSA-2024:11142
reference_id RHSA-2024:11142
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11142
15
reference_url https://access.redhat.com/errata/RHSA-2024:11143
reference_id RHSA-2024:11143
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11143
16
reference_url https://access.redhat.com/errata/RHSA-2024:11344
reference_id RHSA-2024:11344
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11344
17
reference_url https://access.redhat.com/errata/RHSA-2024:11345
reference_id RHSA-2024:11345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11345
18
reference_url https://gstreamer.freedesktop.org/security/sa-2024-0022.html
reference_id sa-2024-0022.html
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:36:36Z/
url https://gstreamer.freedesktop.org/security/sa-2024-0022.html
19
reference_url https://usn.ubuntu.com/7175-1/
reference_id USN-7175-1
reference_type
scores
url https://usn.ubuntu.com/7175-1/
20
reference_url https://usn.ubuntu.com/7807-1/
reference_id USN-7807-1
reference_type
scores
url https://usn.ubuntu.com/7807-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
purl pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5
aliases CVE-2024-47538
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j8pf-ztyq-1ufd
8
url VCID-jkag-wv9p-5yhm
vulnerability_id VCID-jkag-wv9p-5yhm
summary Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47835.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47835.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47835
reference_id
reference_type
scores
0
value 0.00079
scoring_system epss
scoring_elements 0.23389
published_at 2026-04-21T12:55:00Z
1
value 0.00079
scoring_system epss
scoring_elements 0.2342
published_at 2026-04-08T12:55:00Z
2
value 0.00079
scoring_system epss
scoring_elements 0.2347
published_at 2026-04-09T12:55:00Z
3
value 0.00079
scoring_system epss
scoring_elements 0.23488
published_at 2026-04-11T12:55:00Z
4
value 0.00079
scoring_system epss
scoring_elements 0.2345
published_at 2026-04-12T12:55:00Z
5
value 0.00079
scoring_system epss
scoring_elements 0.23395
published_at 2026-04-13T12:55:00Z
6
value 0.00079
scoring_system epss
scoring_elements 0.23412
published_at 2026-04-16T12:55:00Z
7
value 0.00079
scoring_system epss
scoring_elements 0.23407
published_at 2026-04-18T12:55:00Z
8
value 0.00079
scoring_system epss
scoring_elements 0.23528
published_at 2026-04-02T12:55:00Z
9
value 0.00079
scoring_system epss
scoring_elements 0.23565
published_at 2026-04-04T12:55:00Z
10
value 0.00079
scoring_system epss
scoring_elements 0.23347
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47835
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47835
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2331742
reference_id 2331742
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2331742
5
reference_url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8039.patch
reference_id 8039.patch
reference_type
scores
0
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:14:03Z/
url https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8039.patch
6
reference_url https://securitylab.github.com/advisories/GHSL-2024-263_Gstreamer/
reference_id GHSL-2024-263_Gstreamer
reference_type
scores
0
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:14:03Z/
url https://securitylab.github.com/advisories/GHSL-2024-263_Gstreamer/
7
reference_url https://security.gentoo.org/glsa/202506-02
reference_id GLSA-202506-02
reference_type
scores
url https://security.gentoo.org/glsa/202506-02
8
reference_url https://access.redhat.com/errata/RHSA-2025:7243
reference_id RHSA-2025:7243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7243
9
reference_url https://gstreamer.freedesktop.org/security/sa-2024-0029.html
reference_id sa-2024-0029.html
reference_type
scores
0
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:14:03Z/
url https://gstreamer.freedesktop.org/security/sa-2024-0029.html
10
reference_url https://usn.ubuntu.com/7175-1/
reference_id USN-7175-1
reference_type
scores
url https://usn.ubuntu.com/7175-1/
11
reference_url https://usn.ubuntu.com/7807-1/
reference_id USN-7807-1
reference_type
scores
url https://usn.ubuntu.com/7807-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
purl pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5
aliases CVE-2024-47835
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jkag-wv9p-5yhm
9
url VCID-k198-ngub-ayfx
vulnerability_id VCID-k198-ngub-ayfx
summary gstreamer1-plugins-base: GStreamer Subparse Stack Buffer Overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47806.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47806.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-47806
