Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/931174?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "type": "deb", "namespace": "debian", "name": "mplayer", "version": "2:1.4+ds1-1+deb11u1", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "2:1.5+svn38408-1", "latest_non_vulnerable_version": "2:1.5+svn38681-1", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49466?format=api", "vulnerability_id": "VCID-4f83-6dmk-rybu", "summary": "Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38853", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09439", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09488", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.094", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09474", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09522", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09535", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09506", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09489", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09382", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09383", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09533", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38853" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38853", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38853" }, { "reference_url": "https://security.gentoo.org/glsa/202405-05", "reference_id": "GLSA-202405-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-05" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-38853" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4f83-6dmk-rybu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49463?format=api", "vulnerability_id": "VCID-kyv5-fhuz-n7f1", "summary": "Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38600", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.2079", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20848", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20563", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20639", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20701", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.2072", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20677", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20625", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20611", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20608", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20599", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38600" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021013", "reference_id": "1021013", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021013" }, { "reference_url": "https://security.gentoo.org/glsa/202405-05", "reference_id": "GLSA-202405-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-05" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-38600" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kyv5-fhuz-n7f1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49468?format=api", "vulnerability_id": "VCID-z3dv-rb28-kycj", "summary": "Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38856", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09439", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09488", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.094", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09474", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09522", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09535", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09506", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09489", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09382", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09383", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09533", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38856" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38856", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38856" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021013", "reference_id": "1021013", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021013" }, { "reference_url": "https://security.gentoo.org/glsa/202405-05", "reference_id": "GLSA-202405-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-05" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-38856" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z3dv-rb28-kycj" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34979?format=api", "vulnerability_id": "VCID-1228-m28x-bkbm", "summary": "Multiple vulnerabilities have been found in MPlayer and the bundled\n FFmpeg, the worst of which may lead to the execution of arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4610", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04522", "scoring_system": "epss", "scoring_elements": "0.89171", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04522", "scoring_system": "epss", "scoring_elements": "0.89109", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04522", "scoring_system": "epss", "scoring_elements": "0.89117", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04522", "scoring_system": "epss", "scoring_elements": "0.89131", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04522", "scoring_system": "epss", "scoring_elements": "0.89134", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04522", "scoring_system": "epss", "scoring_elements": "0.89152", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04522", "scoring_system": "epss", "scoring_elements": "0.89157", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04522", "scoring_system": "epss", "scoring_elements": "0.89167", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04522", "scoring_system": "epss", "scoring_elements": "0.89163", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04522", "scoring_system": "epss", "scoring_elements": "0.8916", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04522", "scoring_system": "epss", "scoring_elements": "0.89173", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4610" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4610", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4610" }, { "reference_url": "http://secunia.com/advisories/34296", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34296" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2008/10/07/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2008/10/07/1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-734-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-734-1" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=407010", "reference_id": "407010", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=407010" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4610", "reference_id": "CVE-2008-4610", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4610" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/32856.txt", "reference_id": "CVE-2008-4610;OSVDB-49423", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/32856.txt" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/32857.txt", "reference_id": "CVE-2008-4610;OSVDB-49424", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/32857.txt" }, { "reference_url": "https://www.securityfocus.com/bid/34136/info", "reference_id": "CVE-2008-4610;OSVDB-49424", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/34136/info" }, { "reference_url": "https://security.gentoo.org/glsa/201310-13", "reference_id": "GLSA-201310-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-13" }, { "reference_url": "https://usn.ubuntu.com/734-1/", "reference_id": "USN-734-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/734-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931187?format=api", "purl": "pkg:deb/debian/mplayer@1.0~rc2-20?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-20%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2008-4610" ], "risk_score": 9.0, "exploitability": "2.0", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1228-m28x-bkbm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40187?format=api", "vulnerability_id": "VCID-1dp9-jbnu-abcm", "summary": "Multiple vulnerabilities in FFmpeg may lead to the remote execution of\n arbitrary code or a Denial of Service.", "references": [ { "reference_url": "http://archives.neohapsis.com/archives/fulldisclosure/2008-09/0103.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2008-09/0103.html" }, { "reference_url": "http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2008-August/016352.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2008-August/016352.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4867", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02422", "scoring_system": "epss", "scoring_elements": "0.85155", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02422", "scoring_system": "epss", "scoring_elements": "0.8506", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02422", "scoring_system": "epss", "scoring_elements": "0.85073", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02422", "scoring_system": "epss", "scoring_elements": "0.85091", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02422", "scoring_system": "epss", "scoring_elements": "0.85095", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02422", "scoring_system": "epss", "scoring_elements": "0.85116", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02422", "scoring_system": "epss", "scoring_elements": "0.85124", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02422", "scoring_system": "epss", "scoring_elements": "0.85138", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02422", "scoring_system": "epss", "scoring_elements": "0.85136", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02422", "scoring_system": "epss", "scoring_elements": "0.85132", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02422", "scoring_system": "epss", "scoring_elements": "0.85154", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02422", "scoring_system": "epss", "scoring_elements": "0.85157", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4867" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4867", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4867" }, { "reference_url": "http://secunia.com/advisories/34296", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34296" }, { "reference_url": "http://secunia.com/advisories/34385", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34385" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200903-33.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200903-33.xml" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46324", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46324" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:013", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:013" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:014", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:014" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:015", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:015" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2008/10/29/6", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2008/10/29/6" }, { "reference_url": "http://www.securityfocus.com/bid/33308", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/33308" }, { "reference_url": "http://www.ubuntu.com/usn/USN-734-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-734-1" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4867", "reference_id": "CVE-2008-4867", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4867" }, { "reference_url": "https://security.gentoo.org/glsa/200903-33", "reference_id": "GLSA-200903-33", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200903-33" }, { "reference_url": "https://usn.ubuntu.com/734-1/", "reference_id": "USN-734-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/734-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931188?format=api", "purl": "pkg:deb/debian/mplayer@1.0~rc2-14?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-14%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2008-4867" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1dp9-jbnu-abcm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34110?format=api", "vulnerability_id": "VCID-1tfb-jxj1-h7gw", "summary": "When compiled with GUI support MPlayer is vulnerable to a remotely\n exploitable buffer overflow attack.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0659", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04453", "scoring_system": "epss", "scoring_elements": "0.89014", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04453", "scoring_system": "epss", "scoring_elements": "0.89022", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04453", "scoring_system": "epss", "scoring_elements": "0.89037", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04453", "scoring_system": "epss", "scoring_elements": "0.89039", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04453", "scoring_system": "epss", "scoring_elements": "0.89057", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04453", "scoring_system": "epss", "scoring_elements": "0.89062", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04453", "scoring_system": "epss", "scoring_elements": "0.89073", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04453", "scoring_system": "epss", "scoring_elements": "0.89069", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04453", "scoring_system": "epss", "scoring_elements": "0.89067", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04453", "scoring_system": "epss", "scoring_elements": "0.89081", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04453", "scoring_system": "epss", "scoring_elements": "0.89078", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0659" }, { "reference_url": "https://security.gentoo.org/glsa/200408-01", "reference_id": "GLSA-200408-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200408-01" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/308.c", "reference_id": "OSVDB-7282;CVE-2004-0659", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/308.c" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931177?format=api", "purl": "pkg:deb/debian/mplayer@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2004-0659" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1tfb-jxj1-h7gw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58563?format=api", "vulnerability_id": "VCID-2ddg-c99t-9ye1", "summary": "Multiple vulnerabilities have been discovered in MPlayer, possibly allowing\n for the remote execution of arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0629", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02652", "scoring_system": "epss", "scoring_elements": "0.85688", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02652", "scoring_system": "epss", "scoring_elements": "0.85701", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02652", "scoring_system": "epss", "scoring_elements": "0.85719", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02652", "scoring_system": "epss", "scoring_elements": "0.85725", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02652", "scoring_system": "epss", "scoring_elements": "0.85744", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02652", "scoring_system": "epss", "scoring_elements": "0.85755", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02652", "scoring_system": "epss", "scoring_elements": "0.8577", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02652", "scoring_system": "epss", "scoring_elements": "0.85767", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02652", "scoring_system": "epss", "scoring_elements": "0.85763", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02652", "scoring_system": "epss", "scoring_elements": "0.85781", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02652", "scoring_system": "epss", "scoring_elements": "0.85786", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02652", "scoring_system": "epss", "scoring_elements": "0.8578", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0629" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464533", "reference_id": "464533", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464533" }, { "reference_url": "https://security.gentoo.org/glsa/200803-16", "reference_id": "GLSA-200803-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200803-16" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931184?format=api", "purl": "pkg:deb/debian/mplayer@1.0~rc2-8?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-8%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2008-0629" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2ddg-c99t-9ye1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46599?format=api", "vulnerability_id": "VCID-38xc-8rtk-qfes", "summary": "Multiple vulnerabilities have been discovered in MPlayer, possibly allowing\n for the remote execution of arbitrary code.", "references": [ { "reference_url": "http://lists.mplayerhq.hu/pipermail/mplayer-announce/2007-June/000066.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.mplayerhq.hu/pipermail/mplayer-announce/2007-June/000066.html" }, { "reference_url": "http://osvdb.org/36991", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/36991" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-2948", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.13236", "scoring_system": "epss", "scoring_elements": "0.94167", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.13236", "scoring_system": "epss", "scoring_elements": "0.94104", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.13236", "scoring_system": "epss", "scoring_elements": "0.94113", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.13236", "scoring_system": "epss", "scoring_elements": "0.94125", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.13236", "scoring_system": "epss", "scoring_elements": "0.94129", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.13236", "scoring_system": "epss", "scoring_elements": "0.94138", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.13236", "scoring_system": "epss", "scoring_elements": "0.94142", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.13236", "scoring_system": "epss", "scoring_elements": "0.94147", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.13236", "scoring_system": "epss", "scoring_elements": "0.94163", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.13236", "scoring_system": "epss", "scoring_elements": "0.94168", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-2948" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2948", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2948" }, { "reference_url": "http://secunia.com/advisories/24302", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24302" }, { "reference_url": "http://secunia.com/advisories/25713", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25713" }, { "reference_url": "http://secunia.com/advisories/25940", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25940" }, { "reference_url": "http://secunia.com/advisories/26083", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26083" }, { "reference_url": "http://secunia.com/advisories/26207", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26207" }, { "reference_url": "http://secunia.com/secunia_research/2007-55/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/secunia_research/2007-55/" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200707-07.