Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/aom@3.12.1-1?distro=trixie
Typedeb
Namespacedebian
Nameaom
Version3.12.1-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version3.13.1-2
Latest_non_vulnerable_version3.13.1-2
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-42kw-yczz-q7f9
vulnerability_id VCID-42kw-yczz-q7f9
summary Multiple vulnerabilities have been discovered in libaom, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30474
reference_id
reference_type
scores
0
value 0.00172
scoring_system epss
scoring_elements 0.38524
published_at 2026-04-13T12:55:00Z
1
value 0.00172
scoring_system epss
scoring_elements 0.3855
published_at 2026-04-12T12:55:00Z
2
value 0.00172
scoring_system epss
scoring_elements 0.38496
published_at 2026-04-01T12:55:00Z
3
value 0.00172
scoring_system epss
scoring_elements 0.38632
published_at 2026-04-02T12:55:00Z
4
value 0.00172
scoring_system epss
scoring_elements 0.38656
published_at 2026-04-04T12:55:00Z
5
value 0.00172
scoring_system epss
scoring_elements 0.38519
published_at 2026-04-07T12:55:00Z
6
value 0.00172
scoring_system epss
scoring_elements 0.3857
published_at 2026-04-08T12:55:00Z
7
value 0.00172
scoring_system epss
scoring_elements 0.38578
published_at 2026-04-09T12:55:00Z
8
value 0.00172
scoring_system epss
scoring_elements 0.38589
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30474
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36130
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36130
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36133
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36135
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30473
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30474
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30475
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://security.archlinux.org/AVG-1925
reference_id AVG-1925
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1925
10
reference_url https://security.gentoo.org/glsa/202401-32
reference_id GLSA-202401-32
reference_type
scores
url https://security.gentoo.org/glsa/202401-32
11
reference_url https://usn.ubuntu.com/6447-1/
reference_id USN-6447-1
reference_type
scores
url https://usn.ubuntu.com/6447-1/
fixed_packages
0
url pkg:deb/debian/aom@1.0.0.errata1-3%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/aom@1.0.0.errata1-3%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5d1t-g3nx-5fd6
1
vulnerability VCID-5xn1-ucsu-ufbh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@1.0.0.errata1-3%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/aom@3.2.0-1?distro=trixie
purl pkg:deb/debian/aom@3.2.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.2.0-1%3Fdistro=trixie
2
url pkg:deb/debian/aom@3.6.0-1%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/aom@3.6.0-1%2Bdeb12u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5xn1-ucsu-ufbh
1
vulnerability VCID-em18-qcj8-dfgj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.6.0-1%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/aom@3.12.1-1?distro=trixie
purl pkg:deb/debian/aom@3.12.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.12.1-1%3Fdistro=trixie
4
url pkg:deb/debian/aom@3.13.1-2?distro=trixie
purl pkg:deb/debian/aom@3.13.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.13.1-2%3Fdistro=trixie
aliases CVE-2021-30474
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-42kw-yczz-q7f9
1
url VCID-5d1t-g3nx-5fd6
vulnerability_id VCID-5d1t-g3nx-5fd6
summary In extend_frame_lowbd of restoration.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-150780418
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-0478
reference_id
reference_type
scores
0
value 0.00056
scoring_system epss
scoring_elements 0.17559
published_at 2026-04-01T12:55:00Z
1
value 0.00056
scoring_system epss
scoring_elements 0.17722
published_at 2026-04-02T12:55:00Z
2
value 0.00056
scoring_system epss
scoring_elements 0.17769
published_at 2026-04-04T12:55:00Z
3
value 0.00056
scoring_system epss
scoring_elements 0.17496
published_at 2026-04-07T12:55:00Z
4
value 0.00056
scoring_system epss
scoring_elements 0.17585
published_at 2026-04-08T12:55:00Z
5
value 0.00056
scoring_system epss
scoring_elements 0.17647
published_at 2026-04-09T12:55:00Z
6
value 0.00056
scoring_system epss
scoring_elements 0.17665
published_at 2026-04-11T12:55:00Z
7
value 0.00056
scoring_system epss
scoring_elements 0.17619
published_at 2026-04-12T12:55:00Z
8
value 0.00056
scoring_system epss
scoring_elements 0.17566
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-0478
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0478
fixed_packages
0
url pkg:deb/debian/aom@1.0.0.errata1.avif-1?distro=trixie
