Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/kodi@2:20.1%2Bdfsg-1?distro=trixie
Typedeb
Namespacedebian
Namekodi
Version2:20.1+dfsg-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2:21.2+dfsg-4
Latest_non_vulnerable_version2:21.3+dfsg-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1jy3-92d8-ebf3
vulnerability_id VCID-1jy3-92d8-ebf3
summary Buffer overflow vulnerability in Kodi xbmc up to 19.0, allows attackers to cause a denial of service due to improper length of values passed to istream.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-42917
reference_id
reference_type
scores
0
value 0.00266
scoring_system epss
scoring_elements 0.5011
published_at 2026-04-21T12:55:00Z
1
value 0.00266
scoring_system epss
scoring_elements 0.50105
published_at 2026-04-09T12:55:00Z
2
value 0.00266
scoring_system epss
scoring_elements 0.50122
published_at 2026-04-11T12:55:00Z
3
value 0.00266
scoring_system epss
scoring_elements 0.50096
published_at 2026-04-12T12:55:00Z
4
value 0.00266
scoring_system epss
scoring_elements 0.50093
published_at 2026-04-13T12:55:00Z
5
value 0.00266
scoring_system epss
scoring_elements 0.50138
published_at 2026-04-18T12:55:00Z
6
value 0.00266
scoring_system epss
scoring_elements 0.50045
published_at 2026-04-01T12:55:00Z
7
value 0.00266
scoring_system epss
scoring_elements 0.5008
published_at 2026-04-02T12:55:00Z
8
value 0.00266
scoring_system epss
scoring_elements 0.50107
published_at 2026-04-04T12:55:00Z
9
value 0.00266
scoring_system epss
scoring_elements 0.50057
published_at 2026-04-07T12:55:00Z
10
value 0.00266
scoring_system epss
scoring_elements 0.50112
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-42917
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42917
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42917
2
reference_url https://github.com/xbmc/xbmc/issues/20305
reference_id 20305
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-18T20:45:51Z/
url https://github.com/xbmc/xbmc/issues/20305
3
reference_url https://github.com/xbmc/xbmc/pull/20306
reference_id 20306
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-18T20:45:51Z/
url https://github.com/xbmc/xbmc/pull/20306
4
reference_url https://github.com/xbmc/xbmc/commit/48730b64494798705d46dfccc4029bd36d072df3
reference_id 48730b64494798705d46dfccc4029bd36d072df3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-18T20:45:51Z/
url https://github.com/xbmc/xbmc/commit/48730b64494798705d46dfccc4029bd36d072df3
5
reference_url https://github.com/fuzzard/xbmc/commit/80c8138c09598e88b4ddb6dbb279fa193bbb3237
reference_id 80c8138c09598e88b4ddb6dbb279fa193bbb3237
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-18T20:45:51Z/
url https://github.com/fuzzard/xbmc/commit/80c8138c09598e88b4ddb6dbb279fa193bbb3237
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=998419
reference_id 998419
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=998419
7
reference_url https://security.archlinux.org/AVG-2509
reference_id AVG-2509
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2509
8
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00009.html
reference_id msg00009.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-18T20:45:51Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00009.html
fixed_packages
0
url pkg:deb/debian/kodi@2:19.1%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/kodi@2:19.1%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:19.1%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/kodi@2:19.3%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/kodi@2:19.3%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:19.3%252Bdfsg1-1%3Fdistro=trixie
2
url pkg:deb/debian/kodi@2:20.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/kodi@2:20.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:20.1%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/kodi@2:21.2%2Bdfsg-4?distro=trixie
purl pkg:deb/debian/kodi@2:21.2%2Bdfsg-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:21.2%252Bdfsg-4%3Fdistro=trixie
4
url pkg:deb/debian/kodi@2:21.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/kodi@2:21.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:21.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2021-42917
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1jy3-92d8-ebf3
1
url VCID-5qx5-u16v-vfgz
vulnerability_id VCID-5qx5-u16v-vfgz
summary
Multiple vulnerabilities have been found in LibRaw, the worst of
    which may allow attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8366.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8366.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8366
reference_id
reference_type
scores
0
value 0.01277
scoring_system epss
scoring_elements 0.79585
published_at 2026-04-21T12:55:00Z
1
value 0.01277
scoring_system epss
scoring_elements 0.7958
published_at 2026-04-18T12:55:00Z
2
value 0.01277
scoring_system epss
scoring_elements 0.79503
published_at 2026-04-01T12:55:00Z
