Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-7?distro=trixie
Typedeb
Namespacedebian
Namelibvorbisidec
Version1.2.1+git20180316-7
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.2.1+git20180316-8
Latest_non_vulnerable_version1.2.1+git20180316-8
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-12w2-ffkf-7bfv
vulnerability_id VCID-12w2-ffkf-7bfv
summary vorbis: insufficient validation of Huffman tree causing memory corruption in _make_decode_tree()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2009.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2009.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-2009
reference_id
reference_type
scores
0
value 0.0434
scoring_system epss
scoring_elements 0.88877
published_at 2026-04-01T12:55:00Z
1
value 0.0434
scoring_system epss
scoring_elements 0.88885
published_at 2026-04-02T12:55:00Z
2
value 0.0434
scoring_system epss
scoring_elements 0.889
published_at 2026-04-04T12:55:00Z
3
value 0.0434
scoring_system epss
scoring_elements 0.88903
published_at 2026-04-07T12:55:00Z
4
value 0.0434
scoring_system epss
scoring_elements 0.88921
published_at 2026-04-08T12:55:00Z
5
value 0.0434
scoring_system epss
scoring_elements 0.88927
published_at 2026-04-09T12:55:00Z
6
value 0.0434
scoring_system epss
scoring_elements 0.88938
published_at 2026-04-11T12:55:00Z
7
value 0.0434
scoring_system epss
scoring_elements 0.88933
published_at 2026-04-12T12:55:00Z
8
value 0.0434
scoring_system epss
scoring_elements 0.88932
published_at 2026-04-13T12:55:00Z
9
value 0.0434
scoring_system epss
scoring_elements 0.88946
published_at 2026-04-16T12:55:00Z
10
value 0.0434
scoring_system epss
scoring_elements 0.88944
published_at 2026-04-18T12:55:00Z
11
value 0.0434
scoring_system epss
scoring_elements 0.8894
published_at 2026-04-21T12:55:00Z
12
value 0.0434
scoring_system epss
scoring_elements 0.88957
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-2009
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2009
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=444443
reference_id 444443
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=444443
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=482039
reference_id 482039
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=482039
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669196
reference_id 669196
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669196
6
reference_url https://access.redhat.com/errata/RHSA-2008:0271
reference_id RHSA-2008:0271
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0271
7
reference_url https://usn.ubuntu.com/861-1/
reference_id USN-861-1
reference_type
scores
url https://usn.ubuntu.com/861-1/
fixed_packages
0
url pkg:deb/debian/libvorbisidec@1.0.2%2Bsvn18153-0.1?distro=trixie
purl pkg:deb/debian/libvorbisidec@1.0.2%2Bsvn18153-0.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.0.2%252Bsvn18153-0.1%3Fdistro=trixie
1
url pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-7?distro=trixie
purl pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.2.1%252Bgit20180316-7%3Fdistro=trixie
2
url pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-8?distro=trixie
purl pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.2.1%252Bgit20180316-8%3Fdistro=trixie
aliases CVE-2008-2009
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-12w2-ffkf-7bfv
1
url VCID-49kj-gbcz-6fd1
vulnerability_id VCID-49kj-gbcz-6fd1
summary
A buffer overflow vulnerability and several memory corruptions have been
    discovered in libvorbis.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4066.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4066.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4066
reference_id
reference_type
scores
0
value 0.01248
scoring_system epss
scoring_elements 0.79261
published_at 2026-04-01T12:55:00Z
1
value 0.01248
scoring_system epss
scoring_elements 0.79268
published_at 2026-04-02T12:55:00Z
2
value 0.01248
scoring_system epss
scoring_elements 0.79292
published_at 2026-04-04T12:55:00Z
3
value 0.01248
scoring_system epss
scoring_elements 0.79277
published_at 2026-04-07T12:55:00Z
4
value 0.01248
scoring_system epss
scoring_elements 0.79303
published_at 2026-04-08T12:55:00Z
5
value 0.01248
scoring_system epss
scoring_elements 0.79313
published_at 2026-04-09T12:55:00Z
6
value 0.01248
scoring_system epss
scoring_elements 0.79336
published_at 2026-04-16T12:55:00Z
7
value 0.01248
scoring_system epss
scoring_elements 0.7932
published_at 2026-04-12T12:55:00Z
8
value 0.01248
scoring_system epss
scoring_elements 0.79309
published_at 2026-04-13T12:55:00Z
9
value 0.01248
scoring_system epss
scoring_elements 0.79332
published_at 2026-04-18T12:55:00Z
10
value 0.01248
scoring_system epss
scoring_elements 0.79333
published_at 2026-04-21T12:55:00Z
11
value 0.01248
scoring_system epss
scoring_elements 0.79366
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4066
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4066
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=249780
