Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/libvpx@1.4.0-1?distro=trixie
Typedeb
Namespacedebian
Namelibvpx
Version1.4.0-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.4.0-4
Latest_non_vulnerable_version1.16.0-3
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-s76d-pjvk-63cr
vulnerability_id VCID-s76d-pjvk-63cr
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4485.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4485.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4485
reference_id
reference_type
scores
0
value 0.07599
scoring_system epss
scoring_elements 0.9187
published_at 2026-04-26T12:55:00Z
1
value 0.07599
scoring_system epss
scoring_elements 0.9181
published_at 2026-04-01T12:55:00Z
2
value 0.07599
scoring_system epss
scoring_elements 0.91818
published_at 2026-04-02T12:55:00Z
3
value 0.07599
scoring_system epss
scoring_elements 0.91824
published_at 2026-04-04T12:55:00Z
4
value 0.07599
scoring_system epss
scoring_elements 0.91832
published_at 2026-04-07T12:55:00Z
5
value 0.07599
scoring_system epss
scoring_elements 0.91845
published_at 2026-04-08T12:55:00Z
6
value 0.07599
scoring_system epss
scoring_elements 0.91851
published_at 2026-04-09T12:55:00Z
7
value 0.07599
scoring_system epss
scoring_elements 0.91855
published_at 2026-04-11T12:55:00Z
8
value 0.07599
scoring_system epss
scoring_elements 0.91856
published_at 2026-04-12T12:55:00Z
9
value 0.07599
scoring_system epss
scoring_elements 0.91852
published_at 2026-04-13T12:55:00Z
10
value 0.07599
scoring_system epss
scoring_elements 0.91871
published_at 2026-04-24T12:55:00Z
11
value 0.07599
scoring_system epss
scoring_elements 0.91867
published_at 2026-04-18T12:55:00Z
12
value 0.07599
scoring_system epss
scoring_elements 0.91866
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4485
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1252292
reference_id 1252292
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1252292
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4485
reference_id CVE-2015-4485
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4485
4
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-89
reference_id mfsa2015-89
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-89
6
reference_url https://access.redhat.com/errata/RHSA-2015:1586
reference_id RHSA-2015:1586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1586
7
reference_url https://usn.ubuntu.com/2702-1/
reference_id USN-2702-1
reference_type
scores
url https://usn.ubuntu.com/2702-1/
fixed_packages
0
url pkg:deb/debian/libvpx@1.4.0-1?distro=trixie
purl pkg:deb/debian/libvpx@1.4.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvpx@1.4.0-1%3Fdistro=trixie
1
url pkg:deb/debian/libvpx@1.9.0-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/libvpx@1.9.0-1%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvpx@1.9.0-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/libvpx@1.12.0-1%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/libvpx@1.12.0-1%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvpx@1.12.0-1%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/libvpx@1.15.0-2.1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/libvpx@1.15.0-2.1%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvpx@1.15.0-2.1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/libvpx@1.16.0-3?distro=trixie
purl pkg:deb/debian/libvpx@1.16.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvpx@1.16.0-3%3Fdistro=trixie
aliases CVE-2015-4485
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s76d-pjvk-63cr
1
url VCID-tbkw-k4a7-43fp
vulnerability_id VCID-tbkw-k4a7-43fp
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4486.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4486.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4486
reference_id
reference_type
scores
0
value 0.01667
scoring_system epss
scoring_elements 0.8217
published_at 2026-04-26T12:55:00Z
1
value 0.01667
scoring_system epss
scoring_elements 0.82035
published_at 2026-04-01T12:55:00Z
2
value 0.01667
scoring_system epss
scoring_elements 0.82047
published_at 2026-04-02T12:55:00Z
3
value 0.01667
scoring_system epss
scoring_elements 0.82068
published_at 2026-04-04T12:55:00Z
4
value 0.01667
scoring_system epss
scoring_elements 0.82064
published_at 2026-04-07T12:55:00Z
5
value 0.01667
scoring_system epss
scoring_elements 0.8209
published_at 2026-04-08T12:55:00Z
6
value 0.01667
scoring_system epss
scoring_elements 0.82097
published_at 2026-04-09T12:55:00Z
7
value 0.01667
scoring_system epss
scoring_elements 0.82116
published_at 2026-04-11T12:55:00Z
8
value 0.01667
scoring_system epss
scoring_elements 0.82107
published_at 2026-04-12T12:55:00Z
9
value 0.01667
scoring_system epss
scoring_elements 0.82099
published_at 2026-04-13T12:55:00Z
10
value 0.01667
scoring_system epss
scoring_elements 0.82134
published_at 2026-04-18T12:55:00Z
11
value 0.01667
scoring_system epss
scoring_elements 0.82136
published_at 2026-04-21T12:55:00Z
12
value 0.01667
scoring_system epss
scoring_elements 0.82159
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4486
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1252292
reference_id 1252292
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1252292
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4486
reference_id CVE-2015-4486
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4486
4
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-89
reference_id mfsa2015-89
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-89
6
reference_url https://access.redhat.com/errata/RHSA-2015:1586
reference_id RHSA-2015:1586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1586
7
reference_url https://usn.ubuntu.com/2702-1/
reference_id USN-2702-1
reference_type
scores
url https://usn.ubuntu.com/2702-1/
fixed_packages
0
url pkg:deb/debian/libvpx@1.4.0-1?distro=trixie
purl pkg:deb/debian/libvpx@1.4.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvpx@1.4.0-1%3Fdistro=trixie
1
url pkg:deb/debian/libvpx@1.9.0-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/libvpx@1.9.0-1%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvpx@1.9.0-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/libvpx@1.12.0-1%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/libvpx@1.12.0-1%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvpx@1.12.0-1%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/libvpx@1.15.0-2.1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/libvpx@1.15.0-2.1%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvpx@1.15.0-2.1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/libvpx@1.16.0-3?distro=trixie
purl pkg:deb/debian/libvpx@1.16.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvpx@1.16.0-3%3Fdistro=trixie
aliases CVE-2015-4486
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tbkw-k4a7-43fp
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/libvpx@1.4.0-1%3Fdistro=trixie