purl pkg:deb/debian/aom@1.0.0.errata1.avif-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@1.0.0.errata1.avif-1%3Fdistro=trixie
1
url pkg:deb/debian/aom@3.6.0-1%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/aom@3.6.0-1%2Bdeb12u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5xn1-ucsu-ufbh
1
vulnerability VCID-em18-qcj8-dfgj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.6.0-1%252Bdeb12u2%3Fdistro=trixie
2
url pkg:deb/debian/aom@3.12.1-1?distro=trixie
purl pkg:deb/debian/aom@3.12.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.12.1-1%3Fdistro=trixie
3
url pkg:deb/debian/aom@3.13.1-2?distro=trixie
purl pkg:deb/debian/aom@3.13.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.13.1-2%3Fdistro=trixie
aliases CVE-2020-0478
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5d1t-g3nx-5fd6
2
url VCID-5xn1-ucsu-ufbh
vulnerability_id VCID-5xn1-ucsu-ufbh
summary aom: heap-buffer-overflow on frame size change
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6879.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6879.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6879
reference_id
reference_type
scores
0
value 0.00155
scoring_system epss
scoring_elements 0.36353
published_at 2026-04-02T12:55:00Z
1
value 0.00155
scoring_system epss
scoring_elements 0.36386
published_at 2026-04-04T12:55:00Z
2
value 0.00155
scoring_system epss
scoring_elements 0.3622
published_at 2026-04-07T12:55:00Z
3
value 0.00155
scoring_system epss
scoring_elements 0.36269
published_at 2026-04-08T12:55:00Z
4
value 0.00155
scoring_system epss
scoring_elements 0.36292
published_at 2026-04-09T12:55:00Z
5
value 0.00155
scoring_system epss
scoring_elements 0.36297
published_at 2026-04-11T12:55:00Z
6
value 0.00155
scoring_system epss
scoring_elements 0.3626
published_at 2026-04-12T12:55:00Z
7
value 0.00155
scoring_system epss
scoring_elements 0.36236
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6879
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6879
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2256053
reference_id 2256053
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2256053
fixed_packages
0
url pkg:deb/debian/aom@3.7.1-1?distro=trixie
purl pkg:deb/debian/aom@3.7.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.7.1-1%3Fdistro=trixie
1
url pkg:deb/debian/aom@3.12.1-1?distro=trixie
purl pkg:deb/debian/aom@3.12.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.12.1-1%3Fdistro=trixie
2
url pkg:deb/debian/aom@3.13.1-2?distro=trixie
purl pkg:deb/debian/aom@3.13.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.13.1-2%3Fdistro=trixie
aliases CVE-2023-6879
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5xn1-ucsu-ufbh
3
url VCID-d9tp-unv2-5udk
vulnerability_id VCID-d9tp-unv2-5udk
summary Multiple vulnerabilities have been discovered in libaom, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-36131
reference_id
reference_type
scores
0
value 0.00168
scoring_system epss
scoring_elements 0.37907
published_at 2026-04-13T12:55:00Z
1
value 0.00168
scoring_system epss
scoring_elements 0.37825
published_at 2026-04-01T12:55:00Z
2
value 0.00168
scoring_system epss
scoring_elements 0.37986
published_at 2026-04-02T12:55:00Z
3
value 0.00168
scoring_system epss
scoring_elements 0.38011
published_at 2026-04-04T12:55:00Z
4
value 0.00168
scoring_system epss
scoring_elements 0.3789
published_at 2026-04-07T12:55:00Z
5
value 0.00168
scoring_system epss
scoring_elements 0.37941
published_at 2026-04-08T12:55:00Z
6
value 0.00168
scoring_system epss
scoring_elements 0.37953
published_at 2026-04-09T12:55:00Z
7
value 0.00168
scoring_system epss
scoring_elements 0.37969
published_at 2026-04-11T12:55:00Z
8
value 0.00168
scoring_system epss
scoring_elements 0.37932
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-36131
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36130
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36130
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36133
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36135
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30473
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30474
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30475
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://security.gentoo.org/glsa/202401-32
reference_id GLSA-202401-32
reference_type
scores
url https://security.gentoo.org/glsa/202401-32
10
reference_url https://usn.ubuntu.com/6447-1/
reference_id USN-6447-1
reference_type
scores
url https://usn.ubuntu.com/6447-1/
fixed_packages
0
url pkg:deb/debian/aom@1.0.0.errata1-3%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/aom@1.0.0.errata1-3%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5d1t-g3nx-5fd6