reference_id 249780
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=249780
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669196
reference_id 669196
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669196
5
reference_url https://security.gentoo.org/glsa/200710-03
reference_id GLSA-200710-03
reference_type
scores
url https://security.gentoo.org/glsa/200710-03
6
reference_url https://access.redhat.com/errata/RHSA-2007:0845
reference_id RHSA-2007:0845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0845
7
reference_url https://access.redhat.com/errata/RHSA-2007:0912
reference_id RHSA-2007:0912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0912
fixed_packages
0
url pkg:deb/debian/libvorbisidec@1.0.2%2Bsvn16259-2?distro=trixie
purl pkg:deb/debian/libvorbisidec@1.0.2%2Bsvn16259-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.0.2%252Bsvn16259-2%3Fdistro=trixie
1
url pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-7?distro=trixie
purl pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.2.1%252Bgit20180316-7%3Fdistro=trixie
2
url pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-8?distro=trixie
purl pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.2.1%252Bgit20180316-8%3Fdistro=trixie
aliases CVE-2007-4066
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-49kj-gbcz-6fd1
2
url VCID-55cd-r9yc-nfan
vulnerability_id VCID-55cd-r9yc-nfan
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3379.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3379.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3379
reference_id
reference_type
scores
0
value 0.04866
scoring_system epss
scoring_elements 0.8958
published_at 2026-04-24T12:55:00Z
1
value 0.04866
scoring_system epss
scoring_elements 0.89515
published_at 2026-04-01T12:55:00Z
2
value 0.04866
scoring_system epss
scoring_elements 0.89519
published_at 2026-04-02T12:55:00Z
3
value 0.04866
scoring_system epss
scoring_elements 0.89532
published_at 2026-04-07T12:55:00Z
4
value 0.04866
scoring_system epss
scoring_elements 0.89548
published_at 2026-04-08T12:55:00Z
5
value 0.04866
scoring_system epss
scoring_elements 0.89553
published_at 2026-04-09T12:55:00Z
6
value 0.04866
scoring_system epss
scoring_elements 0.8956
published_at 2026-04-11T12:55:00Z
7
value 0.04866
scoring_system epss
scoring_elements 0.89559
published_at 2026-04-12T12:55:00Z
8
value 0.04866
scoring_system epss
scoring_elements 0.89554
published_at 2026-04-13T12:55:00Z
9
value 0.04866
scoring_system epss
scoring_elements 0.89567
published_at 2026-04-16T12:55:00Z
10
value 0.04866
scoring_system epss
scoring_elements 0.89569
published_at 2026-04-18T12:55:00Z
11
value 0.04866
scoring_system epss
scoring_elements 0.89565
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3379
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=531765
reference_id 531765
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=531765
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669196
reference_id 669196
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669196
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3379
reference_id CVE-2009-3379
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3379
5
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-63
reference_id mfsa2009-63
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-63
7
reference_url https://access.redhat.com/errata/RHSA-2009:1561
reference_id RHSA-2009:1561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1561
8
reference_url https://usn.ubuntu.com/861-1/
reference_id USN-861-1
reference_type
scores
url https://usn.ubuntu.com/861-1/
fixed_packages
0
url pkg:deb/debian/libvorbisidec@1.0.2%2Bsvn18153-0.1?distro=trixie
purl pkg:deb/debian/libvorbisidec@1.0.2%2Bsvn18153-0.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.0.2%252Bsvn18153-0.1%3Fdistro=trixie
1
url pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-7?distro=trixie
purl pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.2.1%252Bgit20180316-7%3Fdistro=trixie
2
url pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-8?distro=trixie
purl pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.2.1%252Bgit20180316-8%3Fdistro=trixie
aliases CVE-2009-3379
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-55cd-r9yc-nfan
3
url VCID-8qdb-sj7v-c3cb
vulnerability_id VCID-8qdb-sj7v-c3cb
summary
Multiple vulnerabilities in libvorbis might lead to the execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1420.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1420.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1420
reference_id
reference_type
scores
0
value 0.08948
scoring_system epss
scoring_elements 0.92558
published_at 2026-04-01T12:55:00Z
1
value 0.08948
scoring_system epss
scoring_elements 0.92564
published_at 2026-04-02T12:55:00Z
2
value 0.08948
scoring_system epss
scoring_elements 0.92571
published_at 2026-04-04T12:55:00Z
3
value 0.08948
scoring_system epss
scoring_elements 0.92573
published_at 2026-04-07T12:55:00Z
4
value 0.08948
