Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/ffmpeg@2.8.11-r0?arch=x86_64&distroversion=v3.3&reponame=main
Typeapk
Namespacealpine
Nameffmpeg
Version2.8.11-r0
Qualifiers
arch x86_64
distroversion v3.3
reponame main
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-51s3-7aca-uudb
vulnerability_id VCID-51s3-7aca-uudb
summary Heap-based buffer overflow in libavformat/rtmppkt.c in FFmpeg before 2.8.10, 3.0.x before 3.0.5, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 allows remote attackers to execute arbitrary code by leveraging failure to check for RTMP packet size mismatches.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-10191
reference_id
reference_type
scores
0
value 0.08661
scoring_system epss
scoring_elements 0.92416
published_at 2026-04-01T12:55:00Z
1
value 0.08661
scoring_system epss
scoring_elements 0.92422
published_at 2026-04-02T12:55:00Z
2
value 0.08661
scoring_system epss
scoring_elements 0.92431
published_at 2026-04-04T12:55:00Z
3
value 0.08661
scoring_system epss
scoring_elements 0.92434
published_at 2026-04-07T12:55:00Z
4
value 0.08661
scoring_system epss
scoring_elements 0.92445
published_at 2026-04-08T12:55:00Z
5
value 0.08661
scoring_system epss
scoring_elements 0.9245
published_at 2026-04-09T12:55:00Z
6
value 0.08661
scoring_system epss
scoring_elements 0.92456
published_at 2026-04-13T12:55:00Z
7
value 0.08661
scoring_system epss
scoring_elements 0.92458
published_at 2026-04-12T12:55:00Z
8
value 0.08661
scoring_system epss
scoring_elements 0.92467
published_at 2026-04-16T12:55:00Z
9
value 0.08661
scoring_system epss
scoring_elements 0.92466
published_at 2026-04-18T12:55:00Z
10
value 0.08661
scoring_system epss
scoring_elements 0.9247
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-10191
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10191
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10191
fixed_packages
0
url pkg:apk/alpine/ffmpeg@2.8.11-r0?arch=x86_64&distroversion=v3.3&reponame=main
purl pkg:apk/alpine/ffmpeg@2.8.11-r0?arch=x86_64&distroversion=v3.3&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ffmpeg@2.8.11-r0%3Farch=x86_64&distroversion=v3.3&reponame=main
aliases CVE-2016-10191
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-51s3-7aca-uudb
1
url VCID-7ftk-cmhs-6kha
vulnerability_id VCID-7ftk-cmhs-6kha
summary Integer overflow in the mov_build_index function in libavformat/mov.c in FFmpeg before 2.8.8, 3.0.x before 3.0.3 and 3.1.x before 3.1.1 allows remote attackers to have unspecified impact via vectors involving sample size.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6164
reference_id
reference_type
scores
0
value 0.00936
scoring_system epss
scoring_elements 0.76121
published_at 2026-04-01T12:55:00Z
1
value 0.00936
scoring_system epss
scoring_elements 0.76125
published_at 2026-04-02T12:55:00Z
2
value 0.00936
scoring_system epss
scoring_elements 0.76158
published_at 2026-04-04T12:55:00Z
3
value 0.00936
scoring_system epss
scoring_elements 0.76138
published_at 2026-04-07T12:55:00Z
4
value 0.00936
scoring_system epss
scoring_elements 0.76171
published_at 2026-04-08T12:55:00Z
5
value 0.00936
scoring_system epss
scoring_elements 0.76184
published_at 2026-04-09T12:55:00Z
6
value 0.00936
scoring_system epss
scoring_elements 0.76209
published_at 2026-04-11T12:55:00Z
7
value 0.00936
scoring_system epss
scoring_elements 0.76185
published_at 2026-04-12T12:55:00Z
8
value 0.00936
scoring_system epss
scoring_elements 0.76183
published_at 2026-04-13T12:55:00Z
9
value 0.00936
scoring_system epss
scoring_elements 0.76224
published_at 2026-04-16T12:55:00Z
10
value 0.00936
scoring_system epss
scoring_elements 0.76228
published_at 2026-04-18T12:55:00Z
11
value 0.00936
scoring_system epss
scoring_elements 0.7621
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6164
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6164
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6164
fixed_packages
0
url pkg:apk/alpine/ffmpeg@2.8.11-r0?arch=x86_64&distroversion=v3.3&reponame=main
purl pkg:apk/alpine/ffmpeg@2.8.11-r0?arch=x86_64&distroversion=v3.3&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ffmpeg@2.8.11-r0%3Farch=x86_64&distroversion=v3.3&reponame=main
aliases CVE-2016-6164
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7ftk-cmhs-6kha
2
url VCID-ehgf-99d2-uyeh
vulnerability_id VCID-ehgf-99d2-uyeh
summary
Multiple vulnerabilities have been found in FFmpeg, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7502
reference_id
reference_type
scores
0
value 0.00309
scoring_system epss
scoring_elements 0.5397
published_at 2026-04-01T12:55:00Z
1
value 0.00309
scoring_system epss
scoring_elements 0.53987
published_at 2026-04-02T12:55:00Z
2
value 0.00309
scoring_system epss
scoring_elements 0.54014
published_at 2026-04-04T12:55:00Z
3
value 0.00309
scoring_system epss
scoring_elements 0.53989
published_at 2026-04-07T12:55:00Z
4
value 0.00309
scoring_system epss
scoring_elements 0.54041
published_at 2026-04-09T12:55:00Z
5
value 0.00309
scoring_system epss
scoring_elements 0.54088
published_at 2026-04-11T12:55:00Z
6
value 0.00309
scoring_system epss
scoring_elements 0.54069
published_at 2026-04-12T12:55:00Z
7
value 0.00309
scoring_system epss
scoring_elements 0.54052
published_at 2026-04-13T12:55:00Z
8
value 0.00309
scoring_system epss
scoring_elements 0.54091
published_at 2026-04-16T12:55:00Z
9
value 0.00309
scoring_system epss