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200707-07.xml" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34749", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34749" }, { "reference_url": "http://svn.mplayerhq.hu/mplayer/trunk/stream/stream_cddb.c?r1=23287&r2=23470&diff_format=u", "reference_id": "", "reference_type": "", "scores": [], "url": "http://svn.mplayerhq.hu/mplayer/trunk/stream/stream_cddb.c?r1=23287&r2=23470&diff_format=u" }, { "reference_url": "http://www.debian.org/security/2007/dsa-1313", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2007/dsa-1313" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:143", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:143" }, { "reference_url": "http://www.mplayerhq.hu/design7/news.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mplayerhq.hu/design7/news.html" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2007_14_sr.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2007_14_sr.html" }, { "reference_url": "http://www.securityfocus.com/bid/24339", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/24339" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/2080", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/2080" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_rc1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_rc1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_rc1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2948", "reference_id": "CVE-2007-2948", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2948" }, { "reference_url": "https://security.gentoo.org/glsa/200707-07", "reference_id": "GLSA-200707-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200707-07" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931181?format=api", "purl": "pkg:deb/debian/mplayer@1.0~rc1-14?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc1-14%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2007-2948" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-38xc-8rtk-qfes" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49465?format=api", "vulnerability_id": "VCID-4jd9-pt54-1bag", "summary": "Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38851", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18492", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18546", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18254", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18337", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.1839", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18342", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.1829", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18234", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18246", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18273", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38851" }, { "reference_url": "https://security.gentoo.org/glsa/202405-05", "reference_id": "GLSA-202405-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-05" }, { "reference_url": "https://usn.ubuntu.com/5895-1/", "reference_id": "USN-5895-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5895-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-38851" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4jd9-pt54-1bag" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35029?format=api", "vulnerability_id": "VCID-75p5-9stz-dffu", "summary": "Multiple vulnerabilities have been found in VLC, the worst of which\n could lead to user-assisted execution of arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6934", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03978", "scoring_system": "epss", "scoring_elements": "0.88343", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03978", "scoring_system": "epss", "scoring_elements": "0.88352", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03978", "scoring_system": "epss", "scoring_elements": "0.88366", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03978", "scoring_system": "epss", "scoring_elements": "0.88371", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03978", "scoring_system": "epss", "scoring_elements": "0.8839", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03978", "scoring_system": "epss", "scoring_elements": "0.88396", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03978", "scoring_system": "epss", "scoring_elements": "0.88406", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03978", "scoring_system": "epss", "scoring_elements": "0.88399", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03978", "scoring_system": "epss", "scoring_elements": "0.88413", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03978", "scoring_system": "epss", "scoring_elements": "0.88409", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6934" }, { "reference_url": "https://security.gentoo.org/glsa/201411-01", "reference_id": "GLSA-201411-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201411-01" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931177?format=api", "purl": "pkg:deb/debian/mplayer@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2013-6934" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-75p5-9stz-dffu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49473?format=api", "vulnerability_id": "VCID-8uk8-jxh7-k7aa", "summary": "Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38863", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19364", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19415", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19132", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19212", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19264", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.1927", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19224", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19169", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.1913", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19139", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19147", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38863" }, { "reference_url": "https://security.gentoo.org/glsa/202405-05", "reference_id": "GLSA-202405-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-05" }, { "reference_url": "https://usn.ubuntu.com/5895-1/", "reference_id": "USN-5895-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5895-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-38863" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8uk8-jxh7-k7aa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49471?format=api", "vulnerability_id": "VCID-9tg7-9r5m-dkgn", "summary": "Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38861", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21284", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21337", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.2109", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.2117", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.2123", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21241", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21199", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21147", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.2114", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.2115", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21127", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38861" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021013", "reference_id": "1021013", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021013" }, { "reference_url": "https://security.gentoo.org/glsa/202405-05", "reference_id": "GLSA-202405-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-05" }, { "reference_url": "https://usn.ubuntu.com/5895-1/", "reference_id": "USN-5895-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5895-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-38861" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9tg7-9r5m-dkgn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49476?format=api", "vulnerability_id": "VCID-9vx1-3zb9-5bf1", "summary": "Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38866", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20954", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.21012", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20729", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20807", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20868", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20883", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.2084", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20788", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20778", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.2077", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20756", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38866" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38866", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38866" }, { "reference_url": "https://security.gentoo.org/glsa/202405-05", "reference_id": "GLSA-202405-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-05" }, { "reference_url": "https://usn.ubuntu.com/5895-1/", "reference_id": "USN-5895-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5895-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-38866" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9vx1-3zb9-5bf1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91187?format=api", "vulnerability_id": "VCID-aphu-dez9-ryc2", "summary": "Multiple buffer overflows in the Real-Time Streaming Protocol (RTSP) client for (1) MPlayer before 1.0pre4 and (2) xine lib (xine-lib) before 1-rc4, when playing Real RTSP (realrtsp) streams, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (a) long URLs, (b) long Real server responses, or (c) long Real Data Transport (RDT) packets.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0433", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03088", "scoring_system": "epss", "scoring_elements": "0.86722", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03088", "scoring_system": "epss", "scoring_elements": "0.86732", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03088", "scoring_system": "epss", "scoring_elements": "0.86752", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03088", "scoring_system": "epss", "scoring_elements": "0.8675", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03088", "scoring_system": "epss", "scoring_elements": "0.8677", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03088", "scoring_system": "epss", "scoring_elements": "0.86779", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03088", "scoring_system": "epss", "scoring_elements": "0.86792", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03088", "scoring_system": "epss", "scoring_elements": "0.86789", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03088", "scoring_system": "epss", "scoring_elements": "0.86784", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03088", "scoring_system": "epss", "scoring_elements": "0.86799", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03088", "scoring_system": "epss", "scoring_elements": "0.86804", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03088", "scoring_system": "epss", "scoring_elements": "0.86802", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0433" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0433", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0433" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931173?format=api", "purl": "pkg:deb/debian/mplayer@1.0~pre6a-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~pre6a-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2004-0433" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aphu-dez9-ryc2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40197?format=api", "vulnerability_id": "VCID-bv1x-tr6m-qke1", "summary": "Multiple vulnerabilities in FFmpeg may lead to the remote execution of\n arbitrary code or a Denial of Service.", "references": [ { "reference_url": "http://archives.neohapsis.com/archives/fulldisclosure/2008-09/0103.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2008-09/0103.html" }, { "reference_url": "http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2008-August/016136.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2008-August/016136.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4868", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72668", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72577", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72584", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72601", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72616", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72628", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72651", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72634", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72624", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72666", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72676", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4868" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4868", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4868" }, { "reference_url": "http://secunia.com/advisories/34385", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34385" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200903-33.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200903-33.xml" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46325", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46325" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2008/10/29/6", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2008/10/29/6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4868", "reference_id": "CVE-2008-4868", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4868" }, { "reference_url": "https://security.gentoo.org/glsa/200903-33", "reference_id": "GLSA-200903-33", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200903-33" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931188?format=api", "purl": "pkg:deb/debian/mplayer@1.0~rc2-14?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-14%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2008-4868" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bv1x-tr6m-qke1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49464?format=api", "vulnerability_id": "VCID-e178-xa31-h3c4", "summary": "Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38850", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12332", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12379", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.1218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.1226", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.1231", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12318", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12282", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12245", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12134", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12136", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12246", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38850" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38850", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38850" }, { "reference_url": "https://security.gentoo.org/glsa/202405-05", "reference_id": "GLSA-202405-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-05" }, { "reference_url": "https://usn.ubuntu.com/5895-1/", "reference_id": "USN-5895-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5895-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-38850" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e178-xa31-h3c4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61680?format=api", "vulnerability_id": "VCID-equb-e7sz-d7ev", "summary": "Two vulnerabilities have been found in MPlayer which could lead to the\n remote execution of arbitrary code.", "references": [ { "reference_url": "http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/librtsp/rtsp.c?r1=1.18&r2=1.19&diff_format=u", "reference_id": "", "reference_type": "", "scores": [], "url": "http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/librtsp/rtsp.c?r1=1.18&r2=1.19&diff_format=u" }, { "reference_url": "http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/mms.c?r1=1.55&r2=1.56&diff_format=u", "reference_id": "", "reference_type": "", "scores": [], "url": "http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/mms.c?r1=1.55&r2=1.56&diff_format=u" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-1195", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02154", "scoring_system": "epss", "scoring_elements": "0.84286", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02154", "scoring_system": "epss", "scoring_elements": "0.8419", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02154", "scoring_system": "epss", "scoring_elements": "0.84203", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02154", "scoring_system": "epss", "scoring_elements": "0.84221", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02154", "scoring_system": "epss", "scoring_elements": "0.84222", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02154", "scoring_system": "epss", "scoring_elements": "0.84244", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02154", "scoring_system": "epss", "scoring_elements": "0.84251", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02154", "scoring_system": "epss", "scoring_elements": "0.84269", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02154", "scoring_system": "epss", "scoring_elements": "0.84263", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02154", "scoring_system": "epss", "scoring_elements": "0.8426", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02154", "scoring_system": "epss", "scoring_elements": "0.84281", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02154", "scoring_system": "epss", "scoring_elements": "0.84283", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-1195" }, { "reference_url": "http://seclists.org/lists/bugtraq/2005/Apr/0337.