scoring_system epss
scoring_elements 0.92584
published_at 2026-04-08T12:55:00Z
5
value 0.08948
scoring_system epss
scoring_elements 0.92589
published_at 2026-04-09T12:55:00Z
6
value 0.08948
scoring_system epss
scoring_elements 0.92595
published_at 2026-04-12T12:55:00Z
7
value 0.08948
scoring_system epss
scoring_elements 0.92594
published_at 2026-04-13T12:55:00Z
8
value 0.08948
scoring_system epss
scoring_elements 0.92608
published_at 2026-04-16T12:55:00Z
9
value 0.08948
scoring_system epss
scoring_elements 0.92607
published_at 2026-04-18T12:55:00Z
10
value 0.08948
scoring_system epss
scoring_elements 0.9261
published_at 2026-04-21T12:55:00Z
11
value 0.08948
scoring_system epss
scoring_elements 0.92613
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1420
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1420
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1420
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=440706
reference_id 440706
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=440706
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=482518
reference_id 482518
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=482518
5
reference_url https://security.gentoo.org/glsa/200806-09
reference_id GLSA-200806-09
reference_type
scores
url https://security.gentoo.org/glsa/200806-09
6
reference_url https://access.redhat.com/errata/RHSA-2008:0270
reference_id RHSA-2008:0270
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0270
7
reference_url https://access.redhat.com/errata/RHSA-2008:0271
reference_id RHSA-2008:0271
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0271
8
reference_url https://usn.ubuntu.com/682-1/
reference_id USN-682-1
reference_type
scores
url https://usn.ubuntu.com/682-1/
9
reference_url https://usn.ubuntu.com/825-1/
reference_id USN-825-1
reference_type
scores
url https://usn.ubuntu.com/825-1/
fixed_packages
0
url pkg:deb/debian/libvorbisidec@0?distro=trixie
purl pkg:deb/debian/libvorbisidec@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@0%3Fdistro=trixie
1
url pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-7?distro=trixie
purl pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.2.1%252Bgit20180316-7%3Fdistro=trixie
2
url pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-8?distro=trixie
purl pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.2.1%252Bgit20180316-8%3Fdistro=trixie
aliases CVE-2008-1420
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8qdb-sj7v-c3cb
4
url VCID-bv67-87hf-byf5
vulnerability_id VCID-bv67-87hf-byf5
summary
A buffer overflow vulnerability and several memory corruptions have been
    discovered in libvorbis.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3106.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3106.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3106
reference_id
reference_type
scores
0
value 0.03005
scoring_system epss
scoring_elements 0.86517
published_at 2026-04-01T12:55:00Z
1
value 0.03005
scoring_system epss
scoring_elements 0.86527
published_at 2026-04-02T12:55:00Z
2
value 0.03005
scoring_system epss
scoring_elements 0.86546
published_at 2026-04-04T12:55:00Z
3
value 0.03005
scoring_system epss
scoring_elements 0.86545
published_at 2026-04-07T12:55:00Z
4
value 0.03005
scoring_system epss
scoring_elements 0.86564
published_at 2026-04-08T12:55:00Z
5
value 0.03005
scoring_system epss
scoring_elements 0.86574
published_at 2026-04-09T12:55:00Z
6
value 0.03005
scoring_system epss
scoring_elements 0.86589
published_at 2026-04-21T12:55:00Z
7
value 0.03005
scoring_system epss
scoring_elements 0.86585
published_at 2026-04-12T12:55:00Z
8
value 0.03005
scoring_system epss
scoring_elements 0.86578
published_at 2026-04-13T12:55:00Z
9
value 0.03005
scoring_system epss
scoring_elements 0.86592
published_at 2026-04-16T12:55:00Z
10
value 0.03005
scoring_system epss
scoring_elements 0.86597
published_at 2026-04-18T12:55:00Z
11
value 0.03005
scoring_system epss
scoring_elements 0.86607
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3106
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3106
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3106
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=245991
reference_id 245991
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=245991
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669196
reference_id 669196
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669196
5
reference_url https://security.gentoo.org/glsa/200710-03
reference_id GLSA-200710-03
reference_type
scores
url https://security.gentoo.org/glsa/200710-03
6
reference_url https://access.redhat.com/errata/RHSA-2007:0845
reference_id RHSA-2007:0845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0845
7
reference_url https://access.redhat.com/errata/RHSA-2007:0912
reference_id RHSA-2007:0912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0912
8
reference_url https://usn.ubuntu.com/498-1/
reference_id USN-498-1
reference_type
scores
url https://usn.ubuntu.com/498-1/