scoring_elements 0.54095
published_at 2026-04-18T12:55:00Z
10
value 0.00309
scoring_system epss
scoring_elements 0.54078
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7502
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7502
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840434
reference_id 840434
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840434
3
reference_url https://security.gentoo.org/glsa/201701-71
reference_id GLSA-201701-71
reference_type
scores
url https://security.gentoo.org/glsa/201701-71
fixed_packages
0
url pkg:apk/alpine/ffmpeg@2.8.11-r0?arch=x86_64&distroversion=v3.3&reponame=main
purl pkg:apk/alpine/ffmpeg@2.8.11-r0?arch=x86_64&distroversion=v3.3&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ffmpeg@2.8.11-r0%3Farch=x86_64&distroversion=v3.3&reponame=main
aliases CVE-2016-7502
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ehgf-99d2-uyeh
3
url VCID-fpby-s5k4-ybg1
vulnerability_id VCID-fpby-s5k4-ybg1
summary
Multiple vulnerabilities have been found in FFmpeg, the worst of
    which could lead to arbitrary code execution or Denial of Service
    condition.
references
0
reference_url http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=757248ea3cd917a7755cb15f817a9b1f15578718
reference_id
reference_type
scores
url http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=757248ea3cd917a7755cb15f817a9b1f15578718
1
reference_url http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=ad3b6fa7d83db7de951ed891649af93a47e74be5
reference_id
reference_type
scores
url http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=ad3b6fa7d83db7de951ed891649af93a47e74be5
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2328
reference_id
reference_type
scores
0
value 0.01068
scoring_system epss
scoring_elements 0.7774
published_at 2026-04-21T12:55:00Z
1
value 0.01068
scoring_system epss
scoring_elements 0.77747
published_at 2026-04-18T12:55:00Z
2
value 0.01068
scoring_system epss
scoring_elements 0.77652
published_at 2026-04-01T12:55:00Z
3
value 0.01068
scoring_system epss
scoring_elements 0.77658
published_at 2026-04-02T12:55:00Z
4
value 0.01068
scoring_system epss
scoring_elements 0.77686
published_at 2026-04-04T12:55:00Z
5
value 0.01068
scoring_system epss
scoring_elements 0.77669
published_at 2026-04-07T12:55:00Z
6
value 0.01068
scoring_system epss
scoring_elements 0.77696
published_at 2026-04-08T12:55:00Z
7
value 0.01068
scoring_system epss
scoring_elements 0.77701
published_at 2026-04-09T12:55:00Z
8
value 0.01068
scoring_system epss
scoring_elements 0.77728
published_at 2026-04-11T12:55:00Z
9
value 0.01068
scoring_system epss
scoring_elements 0.77712
published_at 2026-04-12T12:55:00Z
10
value 0.01068
scoring_system epss
scoring_elements 0.77711
published_at 2026-04-13T12:55:00Z
11
value 0.01068
scoring_system epss
scoring_elements 0.77748
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2328
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2328
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2328
4
reference_url http://www.securitytracker.com/id/1035010
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035010
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-2328
reference_id CVE-2016-2328
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-2328
7
reference_url https://security.gentoo.org/glsa/201606-09
reference_id GLSA-201606-09
reference_type
scores
url https://security.gentoo.org/glsa/201606-09
fixed_packages
0
url pkg:apk/alpine/ffmpeg@2.8.11-r0?arch=x86_64&distroversion=v3.3&reponame=main
purl pkg:apk/alpine/ffmpeg@2.8.11-r0?arch=x86_64&distroversion=v3.3&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ffmpeg@2.8.11-r0%3Farch=x86_64&distroversion=v3.3&reponame=main
aliases CVE-2016-2328
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fpby-s5k4-ybg1
4
url VCID-fy4j-u18p-83f5
vulnerability_id VCID-fy4j-u18p-83f5
summary
Multiple vulnerabilities have been found in FFmpeg, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7905
reference_id
reference_type
scores
0
value 0.00538
scoring_system epss
scoring_elements 0.67472
published_at 2026-04-01T12:55:00Z
1
value 0.00538
scoring_system epss
scoring_elements 0.67508
published_at 2026-04-07T12:55:00Z
2
value 0.00538
scoring_system epss
scoring_elements 0.6753
published_at 2026-04-04T12:55:00Z
3
value 0.00538
scoring_system epss
scoring_elements 0.6756
published_at 2026-04-08T12:55:00Z
4
value 0.00538
scoring_system epss
scoring_elements 0.67574
published_at 2026-04-09T12:55:00Z
5
value 0.00538
scoring_system epss
scoring_elements 0.67596
published_at 2026-04-11T12:55:00Z
6
value 0.00538
scoring_system epss
scoring_elements 0.67583
published_at 2026-04-12T12:55:00Z
7
value 0.00538
scoring_system epss
scoring_elements 0.6755
published_at 2026-04-13T12:55:00Z
8
value 0.00538
scoring_system epss
scoring_elements 0.67585
published_at 2026-04-16T12:55:00Z
9
value 0.00538
scoring_system epss
scoring_elements 0.67597
published_at 2026-04-18T12:55:00Z
10
value 0.00538
scoring_system epss
scoring_elements 0.67576
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7905
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7905
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7905
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840434
reference_id 840434
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840434
3
reference_url https://security.gentoo.org/glsa/201701-71