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/lists/bugtraq/2005/Apr/0337.html" }, { "reference_url": "http://secunia.com/advisories/15014", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/15014" }, { "reference_url": "http://securitytracker.com/id?1013771", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1013771" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20171", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20171" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20175", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20175" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200504-19.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200504-19.xml" }, { "reference_url": "http://www.mplayerhq.hu/homepage/design7/news.html#vuln10", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mplayerhq.hu/homepage/design7/news.html#vuln10" }, { "reference_url": "http://www.mplayerhq.hu/homepage/design7/news.html#vuln11", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mplayerhq.hu/homepage/design7/news.html#vuln11" }, { "reference_url": "http://www.osvdb.org/15711", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.osvdb.org/15711" }, { "reference_url": "http://www.osvdb.org/15712", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.osvdb.org/15712" }, { "reference_url": "http://www.securityfocus.com/archive/1/396703", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/396703" }, { "reference_url": "http://www.securityfocus.com/bid/13271", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/13271" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_rc2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_rc3a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_rc3b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_rc3c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1195", "reference_id": "CVE-2005-1195", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1195" }, { "reference_url": "https://security.gentoo.org/glsa/200504-19", "reference_id": "GLSA-200504-19", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200504-19" }, { "reference_url": "https://usn.ubuntu.com/123-1/", "reference_id": "USN-123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/123-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931177?format=api", "purl": "pkg:deb/debian/mplayer@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2005-1195" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-equb-e7sz-d7ev" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91245?format=api", "vulnerability_id": "VCID-evnt-mtjq-mueg", "summary": "Heap-based buffer overflow in the demux_open_bmp function in demux_bmp.c for Unix MPlayer 1.0pre5 allows remote attackers to execute arbitrary code via a bitmap (BMP) file containing a large biClrUsed field.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-1309", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05476", "scoring_system": "epss", "scoring_elements": "0.9022", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05476", "scoring_system": "epss", "scoring_elements": "0.90161", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05476", "scoring_system": "epss", "scoring_elements": "0.90164", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05476", "scoring_system": "epss", "scoring_elements": "0.90176", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05476", "scoring_system": "epss", "scoring_elements": "0.90181", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05476", "scoring_system": "epss", "scoring_elements": "0.90197", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05476", "scoring_system": "epss", "scoring_elements": "0.90202", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05476", "scoring_system": "epss", "scoring_elements": "0.90211", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05476", "scoring_system": "epss", "scoring_elements": "0.9021", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05476", "scoring_system": "epss", "scoring_elements": "0.90205", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05476", "scoring_system": "epss", "scoring_elements": "0.90223", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05476", "scoring_system": "epss", "scoring_elements": "0.90224", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-1309" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1309", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1309" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18527", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18527" }, { "reference_url": "http://www1.mplayerhq.hu/MPlayer/releases/ChangeLog", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www1.mplayerhq.hu/MPlayer/releases/ChangeLog" }, { "reference_url": "http://www.idefense.com/application/poi/display?id=168", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.idefense.com/application/poi/display?id=168" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:157", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:157" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:unix_mplayer:1.0_pre5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:unix_mplayer:1.0_pre5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:unix_mplayer:1.0_pre5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1309", "reference_id": "CVE-2004-1309", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1309" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931173?format=api", "purl": "pkg:deb/debian/mplayer@1.0~pre6a-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~pre6a-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2004-1309" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-evnt-mtjq-mueg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/102577?format=api", "vulnerability_id": "VCID-ff91-hyy8-nqc3", "summary": "Heap-based buffer overflow in the pnm_get_chunk function for xine 0.99.2, and other packages such as MPlayer that use the same code, allows remote attackers to execute arbitrary code via long PNA_TAG values, a different vulnerability than CVE-2004-1188.", "references": [ { "reference_url": "http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/pnm.c?r1=1.20&r2=1.21", "reference_id": "", "reference_type": "", "scores": [], "url": "http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/pnm.c?r1=1.20&r2=1.21" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-1187", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05704", "scoring_system": "epss", "scoring_elements": "0.90431", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05704", "scoring_system": "epss", "scoring_elements": "0.90379", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05704", "scoring_system": "epss", "scoring_elements": "0.90382", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05704", "scoring_system": "epss", "scoring_elements": "0.90394", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05704", "scoring_system": "epss", "scoring_elements": "0.90398", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05704", "scoring_system": "epss", "scoring_elements": "0.90412", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05704", "scoring_system": "epss", "scoring_elements": "0.90419", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05704", "scoring_system": "epss", "scoring_elements": "0.90426", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05704", "scoring_system": "epss", "scoring_elements": "0.90418", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05704", "scoring_system": "epss", "scoring_elements": "0.90434", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-1187" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18640" }, { "reference_url": "http://www.idefense.com/application/poi/display?id=176&type=vulnerabilities", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.idefense.com/application/poi/display?id=176&type=vulnerabilities" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:011", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:011" }, { "reference_url": "http://www.mplayerhq.hu/MPlayer/patches/pnm_fix_20041215.diff", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mplayerhq.hu/MPlayer/patches/pnm_fix_20041215.diff" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:head_cvs:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:head_cvs:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:head_cvs:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:0.9.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:0.9.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:0.9.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:0.9.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:0.9.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:0.9.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:0.9.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:0.9.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:0.9.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_alpha:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_alpha:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_alpha:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_beta1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_beta10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_beta11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_beta12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_beta2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_beta3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_beta4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_beta5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_beta6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_beta7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_beta8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_beta9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_rc0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc0a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_rc0a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc0a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_rc1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_rc2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_rc3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc3a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_rc3a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc3a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc3b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_rc3b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc3b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_rc4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_rc5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_rc6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc6a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_rc6a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc6a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_rc7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_rc8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:0.9.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.99:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:0.99:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.99:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_alpha:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_alpha:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_alpha:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_rc0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_rc1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_rc2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_rc3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_rc3a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_rc3b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_rc3c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_rc4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_rc5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_rc6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc6a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_rc6a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc6a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_rc7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1187", "reference_id": "CVE-2004-1187", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1187" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931177?format=api", "purl": "pkg:deb/debian/mplayer@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2004-1187" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ff91-hyy8-nqc3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34981?format=api", "vulnerability_id": "VCID-fjy3-bfzh-7beu", "summary": "Multiple vulnerabilities have been found in MPlayer and the bundled\n FFmpeg, the worst of which may lead to the execution of arbitrary code.", "references": [ { "reference_url": "http://git.mplayer2.org/mplayer2/commit/?id=27b88a09c5319deb62221b8cd0ecc14cd1136e4a", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.mplayer2.org/mplayer2/commit/?id=27b88a09c5319deb62221b8cd0ecc14cd1136e4a" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3625", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.68101", "scoring_system": "epss", "scoring_elements": "0.98603", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.68101", "scoring_system": "epss", "scoring_elements": "0.98582", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.68101", "scoring_system": "epss", "scoring_elements": "0.98584", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.68101", "scoring_system": "epss", "scoring_elements": "0.98587", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.68101", "scoring_system": "epss", "scoring_elements": "0.98589", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.68101", "scoring_system": "epss", "scoring_elements": "0.98591", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.68101", "scoring_system": "epss", "scoring_elements": "0.98592", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.68101", "scoring_system": "epss", "scoring_elements": "0.98595", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.68101", "scoring_system": "epss", "scoring_elements": "0.98597", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.68101", "scoring_system": "epss", "scoring_elements": "0.98602", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3625" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3625", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3625" }, { "reference_url": "http://secunia.com/advisories/55486", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/55486" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201310-13.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201310-13.xml" }, { "reference_url": "https://labs.mwrinfosecurity.com/system/assets/149/original/mwri_mplayer-sami-subtitles_2011-08-12.pdf", "reference_id": "", "reference_type": "", "scores": [], "url": "https://labs.mwrinfosecurity.com/system/assets/149/original/mwri_mplayer-sami-subtitles_2011-08-12.pdf" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2011/10/18/12", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2011/10/18/12" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=645987", "reference_id": "645987", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=645987" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer2:mplayer2:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer2:mplayer2:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer2:mplayer2:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ricardo_villalba:smplayer:0.6.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ricardo_villalba:smplayer:0.6.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ricardo_villalba:smplayer:0.6.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3625", "reference_id": "CVE-2011-3625", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3625" }, { "reference_url": "https://security.gentoo.org/glsa/201310-13", "reference_id": "GLSA-201310-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-13" }, { "reference_url": "http://labs.mwrinfosecurity.com/files/Advisories/mwri_mplayer-sami-subtitles_2011-08-12.pdf", "reference_id": "OSVDB-74604;CVE-2011-3625", "reference_type": "exploit", "scores": [], "url": "http://labs.mwrinfosecurity.com/files/Advisories/mwri_mplayer-sami-subtitles_2011-08-12.pdf" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/18954.rb", "reference_id": "OSVDB-74604;CVE-2011-3625", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/18954.rb" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931191?format=api", "purl": "pkg:deb/debian/mplayer@2:1.0~rc4.dfsg1%2Bsvn33713-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.0~rc4.dfsg1%252Bsvn33713-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2011-3625" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fjy3-bfzh-7beu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60430?format=api", "vulnerability_id": "VCID-fw24-pxsc-7bek", "summary": "Multiple vulnerabilities in MPlayer may lead to the execution of arbitrary\n code or a Denial of Service.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5616", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.25394", "scoring_system": "epss", "scoring_elements": "0.96223", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.25394", "scoring_system": "epss", "scoring_elements": "0.96173", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.25394", "scoring_system": "epss", "scoring_elements": "0.9618", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.25394", "scoring_system": "epss", "scoring_elements": "0.96188", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.25394", "scoring_system": "epss", "scoring_elements": "0.96191", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.25394", "scoring_system": "epss", "scoring_elements": "0.96201", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.25394", "scoring_system": "epss", "scoring_elements": "0.96204", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.25394", "scoring_system": "epss", "scoring_elements": "0.96209", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.25394", "scoring_system": "epss", "scoring_elements": "0.96208", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.25394", "scoring_system": "epss", "scoring_elements": "0.9621", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.25394", "scoring_system": "epss", "scoring_elements": "0.96218", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5616" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5616", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5616" }, { "reference_url": "http://secunia.com/advisories/33136", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33136" }, { "reference_url": "http://secunia.com/advisories/34845", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34845" }, { "reference_url": "http://svn.mplayerhq.hu/mplayer/branches/1.0rc2/libmpdemux/demux_vqf.c?r1=24723&r2=28150&pathrev=28150", "reference_id": "", "reference_type": "", "scores": [], "url": "http://svn.mplayerhq.hu/mplayer/branches/1.0rc2/libmpdemux/demux_vqf.c?r1=24723&r2=28150&pathrev=28150" }, { "reference_url": "http://svn.mplayerhq.hu/mplayer/branches/1.0rc2/libmpdemux/demux_vqf.c?view=log&pathrev=28150#rev28150", "reference_id": "", "reference_type": "", "scores": [], "url": "http://svn.mplayerhq.hu/mplayer/branches/1.0rc2/libmpdemux/demux_vqf.c?view=log&pathrev=28150#rev28150" }, { "reference_url": "http://trapkit.de/advisories/TKADV2008-014.