1
vulnerability VCID-5xn1-ucsu-ufbh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@1.0.0.errata1-3%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/aom@3.2.0-1?distro=trixie
purl pkg:deb/debian/aom@3.2.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.2.0-1%3Fdistro=trixie
2
url pkg:deb/debian/aom@3.6.0-1%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/aom@3.6.0-1%2Bdeb12u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5xn1-ucsu-ufbh
1
vulnerability VCID-em18-qcj8-dfgj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.6.0-1%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/aom@3.12.1-1?distro=trixie
purl pkg:deb/debian/aom@3.12.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.12.1-1%3Fdistro=trixie
4
url pkg:deb/debian/aom@3.13.1-2?distro=trixie
purl pkg:deb/debian/aom@3.13.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.13.1-2%3Fdistro=trixie
aliases CVE-2020-36131
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d9tp-unv2-5udk
4
url VCID-ed5k-acd1-27hn
vulnerability_id VCID-ed5k-acd1-27hn
summary Multiple vulnerabilities have been discovered in libaom, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30475
reference_id
reference_type
scores
0
value 0.00212
scoring_system epss
scoring_elements 0.43753
published_at 2026-04-13T12:55:00Z
1
value 0.00212
scoring_system epss
scoring_elements 0.43769
published_at 2026-04-12T12:55:00Z
2
value 0.00212
scoring_system epss
scoring_elements 0.43715
published_at 2026-04-01T12:55:00Z
3
value 0.00212
scoring_system epss
scoring_elements 0.4377
published_at 2026-04-02T12:55:00Z
4
value 0.00212
scoring_system epss
scoring_elements 0.43794
published_at 2026-04-04T12:55:00Z
5
value 0.00212
scoring_system epss
scoring_elements 0.43727
published_at 2026-04-07T12:55:00Z
6
value 0.00212
scoring_system epss
scoring_elements 0.43778
published_at 2026-04-08T12:55:00Z
7
value 0.00212
scoring_system epss
scoring_elements 0.43781
published_at 2026-04-09T12:55:00Z
8
value 0.00212
scoring_system epss
scoring_elements 0.43801
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30475
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36130
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36130
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36133
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36135
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30473
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30474
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30475
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://security.archlinux.org/AVG-2039
reference_id AVG-2039
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2039
10
reference_url https://security.gentoo.org/glsa/202401-32
reference_id GLSA-202401-32
reference_type
scores
url https://security.gentoo.org/glsa/202401-32
11
reference_url https://usn.ubuntu.com/6447-1/
reference_id USN-6447-1
reference_type
scores
url https://usn.ubuntu.com/6447-1/
fixed_packages
0
url pkg:deb/debian/aom@1.0.0.errata1-3%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/aom@1.0.0.errata1-3%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5d1t-g3nx-5fd6
1
vulnerability VCID-5xn1-ucsu-ufbh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@1.0.0.errata1-3%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/aom@3.2.0-1?distro=trixie
purl pkg:deb/debian/aom@3.2.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.2.0-1%3Fdistro=trixie
2
url pkg:deb/debian/aom@3.6.0-1%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/aom@3.6.0-1%2Bdeb12u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5xn1-ucsu-ufbh
1
vulnerability VCID-em18-qcj8-dfgj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.6.0-1%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/aom@3.12.1-1?distro=trixie
purl pkg:deb/debian/aom@3.12.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.12.1-1%3Fdistro=trixie
4
url pkg:deb/debian/aom@3.13.1-2?distro=trixie
purl pkg:deb/debian/aom@3.13.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.13.1-2%3Fdistro=trixie
aliases CVE-2021-30475
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ed5k-acd1-27hn
5
url VCID-em18-qcj8-dfgj
vulnerability_id VCID-em18-qcj8-dfgj
summary AOMedia v3.0.0 to v3.5.0 was discovered to contain an invalid read memory access via the component assign_frame_buffer_p in av1/common/av1_common_int.h.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39616
reference_id
reference_type
scores
0
value 0.00089
scoring_system epss
scoring_elements 0.25209
published_at 2026-04-13T12:55:00Z
1
value 0.00089
scoring_system epss