reference_id GLSA-201701-71
reference_type
scores
url https://security.gentoo.org/glsa/201701-71
fixed_packages
0
url pkg:apk/alpine/ffmpeg@2.8.11-r0?arch=x86_64&distroversion=v3.3&reponame=main
purl pkg:apk/alpine/ffmpeg@2.8.11-r0?arch=x86_64&distroversion=v3.3&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ffmpeg@2.8.11-r0%3Farch=x86_64&distroversion=v3.3&reponame=main
aliases CVE-2016-7905
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fy4j-u18p-83f5
5
url VCID-gqfr-j8ju-73fh
vulnerability_id VCID-gqfr-j8ju-73fh
summary
Multiple vulnerabilities have been found in FFmpeg, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7562
reference_id
reference_type
scores
0
value 0.00634
scoring_system epss
scoring_elements 0.7032
published_at 2026-04-01T12:55:00Z
1
value 0.00634
scoring_system epss
scoring_elements 0.70332
published_at 2026-04-02T12:55:00Z
2
value 0.00634
scoring_system epss
scoring_elements 0.70349
published_at 2026-04-04T12:55:00Z
3
value 0.00634
scoring_system epss
scoring_elements 0.70327
published_at 2026-04-07T12:55:00Z
4
value 0.00634
scoring_system epss
scoring_elements 0.70372
published_at 2026-04-08T12:55:00Z
5
value 0.00634
scoring_system epss
scoring_elements 0.70387
published_at 2026-04-09T12:55:00Z
6
value 0.00634
scoring_system epss
scoring_elements 0.70411
published_at 2026-04-11T12:55:00Z
7
value 0.00634
scoring_system epss
scoring_elements 0.70395
published_at 2026-04-12T12:55:00Z
8
value 0.00634
scoring_system epss
scoring_elements 0.70381
published_at 2026-04-13T12:55:00Z
9
value 0.00634
scoring_system epss
scoring_elements 0.70424
published_at 2026-04-16T12:55:00Z
10
value 0.00634
scoring_system epss
scoring_elements 0.70433
published_at 2026-04-18T12:55:00Z
11
value 0.00634
scoring_system epss
scoring_elements 0.70413
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7562
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7562
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840434
reference_id 840434
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840434
3
reference_url https://security.gentoo.org/glsa/201701-71
reference_id GLSA-201701-71
reference_type
scores
url https://security.gentoo.org/glsa/201701-71
fixed_packages
0
url pkg:apk/alpine/ffmpeg@2.8.11-r0?arch=x86_64&distroversion=v3.3&reponame=main
purl pkg:apk/alpine/ffmpeg@2.8.11-r0?arch=x86_64&distroversion=v3.3&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ffmpeg@2.8.11-r0%3Farch=x86_64&distroversion=v3.3&reponame=main
aliases CVE-2016-7562
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gqfr-j8ju-73fh
6
url VCID-j1gj-mw7k-2ub9
vulnerability_id VCID-j1gj-mw7k-2ub9
summary
Multiple vulnerabilities have been found in FFmpeg, the worst of
    which could lead to arbitrary code execution or Denial of Service
    condition.
references
0
reference_url http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=0aada30510d809bccfd539a90ea37b61188f2cb4
reference_id
reference_type
scores
url http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=0aada30510d809bccfd539a90ea37b61188f2cb4
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2213
reference_id
reference_type
scores
0
value 0.00405
scoring_system epss
scoring_elements 0.61042
published_at 2026-04-21T12:55:00Z
1
value 0.00405
scoring_system epss
scoring_elements 0.61058
published_at 2026-04-18T12:55:00Z
2
value 0.00405
scoring_system epss
scoring_elements 0.60893
published_at 2026-04-01T12:55:00Z
3
value 0.00405
scoring_system epss
scoring_elements 0.60965
published_at 2026-04-02T12:55:00Z
4
value 0.00405
scoring_system epss
scoring_elements 0.60994
published_at 2026-04-04T12:55:00Z
5
value 0.00405
scoring_system epss
scoring_elements 0.60959
published_at 2026-04-07T12:55:00Z
6
value 0.00405
scoring_system epss
scoring_elements 0.61007
published_at 2026-04-08T12:55:00Z
7
value 0.00405
scoring_system epss
scoring_elements 0.61023
published_at 2026-04-09T12:55:00Z
8
value 0.00405
scoring_system epss
scoring_elements 0.61045
published_at 2026-04-11T12:55:00Z
9
value 0.00405
scoring_system epss
scoring_elements 0.6103
published_at 2026-04-12T12:55:00Z
10
value 0.00405
scoring_system epss
scoring_elements 0.61011
published_at 2026-04-13T12:55:00Z
11
value 0.00405
scoring_system epss
scoring_elements 0.61052
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2213
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2213
3
reference_url http://www.securitytracker.com/id/1034923
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034923
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-2213
reference_id CVE-2016-2213
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-2213
6
reference_url https://security.gentoo.org/glsa/201606-09
reference_id GLSA-201606-09
reference_type
scores
url https://security.gentoo.org/glsa/201606-09
fixed_packages
0
url pkg:apk/alpine/ffmpeg@2.8.11-r0?arch=x86_64&distroversion=v3.3&reponame=main
purl pkg:apk/alpine/ffmpeg@2.8.11-r0?arch=x86_64&distroversion=v3.3&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ffmpeg@2.8.11-r0%3Farch=x86_64&distroversion=v3.3&reponame=main
aliases CVE-2016-2213
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j1gj-mw7k-2ub9
7
url VCID-jktw-kqvr-r7h8
vulnerability_id VCID-jktw-kqvr-r7h8
summary
Multiple vulnerabilities have been found in FFmpeg, the worst of
    which could lead to arbitrary code execution or Denial of Service
    condition.