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://trapkit.de/advisories/TKADV2008-014.txt" }, { "reference_url": "http://www.debian.org/security/2009/dsa-1782", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2009/dsa-1782" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:013", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:013" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:014", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:014" }, { "reference_url": "http://www.securityfocus.com/archive/1/499214/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/499214/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/32822", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/32822" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=508803", "reference_id": "508803", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=508803" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5616", "reference_id": "CVE-2008-5616", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5616" }, { "reference_url": "https://security.gentoo.org/glsa/200901-07", "reference_id": "GLSA-200901-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200901-07" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931189?format=api", "purl": "pkg:deb/debian/mplayer@1.0~rc2-19?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-19%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2008-5616" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fw24-pxsc-7bek" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49475?format=api", "vulnerability_id": "VCID-g1k8-4mbb-fyew", "summary": "Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38865", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18492", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18546", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18254", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18337", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.1839", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18342", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.1829", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18234", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18246", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18273", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38865" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38865", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38865" }, { "reference_url": "https://security.gentoo.org/glsa/202405-05", "reference_id": "GLSA-202405-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-05" }, { "reference_url": "https://usn.ubuntu.com/5895-1/", "reference_id": "USN-5895-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5895-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-38865" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g1k8-4mbb-fyew" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58564?format=api", "vulnerability_id": "VCID-gaa2-bekm-6bbt", "summary": "Multiple vulnerabilities have been discovered in MPlayer, possibly allowing\n for the remote execution of arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0630", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06989", "scoring_system": "epss", "scoring_elements": "0.9141", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06989", "scoring_system": "epss", "scoring_elements": "0.91416", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06989", "scoring_system": "epss", "scoring_elements": "0.91426", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06989", "scoring_system": "epss", "scoring_elements": "0.91434", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06989", "scoring_system": "epss", "scoring_elements": "0.91446", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06989", "scoring_system": "epss", "scoring_elements": "0.91452", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06989", "scoring_system": "epss", "scoring_elements": "0.91458", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.06989", "scoring_system": "epss", "scoring_elements": "0.91461", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06989", "scoring_system": "epss", "scoring_elements": "0.9146", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06989", "scoring_system": "epss", "scoring_elements": "0.91484", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.06989", "scoring_system": "epss", "scoring_elements": "0.91479", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0630" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0630", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0630" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464532", "reference_id": "464532", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464532" }, { "reference_url": "https://security.gentoo.org/glsa/200803-16", "reference_id": "GLSA-200803-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200803-16" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931184?format=api", "purl": "pkg:deb/debian/mplayer@1.0~rc2-8?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-8%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2008-0630" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gaa2-bekm-6bbt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60429?format=api", "vulnerability_id": "VCID-gxnr-jbzt-cffq", "summary": "Multiple vulnerabilities in MPlayer may lead to the execution of arbitrary\n code or a Denial of Service.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3827", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03588", "scoring_system": "epss", "scoring_elements": "0.87766", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03588", "scoring_system": "epss", "scoring_elements": "0.87699", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03588", "scoring_system": "epss", "scoring_elements": "0.8771", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03588", "scoring_system": "epss", "scoring_elements": "0.87721", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03588", "scoring_system": "epss", "scoring_elements": "0.87723", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03588", "scoring_system": "epss", "scoring_elements": "0.87745", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03588", "scoring_system": "epss", "scoring_elements": "0.87751", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03588", "scoring_system": "epss", "scoring_elements": "0.87761", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03588", "scoring_system": "epss", "scoring_elements": "0.87756", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03588", "scoring_system": "epss", "scoring_elements": "0.87754", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03588", "scoring_system": "epss", "scoring_elements": "0.87768", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03588", "scoring_system": "epss", "scoring_elements": "0.87767", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3827" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3827", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3827" }, { "reference_url": "http://secunia.com/advisories/32045", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32045" }, { "reference_url": "http://secunia.com/advisories/32153", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32153" }, { "reference_url": "http://securityreason.com/securityalert/4326", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securityreason.com/securityalert/4326" }, { "reference_url": "http://svn.mplayerhq.hu/mplayer/trunk/libmpdemux/demux_real.c?r1=27314&r2=27675", "reference_id": "", "reference_type": "", "scores": [], "url": "http://svn.mplayerhq.hu/mplayer/trunk/libmpdemux/demux_real.c?r1=27314&r2=27675" }, { "reference_url": "http://www.debian.org/security/2008/dsa-1644", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2008/dsa-1644" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:219", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:219" }, { "reference_url": "http://www.ocert.org/advisories/ocert-2008-013.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ocert.org/advisories/ocert-2008-013.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/496806/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/496806/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/31473", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/31473" }, { "reference_url": "http://www.securitytracker.com/id?1020952", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1020952" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/2703", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/2703" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=500683", "reference_id": "500683", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=500683" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_rc1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_rc1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_rc1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3827", "reference_id": "CVE-2008-3827", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3827" }, { "reference_url": "https://security.gentoo.org/glsa/200901-07", "reference_id": "GLSA-200901-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200901-07" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931186?format=api", "purl": "pkg:deb/debian/mplayer@1.0~rc2-18?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-18%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2008-3827" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gxnr-jbzt-cffq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55943?format=api", "vulnerability_id": "VCID-h9ks-v96k-wkf7", "summary": "security update", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6933", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03355", "scoring_system": "epss", "scoring_elements": "0.87278", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03355", "scoring_system": "epss", "scoring_elements": "0.87288", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03355", "scoring_system": "epss", "scoring_elements": "0.87304", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03355", "scoring_system": "epss", "scoring_elements": "0.87303", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03355", "scoring_system": "epss", "scoring_elements": "0.87322", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03355", "scoring_system": "epss", "scoring_elements": "0.87329", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03355", "scoring_system": "epss", "scoring_elements": "0.87342", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03355", "scoring_system": "epss", "scoring_elements": "0.87336", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03355", "scoring_system": "epss", "scoring_elements": "0.87332", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03355", "scoring_system": "epss", "scoring_elements": "0.87346", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03355", "scoring_system": "epss", "scoring_elements": "0.8735", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03355", "scoring_system": "epss", "scoring_elements": "0.87344", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6933" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6933", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6933" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931192?format=api", "purl": "pkg:deb/debian/mplayer@2:1.1.1%2Bsvn37434-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.1.1%252Bsvn37434-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2013-6933" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h9ks-v96k-wkf7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34138?format=api", "vulnerability_id": "VCID-hc13-gs1j-suhs", "summary": "MPlayer is vulnerable to integer overflows in FFmpeg and ASF decoding that\n could potentially result in the execution of arbitrary code.", "references": [ { "reference_url": "http://article.gmane.org/gmane.comp.video.ffmpeg.devel/26558", "reference_id": "", "reference_type": "", "scores": [], "url": "http://article.gmane.org/gmane.comp.video.ffmpeg.devel/26558" }, { "reference_url": "http://cvs.freedesktop.org/gstreamer/gst-ffmpeg/ChangeLog?rev=1.239&view=markup", "reference_id": "", "reference_type": "", "scores": [], "url": "http://cvs.freedesktop.org/gstreamer/gst-ffmpeg/ChangeLog?rev=1.239&view=markup" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-4048", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05247", "scoring_system": "epss", "scoring_elements": "0.89991", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05247", "scoring_system": "epss", "scoring_elements": "0.89936", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05247", "scoring_system": "epss", "scoring_elements": "0.89939", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05247", "scoring_system": "epss", "scoring_elements": "0.89952", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05247", "scoring_system": "epss", "scoring_elements": "0.89959", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05247", "scoring_system": "epss", "scoring_elements": "0.89975", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05247", "scoring_system": "epss", "scoring_elements": "0.8998", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05247", "scoring_system": "epss", "scoring_elements": "0.89988", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05247", "scoring_system": "epss", "scoring_elements": "0.89986", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05247", "scoring_system": "epss", "scoring_elements": "0.89979", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05247", "scoring_system": "epss", "scoring_elements": "0.89994", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05247", "scoring_system": "epss", "scoring_elements": "0.89995", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-4048" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4048", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4048" }, { "reference_url": "http://secunia.com/advisories/17892", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17892" }, { "reference_url": "http://secunia.com/advisories/18066", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18066" }, { "reference_url": "http://secunia.com/advisories/18087", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18087" }, { "reference_url": "http://secunia.com/advisories/18107", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18107" }, { "reference_url": "http://secunia.com/advisories/18400", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18400" }, { "reference_url": "http://secunia.com/advisories/18739", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18739" }, { "reference_url": "http://secunia.com/advisories/18746", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18746" }, { "reference_url": "http://secunia.com/advisories/19114", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19114" }, { "reference_url": "http://secunia.com/advisories/19192", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19192" }, { "reference_url": "http://secunia.com/advisories/19272", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19272" }, { "reference_url": "http://secunia.com/advisories/19279", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19279" }, { "reference_url": "http://www1.mplayerhq.hu/cgi-bin/cvsweb.cgi/ffmpeg/libavcodec/utils.c.diff?r1=1.161&r2=1.162&cvsroot=FFMpeg", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www1.mplayerhq.hu/cgi-bin/cvsweb.cgi/ffmpeg/libavcodec/utils.c.diff?r1=1.161&r2=1.162&cvsroot=FFMpeg" }, { "reference_url": "http://www1.mplayerhq.hu/cgi-bin/cvsweb.cgi/ffmpeg/libavcodec/utils.c?rev=1.162&content-type=text/x-cvsweb-markup&cvsroot=FFMpeg", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www1.mplayerhq.hu/cgi-bin/cvsweb.cgi/ffmpeg/libavcodec/utils.c?rev=1.162&content-type=text/x-cvsweb-markup&cvsroot=FFMpeg" }, { "reference_url": "http://www.debian.org/security/2006/dsa-1004", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-1004" }, { "reference_url": "http://www.debian.org/security/2006/dsa-1005", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-1005" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200601-06.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-06.xml" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200602-01.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200602-01.xml" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200603-03.