scoring_elements 0.25364
published_at 2026-04-02T12:55:00Z
2
value 0.00089
scoring_system epss
scoring_elements 0.254
published_at 2026-04-04T12:55:00Z
3
value 0.00089
scoring_system epss
scoring_elements 0.25176
published_at 2026-04-07T12:55:00Z
4
value 0.00089
scoring_system epss
scoring_elements 0.25245
published_at 2026-04-08T12:55:00Z
5
value 0.00089
scoring_system epss
scoring_elements 0.2529
published_at 2026-04-09T12:55:00Z
6
value 0.00089
scoring_system epss
scoring_elements 0.25304
published_at 2026-04-11T12:55:00Z
7
value 0.00089
scoring_system epss
scoring_elements 0.25262
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39616
1
reference_url https://bugs.chromium.org/p/aomedia/issues/detail?id=3372#c3
reference_id detail?id=3372#c3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-02T13:24:51Z/
url https://bugs.chromium.org/p/aomedia/issues/detail?id=3372#c3
fixed_packages
0
url pkg:deb/debian/aom@0?distro=trixie
purl pkg:deb/debian/aom@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@0%3Fdistro=trixie
1
url pkg:deb/debian/aom@1.0.0.errata1-3%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/aom@1.0.0.errata1-3%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5d1t-g3nx-5fd6
1
vulnerability VCID-5xn1-ucsu-ufbh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@1.0.0.errata1-3%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/aom@3.7.0-1?distro=trixie
purl pkg:deb/debian/aom@3.7.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.7.0-1%3Fdistro=trixie
3
url pkg:deb/debian/aom@3.12.1-1?distro=trixie
purl pkg:deb/debian/aom@3.12.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.12.1-1%3Fdistro=trixie
4
url pkg:deb/debian/aom@3.13.1-2?distro=trixie
purl pkg:deb/debian/aom@3.13.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.13.1-2%3Fdistro=trixie
aliases CVE-2023-39616
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-em18-qcj8-dfgj
6
url VCID-ew9c-7ne9-uuhg
vulnerability_id VCID-ew9c-7ne9-uuhg
summary Multiple vulnerabilities have been discovered in libaom, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-36135
reference_id
reference_type
scores
0
value 0.00112
scoring_system epss
scoring_elements 0.29583
published_at 2026-04-13T12:55:00Z
1
value 0.00112
scoring_system epss
scoring_elements 0.29639
published_at 2026-04-01T12:55:00Z
2
value 0.00112
scoring_system epss
scoring_elements 0.29706
published_at 2026-04-02T12:55:00Z
3
value 0.00112
scoring_system epss
scoring_elements 0.29756
published_at 2026-04-04T12:55:00Z
4
value 0.00112
scoring_system epss
scoring_elements 0.29575
published_at 2026-04-07T12:55:00Z
5
value 0.00112
scoring_system epss
scoring_elements 0.29638
published_at 2026-04-08T12:55:00Z
6
value 0.00112
scoring_system epss
scoring_elements 0.29675
published_at 2026-04-09T12:55:00Z
7
value 0.00112
scoring_system epss
scoring_elements 0.29678
published_at 2026-04-11T12:55:00Z
8
value 0.00112
scoring_system epss
scoring_elements 0.29633
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-36135
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36130
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36130
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36133
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36135
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30473
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30474
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30475
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://security.gentoo.org/glsa/202401-32
reference_id GLSA-202401-32
reference_type
scores
url https://security.gentoo.org/glsa/202401-32
10
reference_url https://usn.ubuntu.com/6447-1/
reference_id USN-6447-1
reference_type
scores
url https://usn.ubuntu.com/6447-1/
fixed_packages
0
url pkg:deb/debian/aom@1.0.0.errata1-3%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/aom@1.0.0.errata1-3%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5d1t-g3nx-5fd6
1
vulnerability VCID-5xn1-ucsu-ufbh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@1.0.0.errata1-3%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/aom@3.2.0-1?distro=trixie
purl pkg:deb/debian/aom@3.2.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.2.0-1%3Fdistro=trixie
2
url pkg:deb/debian/aom@3.6.0-1%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/aom@3.6.0-1%2Bdeb12u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5xn1-ucsu-ufbh
1
vulnerability VCID-em18-qcj8-dfgj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.6.0-1%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/aom@3.12.1-1?distro=trixie
purl pkg:deb/debian/aom@3.12.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.12.1-1%3Fdistro=trixie
4
