Lookup for vulnerable packages by Package URL.

GET /api/packages/931173?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/931173?format=api",
    "purl": "pkg:deb/debian/mplayer@1.0~pre6a-1?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "mplayer",
    "version": "1.0~pre6a-1",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "1.0~rc1-1",
    "latest_non_vulnerable_version": "2:1.5+svn38681-1",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91187?format=api",
            "vulnerability_id": "VCID-aphu-dez9-ryc2",
            "summary": "Multiple buffer overflows in the Real-Time Streaming Protocol (RTSP) client for (1) MPlayer before 1.0pre4 and (2) xine lib (xine-lib) before 1-rc4, when playing Real RTSP (realrtsp) streams, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (a) long URLs, (b) long Real server responses, or (c) long Real Data Transport (RDT) packets.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0433",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86722",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86732",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86752",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8675",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8677",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86779",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86792",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86789",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86784",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86799",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86804",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86802",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0433"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0433",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0433"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931173?format=api",
                    "purl": "pkg:deb/debian/mplayer@1.0~pre6a-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~pre6a-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api",
                    "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4f83-6dmk-rybu"
                        },
                        {
                            "vulnerability": "VCID-kyv5-fhuz-n7f1"
                        },
                        {
                            "vulnerability": "VCID-z3dv-rb28-kycj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api",
                    "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api",
                    "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api",
                    "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2004-0433"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aphu-dez9-ryc2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91245?format=api",
            "vulnerability_id": "VCID-evnt-mtjq-mueg",
            "summary": "Heap-based buffer overflow in the demux_open_bmp function in demux_bmp.c for Unix MPlayer 1.0pre5 allows remote attackers to execute arbitrary code via a bitmap (BMP) file containing a large biClrUsed field.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-1309",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9022",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.05476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90161",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90164",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90176",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90181",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90197",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90202",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90211",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9021",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90205",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90223",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.05476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90224",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-1309"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1309",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1309"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18527",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18527"
                },
                {
                    "reference_url": "http://www1.mplayerhq.hu/MPlayer/releases/ChangeLog",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www1.mplayerhq.hu/MPlayer/releases/ChangeLog"
                },
                {
                    "reference_url": "http://www.idefense.com/application/poi/display?id=168",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.idefense.com/application/poi/display?id=168"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:157",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:157"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:unix_mplayer:1.0_pre5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mplayer:unix_mplayer:1.0_pre5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:unix_mplayer:1.0_pre5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1309",
                    "reference_id": "CVE-2004-1309",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1309"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931173?format=api",
                    "purl": "pkg:deb/debian/mplayer@1.0~pre6a-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~pre6a-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api",
                    "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4f83-6dmk-rybu"
                        },
                        {
                            "vulnerability": "VCID-kyv5-fhuz-n7f1"
                        },
                        {
                            "vulnerability": "VCID-z3dv-rb28-kycj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api",
                    "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api",
                    "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api",
                    "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2004-1309"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-evnt-mtjq-mueg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60767?format=api",
            "vulnerability_id": "VCID-sm8z-qqhz-93cv",
            "summary": "MPlayer contains a remotely exploitable buffer overflow in the HTTP parser\n    that may allow attackers to run arbitrary code on a user's computer.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0386",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.36771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97114",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.36771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97121",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.36771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97128",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.36771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97138",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.36771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97142",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.36771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97144",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.36771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97152",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.36771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97153",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.36771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97157",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0386"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0386",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0386"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/23896.txt",
                    "reference_id": "CVE-2004-0386;OSVDB-4754",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/23896.txt"
                },
                {
                    "reference_url": "https://www.securityfocus.com/bid/10008/info",
                    "reference_id": "CVE-2004-0386;OSVDB-4754",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://www.securityfocus.com/bid/10008/info"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200403-13",
                    "reference_id": "GLSA-200403-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200403-13"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931173?format=api",
                    "purl": "pkg:deb/debian/mplayer@1.0~pre6a-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~pre6a-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api",
                    "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4f83-6dmk-rybu"
                        },
                        {
                            "vulnerability": "VCID-kyv5-fhuz-n7f1"
                        },
                        {
                            "vulnerability": "VCID-z3dv-rb28-kycj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api",
                    "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api",
                    "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api",
                    "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2004-0386"
            ],
            "risk_score": 0.6,
            "exploitability": "2.0",
            "weighted_severity": "0.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sm8z-qqhz-93cv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91247?format=api",
            "vulnerability_id": "VCID-st2b-1ue7-fkcs",
            "summary": "Integer overflow in the real_setup_and_get_header function in real.c for Unix MPlayer 1.0pre5 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a Real RTSP streaming media file with a -1 content-length field, which leads to a heap-based buffer overflow.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-1311",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87462",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87393",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87403",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87417",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87416",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87435",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87442",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87453",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87449",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87445",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8746",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-1311"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1311",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1311"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18525",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18525"
                },
                {
                    "reference_url": "http://www1.mplayerhq.hu/MPlayer/patches/rtsp_fix_20041215.diff",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www1.mplayerhq.hu/MPlayer/patches/rtsp_fix_20041215.diff"
                },
                {
                    "reference_url": "http://www1.mplayerhq.hu/MPlayer/releases/ChangeLog",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www1.mplayerhq.hu/MPlayer/releases/ChangeLog"
                },
                {
                    "reference_url": "http://www.idefense.com/application/poi/display?id=166",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.idefense.com/application/poi/display?id=166"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:157",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:157"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1311",
                    "reference_id": "CVE-2004-1311",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1311"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931173?format=api",
                    "purl": "pkg:deb/debian/mplayer@1.0~pre6a-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~pre6a-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api",
                    "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4f83-6dmk-rybu"
                        },
                        {
                            "vulnerability": "VCID-kyv5-fhuz-n7f1"
                        },
                        {
                            "vulnerability": "VCID-z3dv-rb28-kycj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api",
                    "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api",
                    "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api",
                    "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2004-1311"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-st2b-1ue7-fkcs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91246?format=api",
            "vulnerability_id": "VCID-wyvf-q6re-jfgf",
            "summary": "Stack-based buffer overflow in the asf_mmst_streaming.c functionality for MPlayer 1.0pre5 allows remote attackers to execute arbitrary code via a large MMST stream packet.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-1310",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90431",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.05704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90379",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90382",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90394",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90398",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90412",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90419",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90426",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90418",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90434",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-1310"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1310",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1310"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18526",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18526"
                },
                {
                    "reference_url": "http://www1.mplayerhq.hu/MPlayer/patches/mmst_fix_20041215.diff",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www1.mplayerhq.hu/MPlayer/patches/mmst_fix_20041215.diff"
                },
                {
                    "reference_url": "http://www1.mplayerhq.hu/MPlayer/releases/ChangeLog",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www1.mplayerhq.hu/MPlayer/releases/ChangeLog"
                },
                {
                    "reference_url": "http://www.idefense.com/application/poi/display?id=167",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.idefense.com/application/poi/display?id=167"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:157",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:157"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1310",
                    "reference_id": "CVE-2004-1310",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1310"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931173?format=api",
                    "purl": "pkg:deb/debian/mplayer@1.0~pre6a-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~pre6a-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api",
                    "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4f83-6dmk-rybu"
                        },
                        {
                            "vulnerability": "VCID-kyv5-fhuz-n7f1"
                        },
                        {
                            "vulnerability": "VCID-z3dv-rb28-kycj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api",
                    "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api",
                    "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api",
                    "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2004-1310"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wyvf-q6re-jfgf"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~pre6a-1%3Fdistro=trixie"
}