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200603-03.xml" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:228", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:228" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:229", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:229" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:230", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:230" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:231", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:231" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:232", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:232" }, { "reference_url": "http://www.securityfocus.com/bid/15743", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/15743" }, { "reference_url": "http://www.us.debian.org/security/2006/dsa-992", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.us.debian.org/security/2006/dsa-992" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2770", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2770" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342207", "reference_id": "342207", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342207" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:cvs:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:cvs:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:cvs:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-4048", "reference_id": "CVE-2005-4048", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-4048" }, { "reference_url": "https://security.gentoo.org/glsa/200601-06", "reference_id": "GLSA-200601-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200601-06" }, { "reference_url": "https://security.gentoo.org/glsa/200602-01", "reference_id": "GLSA-200602-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200602-01" }, { "reference_url": "https://security.gentoo.org/glsa/200603-03", "reference_id": "GLSA-200603-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200603-03" }, { "reference_url": "https://usn.ubuntu.com/230-1/", "reference_id": "USN-230-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/230-1/" }, { "reference_url": "https://usn.ubuntu.com/230-2/", "reference_id": "USN-230-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/230-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931177?format=api", "purl": "pkg:deb/debian/mplayer@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2005-4048" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hc13-gs1j-suhs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58562?format=api", "vulnerability_id": "VCID-hujx-y363-e3cg", "summary": "Multiple vulnerabilities have been discovered in MPlayer, possibly allowing\n for the remote execution of arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0485", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.16295", "scoring_system": "epss", "scoring_elements": "0.94796", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.16295", "scoring_system": "epss", "scoring_elements": "0.94806", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.16295", "scoring_system": "epss", "scoring_elements": "0.94809", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.16295", "scoring_system": "epss", "scoring_elements": "0.94811", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.16295", "scoring_system": "epss", "scoring_elements": "0.94821", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.16295", "scoring_system": "epss", "scoring_elements": "0.94825", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.16295", "scoring_system": "epss", "scoring_elements": "0.94829", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.16295", "scoring_system": "epss", "scoring_elements": "0.94832", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.16295", "scoring_system": "epss", "scoring_elements": "0.94834", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.16295", "scoring_system": "epss", "scoring_elements": "0.9484", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.16295", "scoring_system": "epss", "scoring_elements": "0.94844", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.16295", "scoring_system": "epss", "scoring_elements": "0.94847", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0485" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464060", "reference_id": "464060", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464060" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/31076.py", "reference_id": "CVE-2008-0485;OSVDB-42201", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/31076.py" }, { "reference_url": "https://www.securityfocus.com/bid/27499/info", "reference_id": "CVE-2008-0485;OSVDB-42201", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/27499/info" }, { "reference_url": "https://security.gentoo.org/glsa/200803-16", "reference_id": "GLSA-200803-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200803-16" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931184?format=api", "purl": "pkg:deb/debian/mplayer@1.0~rc2-8?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-8%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2008-0485" ], "risk_score": 0.2, "exploitability": "2.0", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hujx-y363-e3cg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46257?format=api", "vulnerability_id": "VCID-j7wp-941h-p3fc", "summary": "Multiple vulnerabilities in xine-lib might result in the remote execution\n of arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5244", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00435", "scoring_system": "epss", "scoring_elements": "0.62955", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00435", "scoring_system": "epss", "scoring_elements": "0.62825", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00435", "scoring_system": "epss", "scoring_elements": "0.62883", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00435", "scoring_system": "epss", "scoring_elements": "0.62913", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00435", "scoring_system": "epss", "scoring_elements": "0.62876", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00435", "scoring_system": "epss", "scoring_elements": "0.62927", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00435", "scoring_system": "epss", "scoring_elements": "0.62943", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00435", "scoring_system": "epss", "scoring_elements": "0.62962", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00435", "scoring_system": "epss", "scoring_elements": "0.6295", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00435", "scoring_system": "epss", "scoring_elements": "0.62928", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00435", "scoring_system": "epss", "scoring_elements": "0.62968", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00435", "scoring_system": "epss", "scoring_elements": "0.62976", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5244" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5244", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5244" }, { "reference_url": "http://securitytracker.com/id?1020703", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1020703" }, { "reference_url": "http://sourceforge.net/project/shownotes.php?release_id=619869", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceforge.net/project/shownotes.php?release_id=619869" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=407010", "reference_id": "407010", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=407010" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5244", "reference_id": "CVE-2008-5244", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5244" }, { "reference_url": "https://security.gentoo.org/glsa/201006-04", "reference_id": "GLSA-201006-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201006-04" }, { "reference_url": "https://usn.ubuntu.com/710-1/", "reference_id": "USN-710-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/710-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931187?format=api", "purl": "pkg:deb/debian/mplayer@1.0~rc2-20?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-20%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2008-5244" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j7wp-941h-p3fc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49467?format=api", "vulnerability_id": "VCID-m5db-wq6e-gqeu", "summary": "Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38855", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19364", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19415", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19132", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19212", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19264", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.1927", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19224", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19169", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.1913", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19139", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19147", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38855" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38855", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38855" }, { "reference_url": "https://security.gentoo.org/glsa/202405-05", "reference_id": "GLSA-202405-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-05" }, { "reference_url": "https://usn.ubuntu.com/5895-1/", "reference_id": "USN-5895-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5895-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-38855" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m5db-wq6e-gqeu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47797?format=api", "vulnerability_id": "VCID-pbr8-afjj-pbdq", "summary": "Two vulnerabilities have been discovered in MPlayer, each one could lead to\n the execution of arbitrary code.", "references": [ { "reference_url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414072", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414072" }, { "reference_url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414072%3Bmsg=12%3Bfilename=DS_VideoDecoder.c---SVN--22205.patch%3Batt=1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414072%3Bmsg=12%3Bfilename=DS_VideoDecoder.c---SVN--22205.patch%3Batt=1" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-1387", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05109", "scoring_system": "epss", "scoring_elements": "0.8985", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05109", "scoring_system": "epss", "scoring_elements": "0.898", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05109", "scoring_system": "epss", "scoring_elements": "0.89803", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05109", "scoring_system": "epss", "scoring_elements": "0.89817", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05109", "scoring_system": "epss", "scoring_elements": "0.89821", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05109", "scoring_system": "epss", "scoring_elements": "0.89839", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05109", "scoring_system": "epss", "scoring_elements": "0.89845", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05109", "scoring_system": "epss", "scoring_elements": "0.89851", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05109", "scoring_system": "epss", "scoring_elements": "0.89849", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05109", "scoring_system": "epss", "scoring_elements": "0.89842", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05109", "scoring_system": "epss", "scoring_elements": "0.89856", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05109", "scoring_system": "epss", "scoring_elements": "0.89857", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-1387" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1387", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1387" }, { "reference_url": "http://secunia.com/advisories/24443", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24443" }, { "reference_url": "http://secunia.com/advisories/24444", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24444" }, { "reference_url": "http://secunia.com/advisories/24462", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24462" }, { "reference_url": "http://secunia.com/advisories/25462", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25462" }, { "reference_url": "http://secunia.com/advisories/29601", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/29601" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200705-21.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200705-21.xml" }, { "reference_url": "http://www.debian.org/security/2008/dsa-1536", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2008/dsa-1536" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:061", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:061" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:062", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:062" }, { "reference_url": "http://www.securityfocus.com/bid/22933", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/22933" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414075", "reference_id": "414075", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414075" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1387", "reference_id": "CVE-2007-1387", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:M/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1387" }, { "reference_url": "https://security.gentoo.org/glsa/200705-21", "reference_id": "GLSA-200705-21", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200705-21" }, { "reference_url": "https://usn.ubuntu.com/435-1/", "reference_id": "USN-435-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/435-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931180?format=api", "purl": "pkg:deb/debian/mplayer@1.0~rc1-13?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc1-13%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2007-1387" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pbr8-afjj-pbdq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31750?format=api", "vulnerability_id": "VCID-pbz2-w6vz-cqhx", "summary": "An integer overflow vulnerability in MPlayer may allow for the execution of\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1558", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.21937", "scoring_system": "epss", "scoring_elements": "0.95731", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.21937", "scoring_system": "epss", "scoring_elements": "0.9574", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.21937", "scoring_system": "epss", "scoring_elements": "0.95748", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.21937", "scoring_system": "epss", "scoring_elements": "0.95751", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.21937", "scoring_system": "epss", "scoring_elements": "0.95759", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.21937", "scoring_system": "epss", "scoring_elements": "0.95763", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.21937", "scoring_system": "epss", "scoring_elements": "0.95766", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.21937", "scoring_system": "epss", "scoring_elements": "0.95767", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.21937", "scoring_system": "epss", "scoring_elements": "0.95777", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.21937", "scoring_system": "epss", "scoring_elements": "0.95781", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.21937", "scoring_system": "epss", "scoring_elements": "0.95783", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1558" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1558", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1558" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=473056", "reference_id": "473056", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=473056" }, { "reference_url": "https://security.gentoo.org/glsa/200805-22", "reference_id": "GLSA-200805-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200805-22" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/5307.pl", "reference_id": "OSVDB-43740;CVE-2008-1558", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/5307.pl" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931185?format=api", "purl": "pkg:deb/debian/mplayer@1.0~rc2-10?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-10%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2008-1558" ], "risk_score": 0.4, "exploitability": "2.0", "weighted_severity": "0.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pbz2-w6vz-cqhx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49474?format=api", "vulnerability_id": "VCID-pfcp-7vj5-rqef", "summary": "Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38864", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19364", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19415", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19132", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19212", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19264", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.1927", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19224", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19169", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.1913", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19139", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19147", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38864" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38864", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38864" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021013", "reference_id": "1021013", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021013" }, { "reference_url": "https://security.gentoo.org/glsa/202405-05", "reference_id": "GLSA-202405-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-05" }, { "reference_url": "https://usn.ubuntu.com/5895-1/", "reference_id": "USN-5895-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5895-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-38864" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pfcp-7vj5-rqef" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91766?format=api", "vulnerability_id": "VCID-pxrz-2835-dfhm", "summary": "Heap-based buffer overflow in libmpdemux/aviheader.c in MPlayer 1.0rc1 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a .avi file with certain large \"indx truck size\" and nEntriesInuse values, and a certain wLongsPerEntry value.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4938", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.09968", "scoring_system": "epss", "scoring_elements": "0.93011", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.09968", "scoring_system": "epss", "scoring_elements": "0.9302", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.09968", "scoring_system": "epss", "scoring_elements": "0.93024", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.09968", "scoring_system": "epss", "scoring_elements": "0.93023", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.09968", "scoring_system": "epss", "scoring_elements": "0.93031", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.09968", "scoring_system": "epss", "scoring_elements": "0.93036", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.09968", "scoring_system": "epss", "scoring_elements": "0.93041", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.09968", "scoring_system": "epss", "scoring_elements": "0.93038", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.09968", "scoring_system": "epss", "scoring_elements": "0.9304", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.09968", "scoring_system": "epss", "scoring_elements": "0.9305", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.09968", "scoring_system": "epss", "scoring_elements": "0.93053", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.09968", "scoring_system": "epss", "scoring_elements": "0.9306", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4938" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4938", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4938" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=443478", "reference_id": "443478", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=443478" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/30578.txt", "reference_id": "CVE-2007-4938;OSVDB-45940", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/30578.txt" }, { "reference_url": "https://www.securityfocus.com/bid/25648/info", "reference_id": "CVE-2007-4938;OSVDB-45940", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/25648/info" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931182?format=api", "purl": "pkg:deb/debian/mplayer@1.0~rc1-16.