url pkg:deb/debian/aom@3.13.1-2?distro=trixie
purl pkg:deb/debian/aom@3.13.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.13.1-2%3Fdistro=trixie
aliases CVE-2020-36135
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ew9c-7ne9-uuhg
7
url VCID-f1s7-8k6q-cbbt
vulnerability_id VCID-f1s7-8k6q-cbbt
summary Multiple vulnerabilities have been discovered in libaom, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-36130
reference_id
reference_type
scores
0
value 0.00112
scoring_system epss
scoring_elements 0.29583
published_at 2026-04-13T12:55:00Z
1
value 0.00112
scoring_system epss
scoring_elements 0.29639
published_at 2026-04-01T12:55:00Z
2
value 0.00112
scoring_system epss
scoring_elements 0.29706
published_at 2026-04-02T12:55:00Z
3
value 0.00112
scoring_system epss
scoring_elements 0.29756
published_at 2026-04-04T12:55:00Z
4
value 0.00112
scoring_system epss
scoring_elements 0.29575
published_at 2026-04-07T12:55:00Z
5
value 0.00112
scoring_system epss
scoring_elements 0.29638
published_at 2026-04-08T12:55:00Z
6
value 0.00112
scoring_system epss
scoring_elements 0.29675
published_at 2026-04-09T12:55:00Z
7
value 0.00112
scoring_system epss
scoring_elements 0.29678
published_at 2026-04-11T12:55:00Z
8
value 0.00112
scoring_system epss
scoring_elements 0.29633
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-36130
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36130
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36130
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36133
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36135
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30473
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30474
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30475
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://security.gentoo.org/glsa/202401-32
reference_id GLSA-202401-32
reference_type
scores
url https://security.gentoo.org/glsa/202401-32
10
reference_url https://usn.ubuntu.com/6447-1/
reference_id USN-6447-1
reference_type
scores
url https://usn.ubuntu.com/6447-1/
fixed_packages
0
url pkg:deb/debian/aom@1.0.0.errata1-3%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/aom@1.0.0.errata1-3%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5d1t-g3nx-5fd6
1
vulnerability VCID-5xn1-ucsu-ufbh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@1.0.0.errata1-3%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/aom@3.2.0-1?distro=trixie
purl pkg:deb/debian/aom@3.2.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.2.0-1%3Fdistro=trixie
2
url pkg:deb/debian/aom@3.6.0-1%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/aom@3.6.0-1%2Bdeb12u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5xn1-ucsu-ufbh
1
vulnerability VCID-em18-qcj8-dfgj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.6.0-1%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/aom@3.12.1-1?distro=trixie
purl pkg:deb/debian/aom@3.12.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.12.1-1%3Fdistro=trixie
4
url pkg:deb/debian/aom@3.13.1-2?distro=trixie
purl pkg:deb/debian/aom@3.13.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.13.1-2%3Fdistro=trixie
aliases CVE-2020-36130
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f1s7-8k6q-cbbt
8
url VCID-m3v4-ezbn-c7hz
vulnerability_id VCID-m3v4-ezbn-c7hz
summary Multiple vulnerabilities have been discovered in libaom, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-36133
reference_id
reference_type
scores
0
value 0.00168
scoring_system epss
scoring_elements 0.37907
published_at 2026-04-13T12:55:00Z
1
value 0.00168
scoring_system epss
scoring_elements 0.37825
published_at 2026-04-01T12:55:00Z
2
value 0.00168
scoring_system epss
scoring_elements 0.37986
published_at 2026-04-02T12:55:00Z
3
value 0.00168
scoring_system epss
scoring_elements 0.38011
published_at 2026-04-04T12:55:00Z
4
value 0.00168
scoring_system epss
scoring_elements 0.3789
published_at 2026-04-07T12:55:00Z
5
value 0.00168
scoring_system epss
scoring_elements 0.37941
published_at 2026-04-08T12:55:00Z
6
value 0.00168
scoring_system epss
scoring_elements 0.37953
published_at 2026-04-09T12:55:00Z
7
value 0.00168
scoring_system epss
scoring_elements 0.37969
published_at 2026-04-11T12:55:00Z
8
value 0.00168
scoring_system epss
scoring_elements 0.37932
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-36133
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36130
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36130
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36133
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36135
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30473