fixed_packages
0
url pkg:deb/debian/libvorbisidec@1.0.2%2Bsvn16259-2?distro=trixie
purl pkg:deb/debian/libvorbisidec@1.0.2%2Bsvn16259-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.0.2%252Bsvn16259-2%3Fdistro=trixie
1
url pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-7?distro=trixie
purl pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.2.1%252Bgit20180316-7%3Fdistro=trixie
2
url pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-8?distro=trixie
purl pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.2.1%252Bgit20180316-8%3Fdistro=trixie
aliases CVE-2007-3106
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bv67-87hf-byf5
5
url VCID-bxdr-5t7k-rbdn
vulnerability_id VCID-bxdr-5t7k-rbdn
summary The libtremor library has the same flaw as CVE-2018-5146. This library is used by Firefox in place of libvorbis on Android and ARM platforms.*Update: The 52.7.2 source release accidentally did not include this patch (the Mozilla-produced 52.7.2 binaries are fine). Anyone building 52.7.2 on ARM should use revision 5cd5586a2f48424a9031a3fa4c782954a9df9a52 instead of the released source.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5147
reference_id
reference_type
scores
0
value 0.01425
scoring_system epss
scoring_elements 0.80677
published_at 2026-04-24T12:55:00Z
1
value 0.01425
scoring_system epss
scoring_elements 0.80564
published_at 2026-04-01T12:55:00Z
2
value 0.01425
scoring_system epss
scoring_elements 0.80626
published_at 2026-04-12T12:55:00Z
3
value 0.01425
scoring_system epss
scoring_elements 0.80618
published_at 2026-04-13T12:55:00Z
4
value 0.01425
scoring_system epss
scoring_elements 0.80646
published_at 2026-04-16T12:55:00Z
5
value 0.01425
scoring_system epss
scoring_elements 0.80649
published_at 2026-04-18T12:55:00Z
6
value 0.01425
scoring_system epss
scoring_elements 0.80652
published_at 2026-04-21T12:55:00Z
7
value 0.01425
scoring_system epss
scoring_elements 0.80571
published_at 2026-04-02T12:55:00Z
8
value 0.01425
scoring_system epss
scoring_elements 0.80593
published_at 2026-04-04T12:55:00Z
9
value 0.01425
scoring_system epss
scoring_elements 0.80585
published_at 2026-04-07T12:55:00Z
10
value 0.01425
scoring_system epss
scoring_elements 0.80613
published_at 2026-04-08T12:55:00Z
11
value 0.01425
scoring_system epss
scoring_elements 0.80623
published_at 2026-04-09T12:55:00Z
12
value 0.01425
scoring_system epss
scoring_elements 0.80639
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5147
1
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1446365
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1446365
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5146
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5146
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5147
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://lists.debian.org/debian-lts-announce/2018/03/msg00016.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/03/msg00016.html
6
reference_url https://lists.debian.org/debian-lts-announce/2018/03/msg00022.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/03/msg00022.html
7
reference_url https://www.debian.org/security/2018/dsa-4141
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4141
8
reference_url https://www.debian.org/security/2018/dsa-4143
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4143
9
reference_url https://www.mozilla.org/security/advisories/mfsa2018-08/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2018-08/
10
reference_url http://www.securityfocus.com/bid/103432
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/103432
11
reference_url http://www.securitytracker.com/id/1040544
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1040544
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893132
reference_id 893132
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893132
13
reference_url https://security.archlinux.org/AVG-659
reference_id AVG-659
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-659
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-5147
reference_id CVE-2018-5147
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-5147
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2018-08
reference_id mfsa2018-08
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2018-08
fixed_packages
0
url pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-1?distro=trixie
purl pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.2.1%252Bgit20180316-1%3Fdistro=trixie
1
url pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-7?distro=trixie
purl pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.2.1%252Bgit20180316-7%3Fdistro=trixie
2
url pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-8?distro=trixie
purl pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.2.1%252Bgit20180316-8%3Fdistro=trixie
aliases CVE-2018-5147
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bxdr-5t7k-rbdn
6
url VCID-c3vm-d9f5-2kcj
vulnerability_id VCID-c3vm-d9f5-2kcj
summary