references
0
reference_url http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=89f464e9c229006e16f6bb5403c5529fdd0a9edd
reference_id
reference_type
scores
url http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=89f464e9c229006e16f6bb5403c5529fdd0a9edd
1
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00129.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00129.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2329
reference_id
reference_type
scores
0
value 0.0116
scoring_system epss
scoring_elements 0.78611
published_at 2026-04-21T12:55:00Z
1
value 0.0116
scoring_system epss
scoring_elements 0.78617
published_at 2026-04-16T12:55:00Z
2
value 0.0116
scoring_system epss
scoring_elements 0.78539
published_at 2026-04-01T12:55:00Z
3
value 0.0116
scoring_system epss
scoring_elements 0.78546
published_at 2026-04-02T12:55:00Z
4
value 0.0116
scoring_system epss
scoring_elements 0.78576
published_at 2026-04-04T12:55:00Z
5
value 0.0116
scoring_system epss
scoring_elements 0.78558
published_at 2026-04-07T12:55:00Z
6
value 0.0116
scoring_system epss
scoring_elements 0.78585
published_at 2026-04-08T12:55:00Z
7
value 0.0116
scoring_system epss
scoring_elements 0.78591
published_at 2026-04-09T12:55:00Z
8
value 0.0116
scoring_system epss
scoring_elements 0.78615
published_at 2026-04-18T12:55:00Z
9
value 0.0116
scoring_system epss
scoring_elements 0.78597
published_at 2026-04-12T12:55:00Z
10
value 0.0116
scoring_system epss
scoring_elements 0.78588
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2329
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2329
4
reference_url http://www.securityfocus.com/bid/84212
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/84212
5
reference_url http://www.securitytracker.com/id/1035010
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035010
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-2329
reference_id CVE-2016-2329
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-2329
9
reference_url https://security.gentoo.org/glsa/201606-09
reference_id GLSA-201606-09
reference_type
scores
url https://security.gentoo.org/glsa/201606-09
fixed_packages
0
url pkg:apk/alpine/ffmpeg@2.8.11-r0?arch=x86_64&distroversion=v3.3&reponame=main
purl pkg:apk/alpine/ffmpeg@2.8.11-r0?arch=x86_64&distroversion=v3.3&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ffmpeg@2.8.11-r0%3Farch=x86_64&distroversion=v3.3&reponame=main
aliases CVE-2016-2329
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jktw-kqvr-r7h8
8
url VCID-jrpc-5n1u-dygq
vulnerability_id VCID-jrpc-5n1u-dygq
summary
Multiple vulnerabilities have been found in FFmpeg, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7450
reference_id
reference_type
scores
0
value 0.00221
scoring_system epss
scoring_elements 0.44678
published_at 2026-04-01T12:55:00Z
1
value 0.00221
scoring_system epss
scoring_elements 0.44758
published_at 2026-04-12T12:55:00Z
2
value 0.00221
scoring_system epss
scoring_elements 0.44778
published_at 2026-04-04T12:55:00Z
3
value 0.00221
scoring_system epss
scoring_elements 0.44717
published_at 2026-04-07T12:55:00Z
4
value 0.00221
scoring_system epss
scoring_elements 0.4477
published_at 2026-04-08T12:55:00Z
5
value 0.00221
scoring_system epss
scoring_elements 0.44773
published_at 2026-04-09T12:55:00Z
6
value 0.00221
scoring_system epss
scoring_elements 0.4479
published_at 2026-04-11T12:55:00Z
7
value 0.00221
scoring_system epss
scoring_elements 0.4476
published_at 2026-04-13T12:55:00Z
8
value 0.00221
scoring_system epss
scoring_elements 0.44814
published_at 2026-04-16T12:55:00Z
9
value 0.00221
scoring_system epss
scoring_elements 0.44806
published_at 2026-04-18T12:55:00Z
10
value 0.00221
scoring_system epss
scoring_elements 0.44737
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7450
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7450
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7450
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840434
reference_id 840434
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840434
3
reference_url https://security.gentoo.org/glsa/201701-71
reference_id GLSA-201701-71
reference_type
scores
url https://security.gentoo.org/glsa/201701-71
fixed_packages
0
url pkg:apk/alpine/ffmpeg@2.8.11-r0?arch=x86_64&distroversion=v3.3&reponame=main
purl pkg:apk/alpine/ffmpeg@2.8.11-r0?arch=x86_64&distroversion=v3.3&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ffmpeg@2.8.11-r0%3Farch=x86_64&distroversion=v3.3&reponame=main
aliases CVE-2016-7450
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jrpc-5n1u-dygq
9
url VCID-mfbv-npxq-fbb7
vulnerability_id VCID-mfbv-npxq-fbb7
summary
Multiple vulnerabilities have been found in FFmpeg, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7122
reference_id
reference_type
scores
0
value 0.00186
scoring_system epss
scoring_elements 0.40388
published_at 2026-04-01T12:55:00Z
1
value 0.00186
scoring_system epss