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22633
published_at 2026-04-02T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22466
published_at 2026-04-07T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22676
published_at 2026-04-04T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22548
published_at 2026-04-08T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22602
published_at 2026-04-09T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.22618
published_at 2026-04-11T12:55:00Z
6
value 0.00081
scoring_system epss
scoring_elements 0.23919
published_at 2026-04-12T12:55:00Z
7
value 0.00081
scoring_system epss
scoring_elements 0.23865
published_at 2026-04-18T12:55:00Z
8
value 0.00081
scoring_system epss
scoring_elements 0.23876
published_at 2026-04-16T12:55:00Z
9
value 0.00081
scoring_system epss
scoring_elements 0.23846
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-47806
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47806
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2387145
reference_id 2387145
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2387145
5
reference_url https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md
reference_id ATREDIS-2025-0003.md
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-08T15:45:02Z/
url https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md
6
reference_url https://gstreamer.freedesktop.org/security/
reference_id security
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-08T15:45:02Z/
url https://gstreamer.freedesktop.org/security/
7
reference_url https://usn.ubuntu.com/7716-1/
reference_id USN-7716-1
reference_type
scores
url https://usn.ubuntu.com/7716-1/
8
reference_url https://usn.ubuntu.com/7827-1/
reference_id USN-7827-1
reference_type
scores
url https://usn.ubuntu.com/7827-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
purl pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5
aliases CVE-2025-47806
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k198-ngub-ayfx
10
url VCID-ye91-ftez-j7bb
vulnerability_id VCID-ye91-ftez-j7bb
summary gstreamer1-plugins-base: GStreamer Subparse NULL Pointer Dereference
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47808.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47808.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-47808
reference_id
reference_type
scores
0
value 0.00089
scoring_system epss
scoring_elements 0.2548
published_at 2026-04-02T12:55:00Z
1
value 0.00089
scoring_system epss
scoring_elements 0.25288
published_at 2026-04-07T12:55:00Z
2
value 0.00089
scoring_system epss
scoring_elements 0.25517
published_at 2026-04-04T12:55:00Z
3
value 0.00089
scoring_system epss
scoring_elements 0.25355
published_at 2026-04-08T12:55:00Z
4
value 0.00089
scoring_system epss
scoring_elements 0.254
published_at 2026-04-09T12:55:00Z
5
value 0.00089
scoring_system epss
scoring_elements 0.25412
published_at 2026-04-11T12:55:00Z
6
value 0.00097
scoring_system epss
scoring_elements 0.26713
published_at 2026-04-13T12:55:00Z
7
value 0.00097
scoring_system epss
scoring_elements 0.26721
published_at 2026-04-16T12:55:00Z
8
value 0.00097
scoring_system epss
scoring_elements 0.26692
published_at 2026-04-18T12:55:00Z
9
value 0.00097
scoring_system epss
scoring_elements 0.26657
published_at 2026-04-21T12:55:00Z
10
value 0.00097
scoring_system epss
scoring_elements 0.2677
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-47808
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47808
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2387146
reference_id 2387146
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2387146
5
reference_url https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md
reference_id ATREDIS-2025-0003.md
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-07T19:49:18Z/
url https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md
6
reference_url https://gstreamer.freedesktop.org/security/
reference_id security
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-07T19:49:18Z/
url https://gstreamer.freedesktop.org/security/
7
reference_url https://usn.ubuntu.com/7716-1/
reference_id USN-7716-1
reference_type
scores
url https://usn.ubuntu.com/7716-1/
8
reference_url https://usn.ubuntu.com/7827-1/
reference_id USN-7827-1
reference_type
scores
url https://usn.ubuntu.com/7827-1/
fixed_packages
0
url pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
purl pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5
aliases CVE-2025-47808
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ye91-ftez-j7bb
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5