Multiple vulnerabilities in libvorbis might lead to the execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1419.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1419.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1419
reference_id
reference_type
scores
0
value 0.13143
scoring_system epss
scoring_elements 0.94079
published_at 2026-04-01T12:55:00Z
1
value 0.13143
scoring_system epss
scoring_elements 0.94089
published_at 2026-04-02T12:55:00Z
2
value 0.13143
scoring_system epss
scoring_elements 0.94099
published_at 2026-04-04T12:55:00Z
3
value 0.13143
scoring_system epss
scoring_elements 0.94103
published_at 2026-04-07T12:55:00Z
4
value 0.13143
scoring_system epss
scoring_elements 0.94112
published_at 2026-04-08T12:55:00Z
5
value 0.13143
scoring_system epss
scoring_elements 0.94116
published_at 2026-04-09T12:55:00Z
6
value 0.13143
scoring_system epss
scoring_elements 0.94121
published_at 2026-04-13T12:55:00Z
7
value 0.13143
scoring_system epss
scoring_elements 0.94137
published_at 2026-04-16T12:55:00Z
8
value 0.13143
scoring_system epss
scoring_elements 0.94142
published_at 2026-04-21T12:55:00Z
9
value 0.13143
scoring_system epss
scoring_elements 0.94145
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1419
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1419
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=440700
reference_id 440700
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=440700
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=482518
reference_id 482518
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=482518
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669196
reference_id 669196
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669196
6
reference_url https://security.gentoo.org/glsa/200806-09
reference_id GLSA-200806-09
reference_type
scores
url https://security.gentoo.org/glsa/200806-09
7
reference_url https://access.redhat.com/errata/RHSA-2008:0270
reference_id RHSA-2008:0270
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0270
8
reference_url https://access.redhat.com/errata/RHSA-2008:0271
reference_id RHSA-2008:0271
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0271
9
reference_url https://usn.ubuntu.com/682-1/
reference_id USN-682-1
reference_type
scores
url https://usn.ubuntu.com/682-1/
fixed_packages
0
url pkg:deb/debian/libvorbisidec@1.0.2%2Bsvn18153-0.1?distro=trixie
purl pkg:deb/debian/libvorbisidec@1.0.2%2Bsvn18153-0.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.0.2%252Bsvn18153-0.1%3Fdistro=trixie
1
url pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-7?distro=trixie
purl pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.2.1%252Bgit20180316-7%3Fdistro=trixie
2
url pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-8?distro=trixie
purl pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.2.1%252Bgit20180316-8%3Fdistro=trixie
aliases CVE-2008-1419
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c3vm-d9f5-2kcj
7
url VCID-dgfg-2eq3-5ybm
vulnerability_id VCID-dgfg-2eq3-5ybm
summary
A buffer overflow vulnerability and several memory corruptions have been
    discovered in libvorbis.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4029.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4029.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4029
reference_id
reference_type
scores
0
value 0.01627
scoring_system epss
scoring_elements 0.818
published_at 2026-04-01T12:55:00Z
1
value 0.01627
scoring_system epss
scoring_elements 0.8181
published_at 2026-04-02T12:55:00Z
2
value 0.01627
scoring_system epss
scoring_elements 0.81833
published_at 2026-04-04T12:55:00Z
3
value 0.01627
scoring_system epss
scoring_elements 0.8183
published_at 2026-04-07T12:55:00Z
4
value 0.01627
scoring_system epss
scoring_elements 0.81856
published_at 2026-04-08T12:55:00Z
5
value 0.01627
scoring_system epss
scoring_elements 0.81863
published_at 2026-04-09T12:55:00Z
6
value 0.01627
scoring_system epss
scoring_elements 0.81882
published_at 2026-04-11T12:55:00Z
7
value 0.01627
scoring_system epss
scoring_elements 0.8187
published_at 2026-04-12T12:55:00Z
8
value 0.01627
scoring_system epss
scoring_elements 0.81865
published_at 2026-04-13T12:55:00Z
9
value 0.01627
scoring_system epss
scoring_elements 0.81901
published_at 2026-04-18T12:55:00Z
10
value 0.01627
scoring_system epss
scoring_elements 0.81904
published_at 2026-04-21T12:55:00Z
11
value 0.01627
scoring_system epss
scoring_elements 0.81927
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4029
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4029
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4029
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=249780
reference_id 249780
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=249780
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=437916
reference_id 437916
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=437916
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669196
reference_id 669196
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669196
6