scoring_elements 0.40475
published_at 2026-04-02T12:55:00Z
2
value 0.00186
scoring_system epss
scoring_elements 0.40501
published_at 2026-04-04T12:55:00Z
3
value 0.00186
scoring_system epss
scoring_elements 0.40424
published_at 2026-04-07T12:55:00Z
4
value 0.00186
scoring_system epss
scoring_elements 0.40474
published_at 2026-04-08T12:55:00Z
5
value 0.00186
scoring_system epss
scoring_elements 0.40485
published_at 2026-04-09T12:55:00Z
6
value 0.00186
scoring_system epss
scoring_elements 0.40506
published_at 2026-04-11T12:55:00Z
7
value 0.00186
scoring_system epss
scoring_elements 0.40469
published_at 2026-04-12T12:55:00Z
8
value 0.00186
scoring_system epss
scoring_elements 0.4045
published_at 2026-04-13T12:55:00Z
9
value 0.00186
scoring_system epss
scoring_elements 0.40497
published_at 2026-04-16T12:55:00Z
10
value 0.00186
scoring_system epss
scoring_elements 0.40466
published_at 2026-04-18T12:55:00Z
11
value 0.00186
scoring_system epss
scoring_elements 0.4039
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7122
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7122
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7122
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840434
reference_id 840434
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840434
3
reference_url https://security.gentoo.org/glsa/201701-71
reference_id GLSA-201701-71
reference_type
scores
url https://security.gentoo.org/glsa/201701-71
fixed_packages
0
url pkg:apk/alpine/ffmpeg@2.8.11-r0?arch=x86_64&distroversion=v3.3&reponame=main
purl pkg:apk/alpine/ffmpeg@2.8.11-r0?arch=x86_64&distroversion=v3.3&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ffmpeg@2.8.11-r0%3Farch=x86_64&distroversion=v3.3&reponame=main
aliases CVE-2016-7122
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mfbv-npxq-fbb7
10
url VCID-tsrj-t3se-2fbw
vulnerability_id VCID-tsrj-t3se-2fbw
summary Heap-based buffer overflow in libavformat/http.c in FFmpeg before 2.8.10, 3.0.x before 3.0.5, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 allows remote web servers to execute arbitrary code via a negative chunk size in an HTTP response.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-10190
reference_id
reference_type
scores
0
value 0.10189
scoring_system epss
scoring_elements 0.93097
published_at 2026-04-01T12:55:00Z
1
value 0.10189
scoring_system epss
scoring_elements 0.93107
published_at 2026-04-02T12:55:00Z
2
value 0.10189
scoring_system epss
scoring_elements 0.9311
published_at 2026-04-04T12:55:00Z
3
value 0.10189
scoring_system epss
scoring_elements 0.93109
published_at 2026-04-07T12:55:00Z
4
value 0.10189
scoring_system epss
scoring_elements 0.93118
published_at 2026-04-08T12:55:00Z
5
value 0.10189
scoring_system epss
scoring_elements 0.93122
published_at 2026-04-09T12:55:00Z
6
value 0.10189
scoring_system epss
scoring_elements 0.93128
published_at 2026-04-11T12:55:00Z
7
value 0.10189
scoring_system epss
scoring_elements 0.93125
published_at 2026-04-12T12:55:00Z
8
value 0.10189
scoring_system epss
scoring_elements 0.93127
published_at 2026-04-13T12:55:00Z
9
value 0.10189
scoring_system epss
scoring_elements 0.93144
published_at 2026-04-16T12:55:00Z
10
value 0.10189
scoring_system epss
scoring_elements 0.93148
published_at 2026-04-18T12:55:00Z
11
value 0.10189
scoring_system epss
scoring_elements 0.93155
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-10190
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10190
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10190
fixed_packages
0
url pkg:apk/alpine/ffmpeg@2.8.11-r0?arch=x86_64&distroversion=v3.3&reponame=main
purl pkg:apk/alpine/ffmpeg@2.8.11-r0?arch=x86_64&distroversion=v3.3&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ffmpeg@2.8.11-r0%3Farch=x86_64&distroversion=v3.3&reponame=main
aliases CVE-2016-10190
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tsrj-t3se-2fbw
11
url VCID-ud3h-b3k7-dkd3
vulnerability_id VCID-ud3h-b3k7-dkd3
summary
Multiple vulnerabilities have been found in FFmpeg, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7785
reference_id
reference_type
scores
0
value 0.00276
scoring_system epss
scoring_elements 0.50938
published_at 2026-04-01T12:55:00Z
1
value 0.00276
scoring_system epss
scoring_elements 0.50992
published_at 2026-04-02T12:55:00Z
2
value 0.00276
scoring_system epss
scoring_elements 0.51017
published_at 2026-04-04T12:55:00Z
3
value 0.00276
scoring_system epss
scoring_elements 0.50975
published_at 2026-04-07T12:55:00Z
4
value 0.00276
scoring_system epss
scoring_elements 0.51032
published_at 2026-04-13T12:55:00Z
5
value 0.00276
scoring_system epss
scoring_elements 0.51028
published_at 2026-04-09T12:55:00Z
6
value 0.00276
scoring_system epss
scoring_elements 0.51071
published_at 2026-04-11T12:55:00Z
7
value 0.00276
scoring_system epss
scoring_elements 0.51049
published_at 2026-04-12T12:55:00Z
8
value 0.00276
scoring_system epss