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc1-16.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2007-4938" ], "risk_score": 0.2, "exploitability": "2.0", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pxrz-2835-dfhm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31094?format=api", "vulnerability_id": "VCID-q7u2-mhac-r7fp", "summary": "xine-lib is vulnerable to multiple buffer overflows when processing FLAC\n and ASF streams.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0486.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0486.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0486", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0457", "scoring_system": "epss", "scoring_elements": "0.89158", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0457", "scoring_system": "epss", "scoring_elements": "0.89165", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0457", "scoring_system": "epss", "scoring_elements": "0.8918", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0457", "scoring_system": "epss", "scoring_elements": "0.89182", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0457", "scoring_system": "epss", "scoring_elements": "0.892", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0457", "scoring_system": "epss", "scoring_elements": "0.89205", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0457", "scoring_system": "epss", "scoring_elements": "0.89215", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0457", "scoring_system": "epss", "scoring_elements": "0.89211", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0457", "scoring_system": "epss", "scoring_elements": "0.89209", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0457", "scoring_system": "epss", "scoring_elements": "0.89221", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0457", "scoring_system": "epss", "scoring_elements": "0.89217", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0486" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0486", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0486" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=431541", "reference_id": "431541", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431541" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464060", "reference_id": "464060", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464060" }, { "reference_url": "https://security.gentoo.org/glsa/200802-12", "reference_id": "GLSA-200802-12", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200802-12" }, { "reference_url": "https://security.gentoo.org/glsa/200803-16", "reference_id": "GLSA-200803-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200803-16" }, { "reference_url": "https://usn.ubuntu.com/635-1/", "reference_id": "USN-635-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/635-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931184?format=api", "purl": "pkg:deb/debian/mplayer@1.0~rc2-8?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-8%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2008-0486" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q7u2-mhac-r7fp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40177?format=api", "vulnerability_id": "VCID-r4rz-8ey9-fqb4", "summary": "Multiple vulnerabilities in FFmpeg may lead to the remote execution of\n arbitrary code or a Denial of Service.", "references": [ { "reference_url": "http://archives.neohapsis.com/archives/fulldisclosure/2008-09/0103.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2008-09/0103.html" }, { "reference_url": "http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2008-August/016011.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2008-August/016011.html" }, { "reference_url": "http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2008-August/016012.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2008-August/016012.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4866", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05735", "scoring_system": "epss", "scoring_elements": "0.90457", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05735", "scoring_system": "epss", "scoring_elements": "0.90404", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05735", "scoring_system": "epss", "scoring_elements": "0.90408", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05735", "scoring_system": "epss", "scoring_elements": "0.9042", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05735", "scoring_system": "epss", "scoring_elements": "0.90424", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05735", "scoring_system": "epss", "scoring_elements": "0.90438", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05735", "scoring_system": "epss", "scoring_elements": "0.90444", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05735", "scoring_system": "epss", "scoring_elements": "0.90452", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05735", "scoring_system": "epss", "scoring_elements": "0.9046", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05735", "scoring_system": "epss", "scoring_elements": "0.90459", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4866" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4866", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4866" }, { "reference_url": "http://secunia.com/advisories/34296", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34296" }, { "reference_url": "http://secunia.com/advisories/34385", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34385" }, { "reference_url": "http://secunia.com/advisories/34845", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34845" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200903-33.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200903-33.xml" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46322" }, { "reference_url": "http://www.debian.org/security/2009/dsa-1782", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2009/dsa-1782" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:013", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:013" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:015", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:015" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2008/10/29/6", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2008/10/29/6" }, { "reference_url": "http://www.securityfocus.com/bid/33308", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/33308" }, { "reference_url": "http://www.ubuntu.com/usn/USN-734-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-734-1" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4866", "reference_id": "CVE-2008-4866", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4866" }, { "reference_url": "https://security.gentoo.org/glsa/200903-33", "reference_id": "GLSA-200903-33", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200903-33" }, { "reference_url": "https://usn.ubuntu.com/734-1/", "reference_id": "USN-734-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/734-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931188?format=api", "purl": "pkg:deb/debian/mplayer@1.0~rc2-14?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-14%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2008-4866" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r4rz-8ey9-fqb4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61470?format=api", "vulnerability_id": "VCID-sar3-93je-n7e9", "summary": "A buffer overflow was found in MPlayer's RTSP plugin that could lead to a\n Denial of Service or arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-6172", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04458", "scoring_system": "epss", "scoring_elements": "0.89084", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04458", "scoring_system": "epss", "scoring_elements": "0.89021", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04458", "scoring_system": "epss", "scoring_elements": "0.89029", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04458", "scoring_system": "epss", "scoring_elements": "0.89044", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04458", "scoring_system": "epss", "scoring_elements": "0.89046", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04458", "scoring_system": "epss", "scoring_elements": "0.89064", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04458", "scoring_system": "epss", "scoring_elements": "0.89068", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04458", "scoring_system": "epss", "scoring_elements": "0.8908", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04458", "scoring_system": "epss", "scoring_elements": "0.89076", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04458", "scoring_system": "epss", "scoring_elements": "0.89074", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04458", "scoring_system": "epss", "scoring_elements": "0.89088", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-6172" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6172", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6172" }, { "reference_url": "http://secunia.com/advisories/23218", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/23218" }, { "reference_url": "http://secunia.com/advisories/23242", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/23242" }, { "reference_url": "http://secunia.com/advisories/23249", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/23249" }, { "reference_url": "http://secunia.com/advisories/23301", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/23301" }, { "reference_url": "http://secunia.com/advisories/23335", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/23335" }, { "reference_url": "http://secunia.com/advisories/23512", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/23512" }, { "reference_url": "http://secunia.com/advisories/23567", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/23567" }, { "reference_url": "http://secunia.com/advisories/24336", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24336" }, { "reference_url": "http://secunia.com/advisories/24339", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24339" }, { "reference_url": "http://secunia.com/advisories/25555", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25555" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200612-02.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200612-02.xml" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200702-11.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200702-11.xml" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.433842", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.433842" }, { "reference_url": "http://sourceforge.net/project/shownotes.php?release_id=468432", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceforge.net/project/shownotes.php?release_id=468432" }, { "reference_url": "https://sourceforge.net/tracker/index.php?func=detail&aid=1603458&group_id=9655&atid=109655", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceforge.net/tracker/index.php?func=detail&aid=1603458&group_id=9655&atid=109655" }, { "reference_url": "http://www.debian.org/security/2006/dsa-1244", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-1244" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:224", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:224" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:112", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:112" }, { "reference_url": "http://www.mplayerhq.hu/design7/news.html#vuln14", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mplayerhq.hu/design7/news.html#vuln14" }, { "reference_url": "http://www.mplayerhq.hu/MPlayer/patches/asmrules_fix_20061231.diff", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mplayerhq.hu/MPlayer/patches/asmrules_fix_20061231.diff" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2006_28_sr.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2006_28_sr.html" }, { "reference_url": "http://www.securityfocus.com/bid/21435", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/21435" }, { "reference_url": "http://www.ubuntu.com/usn/usn-392-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/usn-392-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2006/4824", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2006/4824" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:real_media_input_plugin:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:real_media_input_plugin:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:real_media_input_plugin:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2006-6172", "reference_id": "CVE-2006-6172", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-6172" }, { "reference_url": "https://security.gentoo.org/glsa/200612-02", "reference_id": "GLSA-200612-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200612-02" }, { "reference_url": "https://security.gentoo.org/glsa/200702-11", "reference_id": "GLSA-200702-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200702-11" }, { "reference_url": "https://usn.ubuntu.com/392-1/", "reference_id": "USN-392-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/392-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931179?format=api", "purl": "pkg:deb/debian/mplayer@1.0~rc1-11?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc1-11%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2006-6172" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sar3-93je-n7e9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40217?format=api", "vulnerability_id": "VCID-sgm1-d98g-nff9", "summary": "Multiple vulnerabilities in FFmpeg may lead to the remote execution of\n arbitrary code or a Denial of Service.", "references": [ { "reference_url": "http://git.ffmpeg.org/?p=ffmpeg%3Ba=commitdiff%3Bh=72e715fb798f2cb79fd24a6d2eaeafb7c6eeda17", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.ffmpeg.org/?p=ffmpeg%3Ba=commitdiff%3Bh=72e715fb798f2cb79fd24a6d2eaeafb7c6eeda17" }, { "reference_url": "http://osvdb.org/51643", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/51643" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0385", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.11552", "scoring_system": "epss", "scoring_elements": "0.9366", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.11552", "scoring_system": "epss", "scoring_elements": "0.93594", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.11552", "scoring_system": "epss", "scoring_elements": "0.93603", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.11552", "scoring_system": "epss", "scoring_elements": "0.93612", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.11552", "scoring_system": "epss", "scoring_elements": "0.93614", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.11552", "scoring_system": "epss", "scoring_elements": "0.93623", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.11552", "scoring_system": "epss", "scoring_elements": "0.93625", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.11552", "scoring_system": "epss", "scoring_elements": "0.9363", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.11552", "scoring_system": "epss", "scoring_elements": "0.93631", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.11552", "scoring_system": "epss", "scoring_elements": "0.93649", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.11552", "scoring_system": "epss", "scoring_elements": "0.93656", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0385" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0385", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0385" }, { "reference_url": "http://secunia.com/advisories/33711", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33711" }, { "reference_url": "http://secunia.com/advisories/34296", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34296" }, { "reference_url": "http://secunia.com/advisories/34385", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34385" }, { "reference_url": "http://secunia.com/advisories/34712", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34712" }, { "reference_url": "http://secunia.com/advisories/34845", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34845" }, { "reference_url": "http://secunia.com/advisories/34905", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34905" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200903-33.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200903-33.xml" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48330", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48330" }, { "reference_url": "http://svn.mplayerhq.hu/ffmpeg/trunk/libavformat/4xm.c?r1=16838&r2=16846&pathrev=16846", "reference_id": "", "reference_type": "", "scores": [], "url": "http://svn.mplayerhq.hu/ffmpeg/trunk/libavformat/4xm.c?r1=16838&r2=16846&pathrev=16846" }, { "reference_url": "http://svn.mplayerhq.hu/ffmpeg?view=rev&revision=16846", "reference_id": "", "reference_type": "", "scores": [], "url": "http://svn.mplayerhq.hu/ffmpeg?view=rev&revision=16846" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00210.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00210.html" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00215.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00215.html" }, { "reference_url": "http://www.debian.org/security/2009/dsa-1781", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2009/dsa-1781" }, { "reference_url": "http://www.debian.org/security/2009/dsa-1782", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2009/dsa-1782" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:297", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:297" }, { "reference_url": "http://www.securityfocus.com/archive/1/500514/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/500514/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/33502", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/33502" }, { "reference_url": "http://www.trapkit.de/advisories/TKADV2009-004.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trapkit.de/advisories/TKADV2009-004.txt" }, { "reference_url": "http://www.ubuntu.com/usn/USN-734-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-734-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2009/0277", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2009/0277" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524805", "reference_id": "524805", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524805" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0385", "reference_id": "CVE-2009-0385", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0385" }, { "reference_url": "https://security.gentoo.org/glsa/200903-33", "reference_id": "GLSA-200903-33", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200903-33" }, { "reference_url": "https://usn.ubuntu.com/734-1/", "reference_id": "USN-734-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/734-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931188?format=api", "purl": "pkg:deb/debian/mplayer@1.0~rc2-14?