reference_url https://security.gentoo.org/glsa/200710-03
reference_id GLSA-200710-03
reference_type
scores
url https://security.gentoo.org/glsa/200710-03
7
reference_url https://access.redhat.com/errata/RHSA-2007:0845
reference_id RHSA-2007:0845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0845
8
reference_url https://access.redhat.com/errata/RHSA-2007:0912
reference_id RHSA-2007:0912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0912
9
reference_url https://usn.ubuntu.com/498-1/
reference_id USN-498-1
reference_type
scores
url https://usn.ubuntu.com/498-1/
fixed_packages
0
url pkg:deb/debian/libvorbisidec@1.0.2%2Bsvn16259-2?distro=trixie
purl pkg:deb/debian/libvorbisidec@1.0.2%2Bsvn16259-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.0.2%252Bsvn16259-2%3Fdistro=trixie
1
url pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-7?distro=trixie
purl pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.2.1%252Bgit20180316-7%3Fdistro=trixie
2
url pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-8?distro=trixie
purl pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.2.1%252Bgit20180316-8%3Fdistro=trixie
aliases CVE-2007-4029
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dgfg-2eq3-5ybm
8
url VCID-gajm-zb2s-ukgz
vulnerability_id VCID-gajm-zb2s-ukgz
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0444.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0444.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0444
reference_id
reference_type
scores
0
value 0.08566
scoring_system epss
scoring_elements 0.92425
published_at 2026-04-24T12:55:00Z
1
value 0.08566
scoring_system epss
scoring_elements 0.92368
published_at 2026-04-01T12:55:00Z
2
value 0.08566
scoring_system epss
scoring_elements 0.92375
published_at 2026-04-02T12:55:00Z
3
value 0.08566
scoring_system epss
scoring_elements 0.92382
published_at 2026-04-04T12:55:00Z
4
value 0.08566
scoring_system epss
scoring_elements 0.92386
published_at 2026-04-07T12:55:00Z
5
value 0.08566
scoring_system epss
scoring_elements 0.92398
published_at 2026-04-08T12:55:00Z
6
value 0.08566
scoring_system epss
scoring_elements 0.92402
published_at 2026-04-09T12:55:00Z
7
value 0.08566
scoring_system epss
scoring_elements 0.92408
published_at 2026-04-11T12:55:00Z
8
value 0.08566
scoring_system epss
scoring_elements 0.92411
published_at 2026-04-12T12:55:00Z
9
value 0.08566
scoring_system epss
scoring_elements 0.92409
published_at 2026-04-13T12:55:00Z
10
value 0.08566
scoring_system epss
scoring_elements 0.9242
published_at 2026-04-16T12:55:00Z
11
value 0.08566
scoring_system epss
scoring_elements 0.92419
published_at 2026-04-18T12:55:00Z
12
value 0.08566
scoring_system epss
scoring_elements 0.92421
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0444
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=664197
reference_id 664197
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=664197
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669196
reference_id 669196
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669196
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=786026
reference_id 786026
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=786026
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0444
reference_id CVE-2012-0444
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0444
6
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-07
reference_id mfsa2012-07
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-07
8
reference_url https://access.redhat.com/errata/RHSA-2012:0079
reference_id RHSA-2012:0079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0079
9
reference_url https://access.redhat.com/errata/RHSA-2012:0136
reference_id RHSA-2012:0136
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0136
10
reference_url https://usn.ubuntu.com/1350-1/
reference_id USN-1350-1
reference_type
scores
url https://usn.ubuntu.com/1350-1/
11
reference_url https://usn.ubuntu.com/1353-1/
reference_id USN-1353-1
reference_type
scores
url https://usn.ubuntu.com/1353-1/
12
reference_url https://usn.ubuntu.com/1355-1/
reference_id USN-1355-1
reference_type
scores
url https://usn.ubuntu.com/1355-1/
13
reference_url https://usn.ubuntu.com/1369-1/
reference_id USN-1369-1
reference_type
scores
url https://usn.ubuntu.com/1369-1/
14
reference_url https://usn.ubuntu.com/1370-1/
reference_id USN-1370-1
reference_type
scores
url https://usn.ubuntu.com/1370-1/
fixed_packages
0
url pkg:deb/debian/libvorbisidec@1.0.2%2Bsvn18153-0.1?distro=trixie
purl pkg:deb/debian/libvorbisidec@1.0.2%2Bsvn18153-0.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.0.2%252Bsvn18153-0.1%3Fdistro=trixie
1
url pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-7?distro=trixie
purl pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.2.1%252Bgit20180316-7%3Fdistro=trixie
2
url pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-8?distro=trixie
purl pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.2.1%252Bgit20180316-8%3Fdistro=trixie
aliases CVE-2012-0444