scoring_elements 0.5107
published_at 2026-04-16T12:55:00Z
9
value 0.00276
scoring_system epss
scoring_elements 0.51076
published_at 2026-04-18T12:55:00Z
10
value 0.00276
scoring_system epss
scoring_elements 0.51053
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7785
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7785
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7785
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840434
reference_id 840434
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840434
3
reference_url https://security.gentoo.org/glsa/201701-71
reference_id GLSA-201701-71
reference_type
scores
url https://security.gentoo.org/glsa/201701-71
fixed_packages
0
url pkg:apk/alpine/ffmpeg@2.8.11-r0?arch=x86_64&distroversion=v3.3&reponame=main
purl pkg:apk/alpine/ffmpeg@2.8.11-r0?arch=x86_64&distroversion=v3.3&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ffmpeg@2.8.11-r0%3Farch=x86_64&distroversion=v3.3&reponame=main
aliases CVE-2016-7785
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ud3h-b3k7-dkd3
12
url VCID-ujdm-ubfw-57bs
vulnerability_id VCID-ujdm-ubfw-57bs
summary The zlib_refill function in libavformat/swfdec.c in FFmpeg before 3.1.3 allows remote attackers to cause an infinite loop denial of service via a crafted SWF file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6881
reference_id
reference_type
scores
0
value 0.00435
scoring_system epss
scoring_elements 0.62819
published_at 2026-04-01T12:55:00Z
1
value 0.00435
scoring_system epss
scoring_elements 0.62876
published_at 2026-04-02T12:55:00Z
2
value 0.00435
scoring_system epss
scoring_elements 0.62906
published_at 2026-04-04T12:55:00Z
3
value 0.00435
scoring_system epss
scoring_elements 0.6287
published_at 2026-04-07T12:55:00Z
4
value 0.00435
scoring_system epss
scoring_elements 0.62921
published_at 2026-04-08T12:55:00Z
5
value 0.00435
scoring_system epss
scoring_elements 0.62937
published_at 2026-04-09T12:55:00Z
6
value 0.00435
scoring_system epss
scoring_elements 0.62955
published_at 2026-04-11T12:55:00Z
7
value 0.00435
scoring_system epss
scoring_elements 0.62944
published_at 2026-04-12T12:55:00Z
8
value 0.00435
scoring_system epss
scoring_elements 0.62922
published_at 2026-04-13T12:55:00Z
9
value 0.00435
scoring_system epss
scoring_elements 0.62962
published_at 2026-04-16T12:55:00Z
10
value 0.00435
scoring_system epss
scoring_elements 0.6297
published_at 2026-04-18T12:55:00Z
11
value 0.00435
scoring_system epss
scoring_elements 0.62949
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6881
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6881
fixed_packages
0
url pkg:apk/alpine/ffmpeg@2.8.11-r0?arch=x86_64&distroversion=v3.3&reponame=main
purl pkg:apk/alpine/ffmpeg@2.8.11-r0?arch=x86_64&distroversion=v3.3&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ffmpeg@2.8.11-r0%3Farch=x86_64&distroversion=v3.3&reponame=main
aliases CVE-2016-6881
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ujdm-ubfw-57bs
13
url VCID-vka8-kexr-g7ej
vulnerability_id VCID-vka8-kexr-g7ej
summary Heap-based buffer overflow in ffserver.c in FFmpeg before 2.8.10, 3.0.x before 3.0.5, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 allows remote attackers to execute arbitrary code by leveraging failure to check chunk size.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-10192
reference_id
reference_type
scores
0
value 0.04839
scoring_system epss
scoring_elements 0.89539
published_at 2026-04-18T12:55:00Z
1
value 0.04839
scoring_system epss
scoring_elements 0.89536
published_at 2026-04-21T12:55:00Z
2
value 0.05544
scoring_system epss
scoring_elements 0.90239
published_at 2026-04-04T12:55:00Z
3
value 0.05544
scoring_system epss
scoring_elements 0.90243
published_at 2026-04-07T12:55:00Z
4
value 0.05544
scoring_system epss
scoring_elements 0.90259
published_at 2026-04-08T12:55:00Z
5
value 0.05544
scoring_system epss
scoring_elements 0.90265
published_at 2026-04-09T12:55:00Z
6
value 0.05544
scoring_system epss
scoring_elements 0.90223
published_at 2026-04-01T12:55:00Z
7
value 0.05544
scoring_system epss
scoring_elements 0.90273
published_at 2026-04-12T12:55:00Z
8
value 0.05544
scoring_system epss
scoring_elements 0.90267
published_at 2026-04-13T12:55:00Z
9
value 0.05544
scoring_system epss
scoring_elements 0.90284
published_at 2026-04-16T12:55:00Z
10
value 0.05544
scoring_system epss
scoring_elements 0.90274
published_at 2026-04-11T12:55:00Z
11
value 0.05544
scoring_system epss
scoring_elements 0.90226
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-10192
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10192
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10192
fixed_packages
0
url pkg:apk/alpine/ffmpeg@2.8.11-r0?arch=x86_64&distroversion=v3.3&reponame=main
purl pkg:apk/alpine/ffmpeg@2.8.11-r0?arch=x86_64&distroversion=v3.3&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ffmpeg@2.8.11-r0%3Farch=x86_64&distroversion=v3.3&reponame=main