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30474
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30475
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://security.gentoo.org/glsa/202401-32
reference_id GLSA-202401-32
reference_type
scores
url https://security.gentoo.org/glsa/202401-32
10
reference_url https://usn.ubuntu.com/6447-1/
reference_id USN-6447-1
reference_type
scores
url https://usn.ubuntu.com/6447-1/
fixed_packages
0
url pkg:deb/debian/aom@1.0.0.errata1-3%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/aom@1.0.0.errata1-3%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5d1t-g3nx-5fd6
1
vulnerability VCID-5xn1-ucsu-ufbh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@1.0.0.errata1-3%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/aom@3.2.0-1?distro=trixie
purl pkg:deb/debian/aom@3.2.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.2.0-1%3Fdistro=trixie
2
url pkg:deb/debian/aom@3.6.0-1%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/aom@3.6.0-1%2Bdeb12u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5xn1-ucsu-ufbh
1
vulnerability VCID-em18-qcj8-dfgj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.6.0-1%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/aom@3.12.1-1?distro=trixie
purl pkg:deb/debian/aom@3.12.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.12.1-1%3Fdistro=trixie
4
url pkg:deb/debian/aom@3.13.1-2?distro=trixie
purl pkg:deb/debian/aom@3.13.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.13.1-2%3Fdistro=trixie
aliases CVE-2020-36133
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m3v4-ezbn-c7hz
9
url VCID-pnux-7kf8-9uaq
vulnerability_id VCID-pnux-7kf8-9uaq
summary libaom: Integer overflow in internal function img_alloc_helper
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5171.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5171.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-5171
reference_id
reference_type
scores
0
value 0.00209
scoring_system epss
scoring_elements 0.43308
published_at 2026-04-13T12:55:00Z
1
value 0.00209
scoring_system epss
scoring_elements 0.43302
published_at 2026-04-02T12:55:00Z
2
value 0.00209
scoring_system epss
scoring_elements 0.43331
published_at 2026-04-04T12:55:00Z
3
value 0.00209
scoring_system epss
scoring_elements 0.43268
published_at 2026-04-07T12:55:00Z
4
value 0.00209
scoring_system epss
scoring_elements 0.4332
published_at 2026-04-08T12:55:00Z
5
value 0.00209
scoring_system epss
scoring_elements 0.43334
published_at 2026-04-09T12:55:00Z
6
value 0.00209
scoring_system epss
scoring_elements 0.43355
published_at 2026-04-11T12:55:00Z
7
value 0.00209
scoring_system epss
scoring_elements 0.43324
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-5171
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5171
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5171
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2292396
reference_id 2292396
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2292396
5
reference_url https://issues.chromium.org/issues/332382766
reference_id 332382766
reference_type
scores
0
value 10
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2024-06-07T17:15:17Z/
url https://issues.chromium.org/issues/332382766
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HYUEHZ35ZPY2EONVZCGO6LPT3AMLZCP/
reference_id 6HYUEHZ35ZPY2EONVZCGO6LPT3AMLZCP
reference_type
scores
0
value 10
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2024-06-07T17:15:17Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HYUEHZ35ZPY2EONVZCGO6LPT3AMLZCP/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U5NRNCEYS246CYGOR32MF7OGKWOWER22/
reference_id U5NRNCEYS246CYGOR32MF7OGKWOWER22
reference_type
scores
0
value 10
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2024-06-07T17:15:17Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U5NRNCEYS246CYGOR32MF7OGKWOWER22/
8
reference_url https://usn.ubuntu.com/6815-1/
reference_id USN-6815-1
reference_type
scores
url https://usn.ubuntu.com/6815-1/
9
reference_url https://usn.ubuntu.com/7397-1/
reference_id USN-7397-1
reference_type
scores
url https://usn.ubuntu.com/7397-1/
fixed_packages
0
url pkg:deb/debian/aom@1.0.0.errata1-3%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/aom@1.0.0.errata1-3%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5d1t-g3nx-5fd6
1