3
value 0.01277
scoring_system epss
scoring_elements 0.7951
published_at 2026-04-02T12:55:00Z
4
value 0.01277
scoring_system epss
scoring_elements 0.79533
published_at 2026-04-04T12:55:00Z
5
value 0.01277
scoring_system epss
scoring_elements 0.79519
published_at 2026-04-07T12:55:00Z
6
value 0.01277
scoring_system epss
scoring_elements 0.79547
published_at 2026-04-08T12:55:00Z
7
value 0.01277
scoring_system epss
scoring_elements 0.79555
published_at 2026-04-09T12:55:00Z
8
value 0.01277
scoring_system epss
scoring_elements 0.79577
published_at 2026-04-11T12:55:00Z
9
value 0.01277
scoring_system epss
scoring_elements 0.7956
published_at 2026-04-12T12:55:00Z
10
value 0.01277
scoring_system epss
scoring_elements 0.79552
published_at 2026-04-13T12:55:00Z
11
value 0.01277
scoring_system epss
scoring_elements 0.79582
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8366
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8366
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1287056
reference_id 1287056
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1287056
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806809
reference_id 806809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806809
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864168
reference_id 864168
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864168
7
reference_url https://security.archlinux.org/AVG-92
reference_id AVG-92
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-92
8
reference_url https://security.gentoo.org/glsa/201701-60
reference_id GLSA-201701-60
reference_type
scores
url https://security.gentoo.org/glsa/201701-60
9
reference_url https://usn.ubuntu.com/3492-1/
reference_id USN-3492-1
reference_type
scores
url https://usn.ubuntu.com/3492-1/
fixed_packages
0
url pkg:deb/debian/kodi@0?distro=trixie
purl pkg:deb/debian/kodi@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@0%3Fdistro=trixie
1
url pkg:deb/debian/kodi@2:19.1%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/kodi@2:19.1%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:19.1%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/kodi@2:20.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/kodi@2:20.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:20.1%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/kodi@2:21.2%2Bdfsg-4?distro=trixie
purl pkg:deb/debian/kodi@2:21.2%2Bdfsg-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:21.2%252Bdfsg-4%3Fdistro=trixie
4
url pkg:deb/debian/kodi@2:21.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/kodi@2:21.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:21.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2015-8366
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5qx5-u16v-vfgz
2
url VCID-becr-7kfy-c7ep
vulnerability_id VCID-becr-7kfy-c7ep
summary A divide by zero issue discovered in Kodi Home Theater Software 19.5 and earlier allows attackers to cause a denial of service via use of crafted mp3 file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-30207
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.0532
published_at 2026-04-02T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05351
published_at 2026-04-04T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.0537
published_at 2026-04-07T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05403
published_at 2026-04-08T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05426
published_at 2026-04-09T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05394
published_at 2026-04-11T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.05382
published_at 2026-04-12T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05374
published_at 2026-04-13T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05325
published_at 2026-04-16T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.05327
published_at 2026-04-18T12:55:00Z
10
value 0.0002
scoring_system epss
scoring_elements 0.05484
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-30207
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30207
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1040593
reference_id 1040593
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1040593
fixed_packages
0
url pkg:deb/debian/kodi@2:19.1%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/kodi@2:19.1%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:19.1%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/kodi@2:19.1%2Bdfsg2-2%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/kodi@2:19.1%2Bdfsg2-2%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:19.1%252Bdfsg2-2%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/kodi@2:20.0~rc2%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/kodi@2:20.0~rc2%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:20.0~rc2%252Bdfsg-2%3Fdistro=trixie
3