aliases CVE-2016-10192
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vka8-kexr-g7ej
14
url VCID-wpwh-kftw-vyhp
vulnerability_id VCID-wpwh-kftw-vyhp
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5024.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5024.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5024
reference_id
reference_type
scores
0
value 0.00202
scoring_system epss
scoring_elements 0.42205
published_at 2026-04-01T12:55:00Z
1
value 0.00202
scoring_system epss
scoring_elements 0.42222
published_at 2026-04-21T12:55:00Z
2
value 0.00202
scoring_system epss
scoring_elements 0.42318
published_at 2026-04-16T12:55:00Z
3
value 0.00202
scoring_system epss
scoring_elements 0.42294
published_at 2026-04-18T12:55:00Z
4
value 0.00202
scoring_system epss
scoring_elements 0.42281
published_at 2026-04-02T12:55:00Z
5
value 0.00202
scoring_system epss
scoring_elements 0.42309
published_at 2026-04-04T12:55:00Z
6
value 0.00202
scoring_system epss
scoring_elements 0.42251
published_at 2026-04-07T12:55:00Z
7
value 0.00202
scoring_system epss
scoring_elements 0.42302
published_at 2026-04-08T12:55:00Z
8
value 0.00202
scoring_system epss
scoring_elements 0.4231
published_at 2026-04-09T12:55:00Z
9
value 0.00202
scoring_system epss
scoring_elements 0.42332
published_at 2026-04-11T12:55:00Z
10
value 0.00202
scoring_system epss
scoring_elements 0.42296
published_at 2026-04-12T12:55:00Z
11
value 0.00202
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5024
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5006
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5007
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5008
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5009
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5010
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5011
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5012
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5013
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5014
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5014
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5015
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5016
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5017
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5018
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5019
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5020
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5021
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5022
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5023
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5024
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5025
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5026
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5027
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5027
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5028
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1416675
reference_id 1416675
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1416675
26
reference_url https://security.archlinux.org/ASA-201701-33
reference_id ASA-201701-33
reference_type
scores
url https://security.archlinux.org/ASA-201701-33
27
reference_url https://security.archlinux.org/ASA-201702-10
reference_id ASA-201702-10
reference_type
scores
url https://security.archlinux.org/ASA-201702-10
28
reference_url https://security.archlinux.org/AVG-156
reference_id AVG-156
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-156
29
reference_url https://security.archlinux.org/AVG-172
reference_id AVG-172
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-172
30
reference_url https://security.gentoo.org/glsa/201701-66
reference_id GLSA-201701-66
reference_type
scores
url https://security.gentoo.org/glsa/201701-66
31
reference_url https://security.gentoo.org/glsa/201705-05
reference_id GLSA-201705-05
reference_type
scores
url https://security.gentoo.org/glsa/201705-05
32
reference_url https://access.redhat.com/errata/RHSA-2017:0206
reference_id RHSA-2017:0206
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0206
33
reference_url https://usn.ubuntu.com/3180-1/
reference_id USN-3180-1
reference_type
scores
url https://usn.ubuntu.com/3180-1/
fixed_packages
0
url pkg:apk/alpine/ffmpeg@2.8.11-r0?arch=x86_64&distroversion=v3.3&reponame=main
purl pkg:apk/alpine/ffmpeg@2.8.11-r0?arch=x86_64&distroversion=v3.3&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ffmpeg@2.8.11-r0%3Farch=x86_64&distroversion=v3.3&reponame=main
aliases CVE-2017-5024
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wpwh-kftw-vyhp
15
url VCID-x9xw-3vku-3bbx
vulnerability_id VCID-x9xw-3vku-3bbx
summary
Multiple vulnerabilities have been found in FFmpeg, the worst of
    which could lead to arbitrary code execution or Denial of Service
    condition.