vulnerability VCID-5xn1-ucsu-ufbh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@1.0.0.errata1-3%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/aom@1.0.0.errata1-3%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/aom@1.0.0.errata1-3%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@1.0.0.errata1-3%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/aom@3.6.0-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/aom@3.6.0-1%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.6.0-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/aom@3.6.0-1%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/aom@3.6.0-1%2Bdeb12u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5xn1-ucsu-ufbh
1
vulnerability VCID-em18-qcj8-dfgj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.6.0-1%252Bdeb12u2%3Fdistro=trixie
4
url pkg:deb/debian/aom@3.8.2-3?distro=trixie
purl pkg:deb/debian/aom@3.8.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.8.2-3%3Fdistro=trixie
5
url pkg:deb/debian/aom@3.12.1-1?distro=trixie
purl pkg:deb/debian/aom@3.12.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.12.1-1%3Fdistro=trixie
6
url pkg:deb/debian/aom@3.13.1-2?distro=trixie
purl pkg:deb/debian/aom@3.13.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.13.1-2%3Fdistro=trixie
aliases CVE-2024-5171
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pnux-7kf8-9uaq
10
url VCID-s4pu-gycq-rbbw
vulnerability_id VCID-s4pu-gycq-rbbw
summary Multiple vulnerabilities have been discovered in libaom, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-36129
reference_id
reference_type
scores
0
value 0.00176
scoring_system epss
scoring_elements 0.39051
published_at 2026-04-13T12:55:00Z
1
value 0.00176
scoring_system epss
scoring_elements 0.389
published_at 2026-04-01T12:55:00Z
2
value 0.00176
scoring_system epss
scoring_elements 0.39087
published_at 2026-04-02T12:55:00Z
3
value 0.00176
scoring_system epss
scoring_elements 0.39107
published_at 2026-04-04T12:55:00Z
4
value 0.00176
scoring_system epss
scoring_elements 0.39026
published_at 2026-04-07T12:55:00Z
5
value 0.00176
scoring_system epss
scoring_elements 0.39081
published_at 2026-04-08T12:55:00Z
6
value 0.00176
scoring_system epss
scoring_elements 0.39097
published_at 2026-04-09T12:55:00Z
7
value 0.00176
scoring_system epss
scoring_elements 0.39109
published_at 2026-04-11T12:55:00Z
8
value 0.00176
scoring_system epss
scoring_elements 0.39071
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-36129
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://security.gentoo.org/glsa/202401-32
reference_id GLSA-202401-32
reference_type
scores
url https://security.gentoo.org/glsa/202401-32
fixed_packages
0
url pkg:deb/debian/aom@0?distro=trixie
purl pkg:deb/debian/aom@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@0%3Fdistro=trixie
1
url pkg:deb/debian/aom@1.0.0.errata1-3%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/aom@1.0.0.errata1-3%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5d1t-g3nx-5fd6
1
vulnerability VCID-5xn1-ucsu-ufbh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@1.0.0.errata1-3%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/aom@3.2.0-1?distro=trixie
purl pkg:deb/debian/aom@3.2.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.2.0-1%3Fdistro=trixie
3
url pkg:deb/debian/aom@3.6.0-1%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/aom@3.6.0-1%2Bdeb12u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5xn1-ucsu-ufbh
1
vulnerability VCID-em18-qcj8-dfgj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.6.0-1%252Bdeb12u2%3Fdistro=trixie
4
url pkg:deb/debian/aom@3.12.1-1?distro=trixie
purl pkg:deb/debian/aom@3.12.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.12.1-1%3Fdistro=trixie
5
url pkg:deb/debian/aom@3.13.1-2?distro=trixie
purl pkg:deb/debian/aom@3.13.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.13.1-2%3Fdistro=trixie
aliases CVE-2020-36129
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s4pu-gycq-rbbw
11
url VCID-ubxj-qpy9-sygk
vulnerability_id VCID-ubxj-qpy9-sygk
summary Multiple vulnerabilities have been discovered in libaom, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-36134
reference_id
reference_type
scores
0
value 0.00172
scoring_system epss
scoring_elements 0.38599
published_at 2026-04-13T12:55:00Z
1
value 0.00172
scoring_system epss
scoring_elements 0.38505
published_at 2026-04-01T12:55:00Z
2
value 0.00172
scoring_system epss
scoring_elements 0.3864
published_at 2026-04-02T12:55:00Z
3
value 0.00172
scoring_system epss
scoring_elements 0.38664
published_at 2026-04-11T12:55:00Z
4
value 0.00172
scoring_system epss
scoring_elements 0.38594
published_at 2026-04-07T12:55:00Z
5
value 0.00172
scoring_system epss
scoring_elements 0.38645
published_at 2026-04-08T12:55:00Z
6
value 0.00172
scoring_system epss
scoring_elements 0.38653
published_at 2026-04-09T12:55:00Z
7
value 0.00172
scoring_system epss
scoring_elements 0.38625
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-36134