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gajm-zb2s-ukgz
9
url VCID-mddv-hvgp-u3aa
vulnerability_id VCID-mddv-hvgp-u3aa
summary
Multiple vulnerabilities in libvorbis might lead to the execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1423.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1423.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1423
reference_id
reference_type
scores
0
value 0.10744
scoring_system epss
scoring_elements 0.93303
published_at 2026-04-01T12:55:00Z
1
value 0.10744
scoring_system epss
scoring_elements 0.93312
published_at 2026-04-02T12:55:00Z
2
value 0.10744
scoring_system epss
scoring_elements 0.93317
published_at 2026-04-04T12:55:00Z
3
value 0.10744
scoring_system epss
scoring_elements 0.93316
published_at 2026-04-07T12:55:00Z
4
value 0.10744
scoring_system epss
scoring_elements 0.93324
published_at 2026-04-08T12:55:00Z
5
value 0.10744
scoring_system epss
scoring_elements 0.93329
published_at 2026-04-09T12:55:00Z
6
value 0.10744
scoring_system epss
scoring_elements 0.93333
published_at 2026-04-13T12:55:00Z
7
value 0.10744
scoring_system epss
scoring_elements 0.93332
published_at 2026-04-12T12:55:00Z
8
value 0.10744
scoring_system epss
scoring_elements 0.9335
published_at 2026-04-16T12:55:00Z
9
value 0.10744
scoring_system epss
scoring_elements 0.93355
published_at 2026-04-18T12:55:00Z
10
value 0.10744
scoring_system epss
scoring_elements 0.93362
published_at 2026-04-21T12:55:00Z
11
value 0.10744
scoring_system epss
scoring_elements 0.93367
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1423
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1423
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1423
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=440709
reference_id 440709
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=440709
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=482518
reference_id 482518
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=482518
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669196
reference_id 669196
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669196
6
reference_url https://security.gentoo.org/glsa/200806-09
reference_id GLSA-200806-09
reference_type
scores
url https://security.gentoo.org/glsa/200806-09
7
reference_url https://access.redhat.com/errata/RHSA-2008:0270
reference_id RHSA-2008:0270
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0270
8
reference_url https://access.redhat.com/errata/RHSA-2008:0271
reference_id RHSA-2008:0271
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0271
9
reference_url https://usn.ubuntu.com/682-1/
reference_id USN-682-1
reference_type
scores
url https://usn.ubuntu.com/682-1/
fixed_packages
0
url pkg:deb/debian/libvorbisidec@1.0.2%2Bsvn18153-0.1?distro=trixie
purl pkg:deb/debian/libvorbisidec@1.0.2%2Bsvn18153-0.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.0.2%252Bsvn18153-0.1%3Fdistro=trixie
1
url pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-7?distro=trixie
purl pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.2.1%252Bgit20180316-7%3Fdistro=trixie
2
url pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-8?distro=trixie
purl pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.2.1%252Bgit20180316-8%3Fdistro=trixie
aliases CVE-2008-1423
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mddv-hvgp-u3aa
10
url VCID-mekv-71pb-mfdw
vulnerability_id VCID-mekv-71pb-mfdw
summary
A buffer overflow vulnerability and several memory corruptions have been
    discovered in libvorbis.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4065.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4065.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4065
reference_id
reference_type
scores
0
value 0.05346
scoring_system epss
scoring_elements 0.90029
published_at 2026-04-01T12:55:00Z
1
value 0.05346
scoring_system epss
scoring_elements 0.90032
published_at 2026-04-02T12:55:00Z
2
value 0.05346
scoring_system epss
scoring_elements 0.90043
published_at 2026-04-04T12:55:00Z
3
value 0.05346
scoring_system epss
scoring_elements 0.90048
published_at 2026-04-07T12:55:00Z
4
value 0.05346
scoring_system epss
scoring_elements 0.90063
published_at 2026-04-08T12:55:00Z
5
value 0.05346
scoring_system epss
scoring_elements 0.90069
published_at 2026-04-09T12:55:00Z
6
value 0.05424
scoring_system epss
scoring_elements 0.90166
published_at 2026-04-11T12:55:00Z
7
value 0.05424
scoring_system epss
scoring_elements 0.90164
published_at 2026-04-12T12:55:00Z
8
value 0.05424
scoring_system epss
scoring_elements 0.90159
published_at 2026-04-13T12:55:00Z
9
value 0.05424
scoring_system epss
scoring_elements 0.90177
published_at 2026-04-18T12:55:00Z
10
value 0.05424
scoring_system epss
scoring_elements 0.90173
published_at 2026-04-21T12:55:00Z
11
value 0.05424
scoring_system epss
scoring_elements 0.90188
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4065
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4065
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=249780