url pkg:deb/debian/kodi@2:20.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/kodi@2:20.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:20.1%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/kodi@2:21.2%2Bdfsg-4?distro=trixie
purl pkg:deb/debian/kodi@2:21.2%2Bdfsg-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:21.2%252Bdfsg-4%3Fdistro=trixie
5
url pkg:deb/debian/kodi@2:21.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/kodi@2:21.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:21.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2023-30207
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-becr-7kfy-c7ep
3
url VCID-car8-7w1p-2uhx
vulnerability_id VCID-car8-7w1p-2uhx
summary
Multiple vulnerabilities have been found in LibRaw, the worst of
    which may allow attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8367.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8367.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8367
reference_id
reference_type
scores
0
value 0.01731
scoring_system epss
scoring_elements 0.82384
published_at 2026-04-01T12:55:00Z
1
value 0.01731
scoring_system epss
scoring_elements 0.82461
published_at 2026-04-12T12:55:00Z
2
value 0.01731
scoring_system epss
scoring_elements 0.82457
published_at 2026-04-13T12:55:00Z
3
value 0.01731
scoring_system epss
scoring_elements 0.82492
published_at 2026-04-16T12:55:00Z
4
value 0.01731
scoring_system epss
scoring_elements 0.82399
published_at 2026-04-02T12:55:00Z
5
value 0.01731
scoring_system epss
scoring_elements 0.82416
published_at 2026-04-04T12:55:00Z
6
value 0.01731
scoring_system epss
scoring_elements 0.82413
published_at 2026-04-07T12:55:00Z
7
value 0.01731
scoring_system epss
scoring_elements 0.82441
published_at 2026-04-08T12:55:00Z
8
value 0.01731
scoring_system epss
scoring_elements 0.82447
published_at 2026-04-09T12:55:00Z
9
value 0.01731
scoring_system epss
scoring_elements 0.82466
published_at 2026-04-11T12:55:00Z
10
value 0.01779
scoring_system epss
scoring_elements 0.82732
published_at 2026-04-21T12:55:00Z
11
value 0.01779
scoring_system epss
scoring_elements 0.8273
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8367
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8367
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1287076
reference_id 1287076
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1287076
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806809
reference_id 806809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806809
5
reference_url https://security.archlinux.org/AVG-92
reference_id AVG-92
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-92
6
reference_url https://security.gentoo.org/glsa/201701-60
reference_id GLSA-201701-60
reference_type
scores
url https://security.gentoo.org/glsa/201701-60
7
reference_url https://usn.ubuntu.com/3492-1/
reference_id USN-3492-1
reference_type
scores
url https://usn.ubuntu.com/3492-1/
fixed_packages
0
url pkg:deb/debian/kodi@0?distro=trixie
purl pkg:deb/debian/kodi@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@0%3Fdistro=trixie
1
url pkg:deb/debian/kodi@2:19.1%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/kodi@2:19.1%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:19.1%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/kodi@2:20.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/kodi@2:20.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:20.1%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/kodi@2:21.2%2Bdfsg-4?distro=trixie
purl pkg:deb/debian/kodi@2:21.2%2Bdfsg-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:21.2%252Bdfsg-4%3Fdistro=trixie
4
url pkg:deb/debian/kodi@2:21.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/kodi@2:21.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:21.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2015-8367
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-car8-7w1p-2uhx
4
url VCID-nak9-smbh-37et
vulnerability_id VCID-nak9-smbh-37et
summary Directory traversal vulnerability in the Chorus2 2.4.2 add-on for Kodi allows remote attackers to read arbitrary files via a %2E%2E%252e (encoded dot dot slash) in the image path, as demonstrated by image/image%3A%2F%2F%2e%2e%252fetc%252fpasswd.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5982
reference_id
reference_type
scores
0
value 0.8642
scoring_system epss
scoring_elements 0.99402
published_at 2026-04-02T12:55:00Z
1
value 0.8642
scoring_system epss
scoring_elements 0.99403
published_at 2026-04-04T12:55:00Z
2
value 0.8642
scoring_system epss
scoring_elements 0.99405
published_at 2026-04-07T12:55:00Z
3
value 0.8642
scoring_system epss
scoring_elements 0.99406
published_at 2026-04-09T12:55:00Z
4
value 0.8642
scoring_system epss
scoring_elements 0.99408
published_at 2026-04-11T12:55:00Z
5
value 0.8642
scoring_system epss
scoring_elements 0.99409
published_at 2026-04-13T12:55:00Z
6
value 0.8642
scoring_system epss
scoring_elements 0.99412
published_at 2026-04-21T12:55:00Z
7
value 0.8642