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-14%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-0385" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sgm1-d98g-nff9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60767?format=api", "vulnerability_id": "VCID-sm8z-qqhz-93cv", "summary": "MPlayer contains a remotely exploitable buffer overflow in the HTTP parser\n that may allow attackers to run arbitrary code on a user's computer.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0386", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.36771", "scoring_system": "epss", "scoring_elements": "0.97114", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.36771", "scoring_system": "epss", "scoring_elements": "0.97121", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.36771", "scoring_system": "epss", "scoring_elements": "0.97128", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.36771", "scoring_system": "epss", "scoring_elements": "0.97138", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.36771", "scoring_system": "epss", "scoring_elements": "0.97142", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.36771", "scoring_system": "epss", "scoring_elements": "0.97144", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.36771", "scoring_system": "epss", "scoring_elements": "0.97152", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.36771", "scoring_system": "epss", "scoring_elements": "0.97153", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.36771", "scoring_system": "epss", "scoring_elements": "0.97157", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0386" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0386", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0386" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/23896.txt", "reference_id": "CVE-2004-0386;OSVDB-4754", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/23896.txt" }, { "reference_url": "https://www.securityfocus.com/bid/10008/info", "reference_id": "CVE-2004-0386;OSVDB-4754", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/10008/info" }, { "reference_url": "https://security.gentoo.org/glsa/200403-13", "reference_id": "GLSA-200403-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200403-13" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931173?format=api", "purl": "pkg:deb/debian/mplayer@1.0~pre6a-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~pre6a-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2004-0386" ], "risk_score": 0.6, "exploitability": "2.0", "weighted_severity": "0.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sm8z-qqhz-93cv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91247?format=api", "vulnerability_id": "VCID-st2b-1ue7-fkcs", "summary": "Integer overflow in the real_setup_and_get_header function in real.c for Unix MPlayer 1.0pre5 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a Real RTSP streaming media file with a -1 content-length field, which leads to a heap-based buffer overflow.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-1311", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03418", "scoring_system": "epss", "scoring_elements": "0.87462", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03418", "scoring_system": "epss", "scoring_elements": "0.87393", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03418", "scoring_system": "epss", "scoring_elements": "0.87403", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03418", "scoring_system": "epss", "scoring_elements": "0.87417", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03418", "scoring_system": "epss", "scoring_elements": "0.87416", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03418", "scoring_system": "epss", "scoring_elements": "0.87435", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03418", "scoring_system": "epss", "scoring_elements": "0.87442", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03418", "scoring_system": "epss", "scoring_elements": "0.87453", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03418", "scoring_system": "epss", "scoring_elements": "0.87449", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03418", "scoring_system": "epss", "scoring_elements": "0.87445", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03418", "scoring_system": "epss", "scoring_elements": "0.8746", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-1311" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1311", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1311" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18525", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18525" }, { "reference_url": "http://www1.mplayerhq.hu/MPlayer/patches/rtsp_fix_20041215.diff", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www1.mplayerhq.hu/MPlayer/patches/rtsp_fix_20041215.diff" }, { "reference_url": "http://www1.mplayerhq.hu/MPlayer/releases/ChangeLog", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www1.mplayerhq.hu/MPlayer/releases/ChangeLog" }, { "reference_url": "http://www.idefense.com/application/poi/display?id=166", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.idefense.com/application/poi/display?id=166" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:157", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:157" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1311", "reference_id": "CVE-2004-1311", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1311" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931173?format=api", "purl": "pkg:deb/debian/mplayer@1.0~pre6a-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~pre6a-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2004-1311" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-st2b-1ue7-fkcs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49470?format=api", "vulnerability_id": "VCID-tff5-wrpr-hbe1", "summary": "Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38860", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18492", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18546", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18254", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18337", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.1839", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18342", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.1829", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18234", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18246", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18273", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38860" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38860", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38860" }, { "reference_url": "https://security.gentoo.org/glsa/202405-05", "reference_id": "GLSA-202405-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-05" }, { "reference_url": "https://usn.ubuntu.com/5895-1/", "reference_id": "USN-5895-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5895-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-38860" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tff5-wrpr-hbe1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34978?format=api", "vulnerability_id": "VCID-tteq-u99e-ayg4", "summary": "Multiple vulnerabilities have been found in MPlayer and the bundled\n FFmpeg, the worst of which may lead to the execution of arbitrary code.", "references": [ { "reference_url": "http://sam.zoy.org/blog/2007-01-16-exposing-file-parsing-vulnerabilities", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sam.zoy.org/blog/2007-01-16-exposing-file-parsing-vulnerabilities" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-6718", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63347", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63242", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63301", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63328", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63294", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63345", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63363", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.6338", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63327", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63361", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63369", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-6718" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6718", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6718" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2008/10/07/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2008/10/07/1" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=407010", "reference_id": "407010", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=407010" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-6718", "reference_id": "CVE-2007-6718", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-6718" }, { "reference_url": "https://security.gentoo.org/glsa/201310-13", "reference_id": "GLSA-201310-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-13" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931183?format=api", "purl": "pkg:deb/debian/mplayer@1.0~rc3%2Bsvn20100502-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc3%252Bsvn20100502-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2007-6718" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tteq-u99e-ayg4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49469?format=api", "vulnerability_id": "VCID-vnmz-rcby-n3gs", "summary": "Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38858", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19364", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19415", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19132", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19212", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19264", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.1927", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19224", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19169", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.1913", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19139", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19147", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38858", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38858" }, { "reference_url": "https://security.gentoo.org/glsa/202405-05", "reference_id": "GLSA-202405-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-05" }, { "reference_url": "https://usn.ubuntu.com/5895-1/", "reference_id": "USN-5895-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5895-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-38858" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vnmz-rcby-n3gs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34139?format=api", "vulnerability_id": "VCID-wg5t-2vzg-b7bj", "summary": "MPlayer is vulnerable to integer overflows in FFmpeg and ASF decoding that\n could potentially result in the execution of arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-0579", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03797", "scoring_system": "epss", "scoring_elements": "0.88024", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03797", "scoring_system": "epss", "scoring_elements": "0.88034", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03797", "scoring_system": "epss", "scoring_elements": "0.88048", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03797", "scoring_system": "epss", "scoring_elements": "0.88054", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03797", "scoring_system": "epss", "scoring_elements": "0.88074", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03797", "scoring_system": "epss", "scoring_elements": "0.88079", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03797", "scoring_system": "epss", "scoring_elements": "0.88089", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03797", "scoring_system": "epss", "scoring_elements": "0.88082", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03797", "scoring_system": "epss", "scoring_elements": "0.88083", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03797", "scoring_system": "epss", "scoring_elements": "0.88096", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03797", "scoring_system": "epss", "scoring_elements": "0.88094", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-0579" }, { "reference_url": "https://security.gentoo.org/glsa/200603-03", "reference_id": "GLSA-200603-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200603-03" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931177?format=api", "purl": "pkg:deb/debian/mplayer@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2006-0579" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wg5t-2vzg-b7bj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91246?format=api", "vulnerability_id": "VCID-wyvf-q6re-jfgf", "summary": "Stack-based buffer overflow in the asf_mmst_streaming.c functionality for MPlayer 1.0pre5 allows remote attackers to execute arbitrary code via a large MMST stream packet.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-1310", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05704", "scoring_system": "epss", "scoring_elements": "0.90431", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05704", "scoring_system": "epss", "scoring_elements": "0.90379", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05704", "scoring_system": "epss", "scoring_elements": "0.90382", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05704", "scoring_system": "epss", "scoring_elements": "0.90394", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05704", "scoring_system": "epss", "scoring_elements": "0.90398", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05704", "scoring_system": "epss", "scoring_elements": "0.90412", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05704", "scoring_system": "epss", "scoring_elements": "0.90419", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05704", "scoring_system": "epss", "scoring_elements": "0.90426", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05704", "scoring_system": "epss", "scoring_elements": "0.90418", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05704", "scoring_system": "epss", "scoring_elements": "0.90434", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-1310" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1310", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1310" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18526", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18526" }, { "reference_url": "http://www1.mplayerhq.hu/MPlayer/patches/mmst_fix_20041215.diff", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www1.mplayerhq.hu/MPlayer/patches/mmst_fix_20041215.diff" }, { "reference_url": "http://www1.mplayerhq.hu/MPlayer/releases/ChangeLog", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www1.mplayerhq.hu/MPlayer/releases/ChangeLog" }, { "reference_url": "http://www.idefense.com/application/poi/display?id=167", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.idefense.com/application/poi/display?id=167" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:157", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:157" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1310", "reference_id": "CVE-2004-1310", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1310" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931173?format=api", "purl": "pkg:deb/debian/mplayer@1.0~pre6a-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~pre6a-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2004-1310" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wyvf-q6re-jfgf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35830?format=api", "vulnerability_id": "VCID-xb3p-8n52-byaf", "summary": "FFmpeg is vulnerable to multiple buffer overflows that might be exploited\n to execute arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4800", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06299", "scoring_system": "epss", "scoring_elements": "0.90904", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06299", "scoring_system": "epss", "scoring_elements": "0.90909", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06299", "scoring_system": "epss", "scoring_elements": "0.90919", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06299", "scoring_system": "epss", "scoring_elements": "0.90929", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06299", "scoring_system": "epss", "scoring_elements": "0.9094", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06299", "scoring_system": "epss", "scoring_elements": "0.90947", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06299", "scoring_system": "epss", "scoring_elements": "0.90955", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06299", "scoring_system": "epss", "scoring_elements": "0.90956", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06299", "scoring_system": "epss", "scoring_elements": "0.9098", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.06299", "scoring_system": "epss", "scoring_elements": "0.90978", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.06299", "scoring_system": "epss", "scoring_elements": "0.90979", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4800" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4800", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4800" }, { "reference_url": "https://security.gentoo.org/glsa/200609-09", "reference_id": "GLSA-200609-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200609-09" }, { "reference_url": "https://usn.ubuntu.com/358-1/", "reference_id": "USN-358-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/358-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931178?format=api", "purl": "pkg:deb/debian/mplayer@1.0~rc1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2006-4800" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xb3p-8n52-byaf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47796?format=api", "vulnerability_id": "VCID-xfdf-djbw-3yht", "summary": "Two vulnerabilities have been discovered in MPlayer, each one could lead to\n the execution of arbitrary code.", "references": [ { "reference_url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-March/052738.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-March/052738.