reference_id 249780
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=249780
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669196
reference_id 669196
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669196
5
reference_url https://security.gentoo.org/glsa/200710-03
reference_id GLSA-200710-03
reference_type
scores
url https://security.gentoo.org/glsa/200710-03
6
reference_url https://access.redhat.com/errata/RHSA-2007:0845
reference_id RHSA-2007:0845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0845
7
reference_url https://access.redhat.com/errata/RHSA-2007:0912
reference_id RHSA-2007:0912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0912
fixed_packages
0
url pkg:deb/debian/libvorbisidec@1.0.2%2Bsvn16259-2?distro=trixie
purl pkg:deb/debian/libvorbisidec@1.0.2%2Bsvn16259-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.0.2%252Bsvn16259-2%3Fdistro=trixie
1
url pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-7?distro=trixie
purl pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.2.1%252Bgit20180316-7%3Fdistro=trixie
2
url pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-8?distro=trixie
purl pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.2.1%252Bgit20180316-8%3Fdistro=trixie
aliases CVE-2007-4065
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mekv-71pb-mfdw
11
url VCID-xdfe-jqzv-rbb4
vulnerability_id VCID-xdfe-jqzv-rbb4
summary
A processing error in libvorbis might result in the execution of arbitrary
    code or a Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2663.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2663.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-2663
reference_id
reference_type
scores
0
value 0.02221
scoring_system epss
scoring_elements 0.84547
published_at 2026-04-24T12:55:00Z
1
value 0.02221
scoring_system epss
scoring_elements 0.84518
published_at 2026-04-18T12:55:00Z
2
value 0.02221
scoring_system epss
scoring_elements 0.8452
published_at 2026-04-21T12:55:00Z
3
value 0.02221
scoring_system epss
scoring_elements 0.84425
published_at 2026-04-01T12:55:00Z
4
value 0.02221
scoring_system epss
scoring_elements 0.84441
published_at 2026-04-02T12:55:00Z
5
value 0.02221
scoring_system epss
scoring_elements 0.8446
published_at 2026-04-04T12:55:00Z
6
value 0.02221
scoring_system epss
scoring_elements 0.84461
published_at 2026-04-07T12:55:00Z
7
value 0.02221
scoring_system epss
scoring_elements 0.84482
published_at 2026-04-08T12:55:00Z
8
value 0.02221
scoring_system epss
scoring_elements 0.84488
published_at 2026-04-09T12:55:00Z
9
value 0.02221
scoring_system epss
scoring_elements 0.84507
published_at 2026-04-11T12:55:00Z
10
value 0.02221
scoring_system epss
scoring_elements 0.84501
published_at 2026-04-12T12:55:00Z
11
value 0.02221
scoring_system epss
scoring_elements 0.84496
published_at 2026-04-13T12:55:00Z
12
value 0.02221
scoring_system epss
scoring_elements 0.84517
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-2663
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=516259
reference_id 516259
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=516259
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=540958
reference_id 540958
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=540958
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669196
reference_id 669196
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669196
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2663
reference_id CVE-2009-2663
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2663
6
reference_url https://security.gentoo.org/glsa/200909-02
reference_id GLSA-200909-02
reference_type
scores
url https://security.gentoo.org/glsa/200909-02
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-45
reference_id mfsa2009-45
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-45
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-63
reference_id mfsa2009-63
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-63
9
reference_url https://access.redhat.com/errata/RHSA-2009:1219
reference_id RHSA-2009:1219
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1219
10
reference_url https://usn.ubuntu.com/825-1/
reference_id USN-825-1
reference_type
scores
url https://usn.ubuntu.com/825-1/
fixed_packages
0
url pkg:deb/debian/libvorbisidec@1.0.2%2Bsvn16259-2?distro=trixie
purl pkg:deb/debian/libvorbisidec@1.0.2%2Bsvn16259-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.0.2%252Bsvn16259-2%3Fdistro=trixie
1
url pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-7?distro=trixie
purl pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.2.1%252Bgit20180316-7%3Fdistro=trixie
2
url pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-8?distro=trixie
purl pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.2.1%252Bgit20180316-8%3Fdistro=trixie
aliases CVE-2009-2663
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xdfe-jqzv-rbb4
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.2.1%252Bgit20180316-7%3Fdistro=trixie