scoring_system epss
scoring_elements 0.99411
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5982
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5982
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5982
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=855225
reference_id 855225
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=855225
fixed_packages
0
url pkg:deb/debian/kodi@2:18.6%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/kodi@2:18.6%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:18.6%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/kodi@2:19.1%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/kodi@2:19.1%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:19.1%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/kodi@2:20.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/kodi@2:20.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:20.1%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/kodi@2:21.2%2Bdfsg-4?distro=trixie
purl pkg:deb/debian/kodi@2:21.2%2Bdfsg-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:21.2%252Bdfsg-4%3Fdistro=trixie
4
url pkg:deb/debian/kodi@2:21.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/kodi@2:21.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:21.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2017-5982
risk_score 1.6
exploitability 2.0
weighted_severity 0.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nak9-smbh-37et
5
url VCID-saex-9ka8-c7en
vulnerability_id VCID-saex-9ka8-c7en
summary
Multiple vulnerabilities have been found in Kodi, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-8314
reference_id
reference_type
scores
0
value 0.02516
scoring_system epss
scoring_elements 0.85329
published_at 2026-04-01T12:55:00Z
1
value 0.02516
scoring_system epss
scoring_elements 0.85341
published_at 2026-04-02T12:55:00Z
2
value 0.02516
scoring_system epss
scoring_elements 0.8536
published_at 2026-04-04T12:55:00Z
3
value 0.02516
scoring_system epss
scoring_elements 0.85362
published_at 2026-04-07T12:55:00Z
4
value 0.02516
scoring_system epss
scoring_elements 0.85384
published_at 2026-04-08T12:55:00Z
5
value 0.02516
scoring_system epss
scoring_elements 0.85393
published_at 2026-04-09T12:55:00Z
6
value 0.02516
scoring_system epss
scoring_elements 0.85407
published_at 2026-04-11T12:55:00Z
7
value 0.02516
scoring_system epss
scoring_elements 0.85405
published_at 2026-04-12T12:55:00Z
8
value 0.02516
scoring_system epss
scoring_elements 0.85402
published_at 2026-04-13T12:55:00Z
9
value 0.02516
scoring_system epss
scoring_elements 0.85425
published_at 2026-04-16T12:55:00Z
10
value 0.02516
scoring_system epss
scoring_elements 0.85426
published_at 2026-04-18T12:55:00Z
11
value 0.02516
scoring_system epss
scoring_elements 0.85423
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-8314
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8314
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863230
reference_id 863230
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863230
3
reference_url https://security.gentoo.org/glsa/201706-17
reference_id GLSA-201706-17
reference_type
scores
url https://security.gentoo.org/glsa/201706-17
fixed_packages
0
url pkg:deb/debian/kodi@2:17.1%2Bdfsg1-3?distro=trixie
purl pkg:deb/debian/kodi@2:17.1%2Bdfsg1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:17.1%252Bdfsg1-3%3Fdistro=trixie
1
url pkg:deb/debian/kodi@2:19.1%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/kodi@2:19.1%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:19.1%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/kodi@2:20.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/kodi@2:20.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:20.1%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/kodi@2:21.2%2Bdfsg-4?distro=trixie
purl pkg:deb/debian/kodi@2:21.2%2Bdfsg-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:21.2%252Bdfsg-4%3Fdistro=trixie
4
url pkg:deb/debian/kodi@2:21.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/kodi@2:21.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:21.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2017-8314
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-saex-9ka8-c7en
6
url VCID-uwjm-15ym-1kfc
vulnerability_id VCID-uwjm-15ym-1kfc
summary A Persistent XSS vulnerability exists in Kodi (formerly XBMC) through 17.6 that allows the execution of arbitrary HTML/script code in the context of the victim user's browser via a playlist.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-8831
reference_id
reference_type
scores
0
value 0.22901
scoring_system epss
scoring_elements 0.95915
published_at 2026-04-21T12:55:00Z
1
value 0.22901
scoring_system epss
scoring_elements 0.95912
published_at 2026-04-18T12:55:00Z
2
value 0.22901
scoring_system epss
scoring_elements 0.9586
published_at 2026-04-01T12:55:00Z
3
value 0.22901
scoring_system epss
scoring_elements 0.95868
published_at 2026-04-02T12:55:00Z