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://security.gentoo.org/glsa/202401-32
reference_id GLSA-202401-32
reference_type
scores
url https://security.gentoo.org/glsa/202401-32
fixed_packages
0
url pkg:deb/debian/aom@0?distro=trixie
purl pkg:deb/debian/aom@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@0%3Fdistro=trixie
1
url pkg:deb/debian/aom@1.0.0.errata1-3%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/aom@1.0.0.errata1-3%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5d1t-g3nx-5fd6
1
vulnerability VCID-5xn1-ucsu-ufbh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@1.0.0.errata1-3%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/aom@3.6.0-1%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/aom@3.6.0-1%2Bdeb12u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5xn1-ucsu-ufbh
1
vulnerability VCID-em18-qcj8-dfgj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.6.0-1%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/aom@3.12.1-1?distro=trixie
purl pkg:deb/debian/aom@3.12.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.12.1-1%3Fdistro=trixie
4
url pkg:deb/debian/aom@3.13.1-2?distro=trixie
purl pkg:deb/debian/aom@3.13.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.13.1-2%3Fdistro=trixie
aliases CVE-2020-36134
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ubxj-qpy9-sygk
12
url VCID-ytsf-k9ep-17h3
vulnerability_id VCID-ytsf-k9ep-17h3
summary Multiple vulnerabilities have been discovered in libaom, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30473
reference_id
reference_type
scores
0
value 0.00247
scoring_system epss
scoring_elements 0.48017
published_at 2026-04-13T12:55:00Z
1
value 0.00247
scoring_system epss
scoring_elements 0.48006
published_at 2026-04-12T12:55:00Z
2
value 0.00247
scoring_system epss
scoring_elements 0.47949
published_at 2026-04-01T12:55:00Z
3
value 0.00247
scoring_system epss
scoring_elements 0.47988
published_at 2026-04-02T12:55:00Z
4
value 0.00247
scoring_system epss
scoring_elements 0.48009
published_at 2026-04-04T12:55:00Z
5
value 0.00247
scoring_system epss
scoring_elements 0.47958
published_at 2026-04-07T12:55:00Z
6
value 0.00247
scoring_system epss
scoring_elements 0.48011
published_at 2026-04-08T12:55:00Z
7
value 0.00247
scoring_system epss
scoring_elements 0.48005
published_at 2026-04-09T12:55:00Z
8
value 0.00247
scoring_system epss
scoring_elements 0.48029
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30473
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36130
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36130
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36133
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36135
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30473
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30474
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30475
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988211
reference_id 988211
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988211
10
reference_url https://security.archlinux.org/AVG-1925
reference_id AVG-1925
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1925
11
reference_url https://security.gentoo.org/glsa/202401-32
reference_id GLSA-202401-32
reference_type
scores
url https://security.gentoo.org/glsa/202401-32
12
reference_url https://usn.ubuntu.com/6447-1/
reference_id USN-6447-1
reference_type
scores
url https://usn.ubuntu.com/6447-1/
fixed_packages
0
url pkg:deb/debian/aom@1.0.0.errata1-3%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/aom@1.0.0.errata1-3%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5d1t-g3nx-5fd6
1
vulnerability VCID-5xn1-ucsu-ufbh
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@1.0.0.errata1-3%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/aom@3.2.0-1?distro=trixie
purl pkg:deb/debian/aom@3.2.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.2.0-1%3Fdistro=trixie
2
url pkg:deb/debian/aom@3.6.0-1%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/aom@3.6.0-1%2Bdeb12u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5xn1-ucsu-ufbh
1
vulnerability VCID-em18-qcj8-dfgj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.6.0-1%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/aom@3.12.1-1?distro=trixie
purl pkg:deb/debian/aom@3.12.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.12.1-1%3Fdistro=trixie
4
url pkg:deb/debian/aom@3.13.1-2?distro=trixie
purl pkg:deb/debian/aom@3.13.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.13.1-2%3Fdistro=trixie
aliases CVE-2021-30473
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ytsf-k9ep-17h3
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/aom@3.12.1-1%3Fdistro=trixie