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-1246", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.09304", "scoring_system": "epss", "scoring_elements": "0.92762", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.09304", "scoring_system": "epss", "scoring_elements": "0.92718", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.09304", "scoring_system": "epss", "scoring_elements": "0.92725", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.09304", "scoring_system": "epss", "scoring_elements": "0.9273", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.09304", "scoring_system": "epss", "scoring_elements": "0.92728", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.09304", "scoring_system": "epss", "scoring_elements": "0.92738", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.09304", "scoring_system": "epss", "scoring_elements": "0.92742", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.09304", "scoring_system": "epss", "scoring_elements": "0.92748", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.09304", "scoring_system": "epss", "scoring_elements": "0.92746", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.09304", "scoring_system": "epss", "scoring_elements": "0.92758", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-1246" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1246", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1246" }, { "reference_url": "http://secunia.com/advisories/24443", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24443" }, { "reference_url": "http://secunia.com/advisories/24444", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24444" }, { "reference_url": "http://secunia.com/advisories/24446", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24446" }, { "reference_url": "http://secunia.com/advisories/24448", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24448" }, { "reference_url": "http://secunia.com/advisories/24462", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24462" }, { "reference_url": "http://secunia.com/advisories/24866", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24866" }, { "reference_url": "http://secunia.com/advisories/24897", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24897" }, { "reference_url": "http://secunia.com/advisories/24995", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24995" }, { "reference_url": "http://secunia.com/advisories/25462", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25462" }, { "reference_url": "http://secunia.com/advisories/29601", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/29601" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200704-09.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200704-09.xml" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200705-21.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200705-21.xml" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32747" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.449141", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.449141" }, { "reference_url": "http://svn.mplayerhq.hu/mplayer/trunk/loader/dmo/DMO_VideoDecoder.c", "reference_id": "", "reference_type": "", "scores": [], "url": "http://svn.mplayerhq.hu/mplayer/trunk/loader/dmo/DMO_VideoDecoder.c" }, { "reference_url": "http://svn.mplayerhq.hu/mplayer/trunk/loader/dmo/DMO_VideoDecoder.c?r1=22019&r2=22204", "reference_id": "", "reference_type": "", "scores": [], "url": "http://svn.mplayerhq.hu/mplayer/trunk/loader/dmo/DMO_VideoDecoder.c?r1=22019&r2=22204" }, { "reference_url": "http://www.debian.org/security/2008/dsa-1536", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2008/dsa-1536" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:055", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:055" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:057", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:057" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2007_007_suse.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2007_007_suse.html" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2007_5_sr.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2007_5_sr.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/466691/30/6900/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/466691/30/6900/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/22771", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/22771" }, { "reference_url": "http://www.ubuntu.com/usn/usn-433-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/usn-433-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/0794", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/0794" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414075", "reference_id": "414075", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414075" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1246", "reference_id": "CVE-2007-1246", "reference_type": "", "scores": [ { "value": "7.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1246" }, { "reference_url": "https://security.gentoo.org/glsa/200704-09", "reference_id": "GLSA-200704-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200704-09" }, { "reference_url": "https://security.gentoo.org/glsa/200705-21", "reference_id": "GLSA-200705-21", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200705-21" }, { "reference_url": "https://usn.ubuntu.com/433-1/", "reference_id": "USN-433-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/433-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931180?format=api", "purl": "pkg:deb/debian/mplayer@1.0~rc1-13?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc1-13%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2007-1246" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xfdf-djbw-3yht" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92899?format=api", "vulnerability_id": "VCID-xxgu-jjrs-pkaz", "summary": "Integer overflow in the demuxer function in libmpdemux/demux_gif.c in Mplayer allows remote attackers to cause a denial of service (crash) via large dimensions in a gif file.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4352", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42241", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42316", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42345", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42286", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42334", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42342", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42365", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42328", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.423", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.4235", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42326", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42253", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4352" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4352", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4352" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823723", "reference_id": "823723", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823723" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931193?format=api", "purl": "pkg:deb/debian/mplayer@2:1.3.0-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.3.0-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-4352" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xxgu-jjrs-pkaz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34980?format=api", "vulnerability_id": "VCID-ybgy-yct3-6fba", "summary": "Multiple vulnerabilities have been found in MPlayer and the bundled\n FFmpeg, the worst of which may lead to the execution of arbitrary code.", "references": [ { "reference_url": "http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=dc74600c97eb834c08674676e209afa842053aca", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=dc74600c97eb834c08674676e209afa842053aca" }, { "reference_url": "http://openwall.com/lists/oss-security/2010/06/04/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2010/06/04/4" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2062", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02991", "scoring_system": "epss", "scoring_elements": "0.8656", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02991", "scoring_system": "epss", "scoring_elements": "0.86483", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02991", "scoring_system": "epss", "scoring_elements": "0.86493", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02991", "scoring_system": "epss", "scoring_elements": "0.86512", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02991", "scoring_system": "epss", "scoring_elements": "0.86511", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02991", "scoring_system": "epss", "scoring_elements": "0.86531", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02991", "scoring_system": "epss", "scoring_elements": "0.86541", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02991", "scoring_system": "epss", "scoring_elements": "0.86556", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02991", "scoring_system": "epss", "scoring_elements": "0.86552", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02991", "scoring_system": "epss", "scoring_elements": "0.86547", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02991", "scoring_system": "epss", "scoring_elements": "0.86561", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02991", "scoring_system": "epss", "scoring_elements": "0.86567", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2062" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2062", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2062" }, { "reference_url": "https://dzcore.wordpress.com/2009/07/27/dzc-2009-001-the-movie-player-and-vlc-media-player-real-data-transport-parsing-integer-underflow/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://dzcore.wordpress.com/2009/07/27/dzc-2009-001-the-movie-player-and-vlc-media-player-real-data-transport-parsing-integer-underflow/" }, { "reference_url": "http://seclists.org/fulldisclosure/2009/Jul/418", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2009/Jul/418" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=581245", "reference_id": "581245", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=581245" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1337:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.8.1337:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1337:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2062", "reference_id": "CVE-2010-2062", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2062" }, { "reference_url": "https://security.gentoo.org/glsa/201310-13", "reference_id": "GLSA-201310-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-13" }, { "reference_url": "https://security.gentoo.org/glsa/201411-01", "reference_id": "GLSA-201411-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201411-01" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931190?format=api", "purl": "pkg:deb/debian/mplayer@2:1.0~rc3%2Bsvn20100502-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.0~rc3%252Bsvn20100502-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2010-2062" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ybgy-yct3-6fba" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/102581?format=api", "vulnerability_id": "VCID-zpam-9ay6-d7a3", "summary": "The pnm_get_chunk function in xine 0.99.2 and earlier, and other packages such as MPlayer that use the same code, does not properly verify that the chunk size is less than the PREAMBLE_SIZE, which causes a read operation with a negative length that leads to a buffer overflow via (1) RMF_TAG, (2) DATA_TAG, (3) PROP_TAG, (4) MDPR_TAG, and (5) CONT_TAG values, a different vulnerability than CVE-2004-1187.", "references": [ { "reference_url": "http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/pnm.c?r1=1.20&r2=1.21", "reference_id": "", "reference_type": "", "scores": [], "url": "http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/pnm.c?r1=1.20&r2=1.21" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-1188", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00495", "scoring_system": "epss", "scoring_elements": "0.65802", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00495", "scoring_system": "epss", "scoring_elements": "0.65682", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00495", "scoring_system": "epss", "scoring_elements": "0.65732", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00495", "scoring_system": "epss", "scoring_elements": "0.65761", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00495", "scoring_system": "epss", "scoring_elements": "0.65727", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00495", "scoring_system": "epss", "scoring_elements": "0.6578", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00495", "scoring_system": "epss", "scoring_elements": "0.6579", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00495", "scoring_system": "epss", "scoring_elements": "0.65811", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00495", "scoring_system": "epss", "scoring_elements": "0.65797", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00495", "scoring_system": "epss", "scoring_elements": "0.65767", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00495", "scoring_system": "epss", "scoring_elements": "0.65801", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00495", "scoring_system": "epss", "scoring_elements": "0.65816", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-1188" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18638", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18638" }, { "reference_url": "http://www.idefense.com/application/poi/display?id=177&type=vulnerabilities", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.idefense.com/application/poi/display?id=177&type=vulnerabilities" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:011", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:011" }, { "reference_url": "http://www.mplayerhq.hu/MPlayer/patches/pnm_fix_20041215.diff", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mplayerhq.hu/MPlayer/patches/pnm_fix_20041215.diff" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:head_cvs:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mplayer:mplayer:head_cvs:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:head_cvs:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:0.9.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:0.9.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:0.9.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:0.9.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:0.9.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:0.9.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:0.9.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:0.9.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:0.9.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_alpha:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_alpha:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_alpha:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_beta1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_beta10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_beta11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_beta12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_beta2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_beta3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_beta4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_beta5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_beta6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_beta7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_beta8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_beta9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_rc0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc0a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_rc0a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc0a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_rc1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_rc2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_rc3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc3a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_rc3a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc3a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc3b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_rc3b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc3b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_rc4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_rc5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_rc6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc6a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_rc6a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc6a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_rc7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1_rc8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:0.9.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.99:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:0.99:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.99:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_alpha:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_alpha:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_alpha:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_rc0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_rc1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_rc2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_rc3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_rc3a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_rc3b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_rc3c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_rc4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_rc5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_rc6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc6a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_rc6a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc6a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_rc7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1188", "reference_id": "CVE-2004-1188", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1188" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931177?format=api", "purl": "pkg:deb/debian/mplayer@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931174?format=api", "purl": "pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4f83-6dmk-rybu" }, { "vulnerability": "VCID-kyv5-fhuz-n7f1" }, { "vulnerability": "VCID-z3dv-rb28-kycj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931172?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931176?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931175?format=api", "purl": "pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2004-1188" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zpam-9ay6-d7a3" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie" }