references
0
reference_url http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=03d83ba34b2070878909eae18dfac0f519503777
reference_id
reference_type
scores
url http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=03d83ba34b2070878909eae18dfac0f519503777
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2330
reference_id
reference_type
scores
0
value 0.00865
scoring_system epss
scoring_elements 0.75159
published_at 2026-04-18T12:55:00Z
1
value 0.00865
scoring_system epss
scoring_elements 0.75152
published_at 2026-04-16T12:55:00Z
2
value 0.00865
scoring_system epss
scoring_elements 0.75072
published_at 2026-04-01T12:55:00Z
3
value 0.00865
scoring_system epss
scoring_elements 0.75075
published_at 2026-04-02T12:55:00Z
4
value 0.00865
scoring_system epss
scoring_elements 0.75104
published_at 2026-04-04T12:55:00Z
5
value 0.00865
scoring_system epss
scoring_elements 0.75081
published_at 2026-04-07T12:55:00Z
6
value 0.00865
scoring_system epss
scoring_elements 0.75115
published_at 2026-04-13T12:55:00Z
7
value 0.00865
scoring_system epss
scoring_elements 0.75126
published_at 2026-04-12T12:55:00Z
8
value 0.00865
scoring_system epss
scoring_elements 0.75148
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2330
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2330
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2330
3
reference_url http://www.securityfocus.com/bid/84217
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/84217
4
reference_url http://www.securitytracker.com/id/1035010
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035010
5
reference_url http://www.ubuntu.com/usn/USN-2944-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2944-1
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-2330
reference_id CVE-2016-2330
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-2330
9
reference_url https://security.gentoo.org/glsa/201606-09
reference_id GLSA-201606-09
reference_type
scores
url https://security.gentoo.org/glsa/201606-09
10
reference_url https://usn.ubuntu.com/2944-1/
reference_id USN-2944-1
reference_type
scores
url https://usn.ubuntu.com/2944-1/
fixed_packages
0
url pkg:apk/alpine/ffmpeg@2.8.11-r0?arch=x86_64&distroversion=v3.3&reponame=main
purl pkg:apk/alpine/ffmpeg@2.8.11-r0?arch=x86_64&distroversion=v3.3&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ffmpeg@2.8.11-r0%3Farch=x86_64&distroversion=v3.3&reponame=main
aliases CVE-2016-2330
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x9xw-3vku-3bbx
16
url VCID-ysu4-93vf-q7gp
vulnerability_id VCID-ysu4-93vf-q7gp
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5025.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5025.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5025
reference_id
reference_type
scores
0
value 0.00354
scoring_system epss
scoring_elements 0.57641
published_at 2026-04-01T12:55:00Z
1
value 0.00354
scoring_system epss
scoring_elements 0.57755
published_at 2026-04-21T12:55:00Z
2
value 0.00354
scoring_system epss
scoring_elements 0.57781
published_at 2026-04-16T12:55:00Z
3
value 0.00354
scoring_system epss
scoring_elements 0.57779
published_at 2026-04-18T12:55:00Z
4
value 0.00354
scoring_system epss
scoring_elements 0.57726
published_at 2026-04-02T12:55:00Z
5
value 0.00354
scoring_system epss
scoring_elements 0.57748
published_at 2026-04-04T12:55:00Z
6
value 0.00354
scoring_system epss
scoring_elements 0.57721
published_at 2026-04-07T12:55:00Z
7
value 0.00354
scoring_system epss
scoring_elements 0.57776
published_at 2026-04-08T12:55:00Z
8
value 0.00354
scoring_system epss
scoring_elements 0.57778
published_at 2026-04-09T12:55:00Z
9
value 0.00354
scoring_system epss
scoring_elements 0.57794
published_at 2026-04-11T12:55:00Z
10
value 0.00354
scoring_system epss
scoring_elements 0.57772
published_at 2026-04-12T12:55:00Z
11
value 0.00354
scoring_system epss
scoring_elements 0.57752
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5025
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5006
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5007
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5008
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5009
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5010
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5011
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5012
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5013
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5014
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5014
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5015
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5016
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5017
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5018
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5019
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5020
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5021
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5022
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5023
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5024
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5025
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5026
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5027
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5027
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5028
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1416676
reference_id 1416676
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1416676
26
reference_url https://security.archlinux.org/ASA-201701-33
reference_id ASA-201701-33
reference_type
scores
url https://security.archlinux.org/ASA-201701-33
27
reference_url https://security.archlinux.org/ASA-201702-10
reference_id ASA-201702-10
reference_type
scores
url https://security.archlinux.org/ASA-201702-10
28
reference_url https://security.archlinux.org/AVG-156
reference_id AVG-156
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-156
29
reference_url https://security.archlinux.org/AVG-172
reference_id AVG-172
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-172
30
reference_url https://security.gentoo.org/glsa/201701-66
reference_id GLSA-201701-66
reference_type
scores
url https://security.gentoo.org/glsa/201701-66
31
reference_url https://security.gentoo.org/glsa/201705-05
reference_id GLSA-201705-05
reference_type
scores
url https://security.gentoo.org/glsa/201705-05
32
reference_url https://access.redhat.com/errata/RHSA-2017:0206
reference_id RHSA-2017:0206
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0206
33
reference_url https://usn.ubuntu.com/3180-1/
reference_id USN-3180-1
reference_type
scores
url https://usn.ubuntu.com/3180-1/
fixed_packages
0
url pkg:apk/alpine/ffmpeg@2.8.11-r0?arch=x86_64&distroversion=v3.3&reponame=main
purl pkg:apk/alpine/ffmpeg@2.8.11-r0?arch=x86_64&distroversion=v3.3&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ffmpeg@2.8.11-r0%3Farch=x86_64&distroversion=v3.3&reponame=main
aliases CVE-2017-5025
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ysu4-93vf-q7gp
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/ffmpeg@2.8.11-r0%3Farch=x86_64&distroversion=v3.3&reponame=main