4
value 0.22901
scoring_system epss
scoring_elements 0.95876
published_at 2026-04-04T12:55:00Z
5
value 0.22901
scoring_system epss
scoring_elements 0.95879
published_at 2026-04-07T12:55:00Z
6
value 0.22901
scoring_system epss
scoring_elements 0.95888
published_at 2026-04-08T12:55:00Z
7
value 0.22901
scoring_system epss
scoring_elements 0.95891
published_at 2026-04-09T12:55:00Z
8
value 0.22901
scoring_system epss
scoring_elements 0.95894
published_at 2026-04-12T12:55:00Z
9
value 0.22901
scoring_system epss
scoring_elements 0.95895
published_at 2026-04-13T12:55:00Z
10
value 0.22901
scoring_system epss
scoring_elements 0.95907
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-8831
1
reference_url http://seclists.org/fulldisclosure/2018/Apr/36
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2018/Apr/36
2
reference_url https://trac.kodi.tv/ticket/17814
reference_id
reference_type
scores
url https://trac.kodi.tv/ticket/17814
3
reference_url https://www.exploit-db.com/exploits/44487/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/44487/
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kodi:kodi:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kodi:kodi:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kodi:kodi:*:*:*:*:*:*:*:*
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/44487.txt
reference_id CVE-2018-8831
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/44487.txt
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-8831
reference_id CVE-2018-8831
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-8831
fixed_packages
0
url pkg:deb/debian/kodi@0?distro=trixie
purl pkg:deb/debian/kodi@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@0%3Fdistro=trixie
1
url pkg:deb/debian/kodi@2:19.1%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/kodi@2:19.1%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:19.1%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/kodi@2:20.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/kodi@2:20.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:20.1%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/kodi@2:21.2%2Bdfsg-4?distro=trixie
purl pkg:deb/debian/kodi@2:21.2%2Bdfsg-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:21.2%252Bdfsg-4%3Fdistro=trixie
4
url pkg:deb/debian/kodi@2:21.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/kodi@2:21.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:21.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2018-8831
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uwjm-15ym-1kfc
7
url VCID-xswq-6aae-nqfb
vulnerability_id VCID-xswq-6aae-nqfb
summary
A buffer overflow in DCRaw might allow remote attackers to cause a
    Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3885.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3885.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3885
reference_id
reference_type
scores
0
value 0.03564
scoring_system epss
scoring_elements 0.87724
published_at 2026-04-21T12:55:00Z
1
value 0.03564
scoring_system epss
scoring_elements 0.87659
published_at 2026-04-01T12:55:00Z
2
value 0.03564
scoring_system epss
scoring_elements 0.87669
published_at 2026-04-02T12:55:00Z
3
value 0.03564
scoring_system epss
scoring_elements 0.87682
published_at 2026-04-04T12:55:00Z
4
value 0.03564
scoring_system epss
scoring_elements 0.87683
published_at 2026-04-07T12:55:00Z
5
value 0.03564
scoring_system epss
scoring_elements 0.87704
published_at 2026-04-08T12:55:00Z
6
value 0.03564
scoring_system epss
scoring_elements 0.8771
published_at 2026-04-09T12:55:00Z
7
value 0.03564
scoring_system epss
scoring_elements 0.87721
published_at 2026-04-11T12:55:00Z
8
value 0.03564
scoring_system epss
scoring_elements 0.87715
published_at 2026-04-12T12:55:00Z
9
value 0.03564
scoring_system epss
scoring_elements 0.87713
published_at 2026-04-13T12:55:00Z
10
value 0.03564
scoring_system epss
scoring_elements 0.87727
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3885
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3885
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5684
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5684
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1221249
reference_id 1221249
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1221249
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=785019
reference_id 785019
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=785019
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786785
reference_id 786785
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786785
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786788
reference_id 786788
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786788
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786790
reference_id 786790
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786790
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786792
reference_id 786792
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786792
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=792299
reference_id 792299
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=792299
12
reference_url https://security.gentoo.org/glsa/201701-54
reference_id GLSA-201701-54
reference_type
scores
url https://security.gentoo.org/glsa/201701-54
13
reference_url https://security.gentoo.org/glsa/201701-60
reference_id GLSA-201701-60
reference_type
scores
url https://security.gentoo.org/glsa/201701-60
14
reference_url https://security.gentoo.org/glsa/201706-17
reference_id GLSA-201706-17
reference_type
scores
url https://security.gentoo.org/glsa/201706-17
15
reference_url https://usn.ubuntu.com/3492-1/
reference_id USN-3492-1
reference_type
scores
url https://usn.ubuntu.com/3492-1/
fixed_packages
0
url pkg:deb/debian/kodi@16.0%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/kodi@16.0%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@16.0%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/kodi@2:19.1%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/kodi@2:19.1%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:19.1%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/kodi@2:20.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/kodi@2:20.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:20.1%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/kodi@2:21.2%2Bdfsg-4?distro=trixie
purl pkg:deb/debian/kodi@2:21.2%2Bdfsg-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:21.2%252Bdfsg-4%3Fdistro=trixie
4
url pkg:deb/debian/kodi@2:21.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/kodi@2:21.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:21.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2015-3885
risk_score 0.8
exploitability 0.5
weighted_severity 1.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xswq-6aae-nqfb
8
url VCID-z9v6-3q7k-zkg4
vulnerability_id VCID-z9v6-3q7k-zkg4
summary A heap buffer overflow vulnerability in Kodi Home Theater Software up to 19.5 allows attackers to cause a denial of service due to an improper length of the value passed to the offset argument.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-23082
reference_id
reference_type
scores
0
value 0.0009
scoring_system epss
scoring_elements 0.25571
published_at 2026-04-02T12:55:00Z
1
value 0.0009
scoring_system epss
scoring_elements 0.25608
published_at 2026-04-04T12:55:00Z
2
value 0.0009
scoring_system epss
scoring_elements 0.2538
published_at 2026-04-07T12:55:00Z
3
value 0.0009
scoring_system epss
scoring_elements 0.25448
published_at 2026-04-08T12:55:00Z
4
value 0.0009
scoring_system epss
scoring_elements 0.25496
published_at 2026-04-09T12:55:00Z
5
value 0.0009
scoring_system epss
scoring_elements 0.25509
published_at 2026-04-11T12:55:00Z
6
value 0.0009
scoring_system epss
scoring_elements 0.25466
published_at 2026-04-12T12:55:00Z
7
value 0.0009
scoring_system epss
scoring_elements 0.25408
published_at 2026-04-13T12:55:00Z
8
value 0.0009
scoring_system epss
scoring_elements 0.25414
published_at 2026-04-16T12:55:00Z
9
value 0.0009
scoring_system epss
scoring_elements 0.25404
published_at 2026-04-18T12:55:00Z
10
value 0.0009
scoring_system epss
scoring_elements 0.25371
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-23082
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23082
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23082
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031048
reference_id 1031048
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031048
fixed_packages
0
url pkg:deb/debian/kodi@2:19.1%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/kodi@2:19.1%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:19.1%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/kodi@2:19.1%2Bdfsg2-2%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/kodi@2:19.1%2Bdfsg2-2%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:19.1%252Bdfsg2-2%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/kodi@2:20.0%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/kodi@2:20.0%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:20.0%252Bdfsg-2%3Fdistro=trixie
3
url pkg:deb/debian/kodi@2:20.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/kodi@2:20.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:20.1%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/kodi@2:21.2%2Bdfsg-4?distro=trixie
purl pkg:deb/debian/kodi@2:21.2%2Bdfsg-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:21.2%252Bdfsg-4%3Fdistro=trixie
5
url pkg:deb/debian/kodi@2:21.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/kodi@2:21.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:21.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2023-23082
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z9v6-3q7k-zkg4
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/kodi@2:20.1%252Bdfsg-1%3Fdistro=trixie