Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/942265?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/942265?format=api", "purl": "pkg:deb/debian/vlc@0?distro=trixie", "type": "deb", "namespace": "debian", "name": "vlc", "version": "0", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "0.8.4.debian-2", "latest_non_vulnerable_version": "3.0.23-3", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35029?format=api", "vulnerability_id": "VCID-75p5-9stz-dffu", "summary": "Multiple vulnerabilities have been found in VLC, the worst of which\n could lead to user-assisted execution of arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6934", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03978", "scoring_system": "epss", "scoring_elements": "0.88343", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03978", "scoring_system": "epss", "scoring_elements": "0.88352", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03978", "scoring_system": "epss", "scoring_elements": "0.88366", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03978", "scoring_system": "epss", "scoring_elements": "0.88371", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03978", "scoring_system": "epss", "scoring_elements": "0.8839", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03978", "scoring_system": "epss", "scoring_elements": "0.88396", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03978", "scoring_system": "epss", "scoring_elements": "0.88406", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03978", "scoring_system": "epss", "scoring_elements": "0.88399", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03978", "scoring_system": "epss", "scoring_elements": "0.88413", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03978", "scoring_system": "epss", "scoring_elements": "0.88409", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03978", "scoring_system": "epss", "scoring_elements": "0.88425", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03978", "scoring_system": "epss", "scoring_elements": "0.8843", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03978", "scoring_system": "epss", "scoring_elements": "0.88431", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6934" }, { "reference_url": "https://security.gentoo.org/glsa/201411-01", "reference_id": "GLSA-201411-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201411-01" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942265?format=api", "purl": "pkg:deb/debian/vlc@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942266?format=api", "purl": "pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942264?format=api", "purl": "pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942268?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942267?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1077504?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie" } ], "aliases": [ "CVE-2013-6934" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-75p5-9stz-dffu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/107823?format=api", "vulnerability_id": "VCID-7q9n-v18z-z7av", "summary": "Stack-based buffer overflow in Xine-lib-rc5 in xine-lib 1_rc5-r2 and earlier allows remote attackers to execute arbitrary code via crafted playlists that result in a long vcd:// URL.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-1455", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04348", "scoring_system": "epss", "scoring_elements": "0.88888", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04348", "scoring_system": "epss", "scoring_elements": "0.88896", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04348", "scoring_system": "epss", "scoring_elements": "0.88912", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04348", "scoring_system": "epss", "scoring_elements": "0.88915", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04348", "scoring_system": "epss", "scoring_elements": "0.88933", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04348", "scoring_system": "epss", "scoring_elements": "0.88938", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04348", "scoring_system": "epss", "scoring_elements": "0.8895", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04348", "scoring_system": "epss", "scoring_elements": "0.88944", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04348", "scoring_system": "epss", "scoring_elements": "0.88943", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04348", "scoring_system": "epss", "scoring_elements": "0.88956", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04348", "scoring_system": "epss", "scoring_elements": "0.88954", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04348", "scoring_system": "epss", "scoring_elements": "0.88951", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04348", "scoring_system": "epss", "scoring_elements": "0.88968", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04348", "scoring_system": "epss", "scoring_elements": "0.88975", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.04348", "scoring_system": "epss", "scoring_elements": "0.88976", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-1455" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942265?format=api", "purl": "pkg:deb/debian/vlc@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942266?format=api", "purl": "pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942264?format=api", "purl": "pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942268?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942267?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1077504?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie" } ], "aliases": [ "CVE-2004-1455" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7q9n-v18z-z7av" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35020?format=api", "vulnerability_id": "VCID-8q82-evfa-s7fm", "summary": "Multiple vulnerabilities have been found in VLC, the worst of which\n could lead to user-assisted execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2396.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2396.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2396", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.85303", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.85296", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.85305", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.85211", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.85213", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.85235", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.85243", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.85258", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.85255", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.85252", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.85272", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.85274", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.85273", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02478", "scoring_system": "epss", "scoring_elements": "0.85226", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02478", "scoring_system": "epss", "scoring_elements": "0.85214", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2396" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2396", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2396" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=818583", "reference_id": "818583", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=818583" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/18757.txt", "reference_id": "CVE-2012-2396;OSVDB-81224", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/18757.txt" }, { "reference_url": "https://security.gentoo.org/glsa/201411-01", "reference_id": "GLSA-201411-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201411-01" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942265?format=api", "purl": "pkg:deb/debian/vlc@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942266?format=api", "purl": "pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942264?format=api", "purl": "pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942268?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942267?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1077504?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-2396" ], "risk_score": null, "exploitability": "2.0", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8q82-evfa-s7fm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42656?format=api", "vulnerability_id": "VCID-cgzb-rvv6-77ga", "summary": "xine-lib contains several vulnerabilities potentially allowing the\n execution of arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-1476", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02053", "scoring_system": "epss", "scoring_elements": "0.83811", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02053", "scoring_system": "epss", "scoring_elements": "0.83824", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02053", "scoring_system": "epss", "scoring_elements": "0.8384", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02053", "scoring_system": "epss", "scoring_elements": "0.83842", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02053", "scoring_system": "epss", "scoring_elements": "0.83865", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02053", "scoring_system": "epss", "scoring_elements": "0.83871", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02053", "scoring_system": "epss", "scoring_elements": "0.83888", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02053", "scoring_system": "epss", "scoring_elements": "0.83881", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02053", "scoring_system": "epss", "scoring_elements": "0.83877", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02053", "scoring_system": "epss", "scoring_elements": "0.8391", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02053", "scoring_system": "epss", "scoring_elements": "0.83936", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02053", "scoring_system": "epss", "scoring_elements": "0.83943", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02053", "scoring_system": "epss", "scoring_elements": "0.83948", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-1476" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1476", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1476" }, { "reference_url": "https://security.gentoo.org/glsa/200409-30", "reference_id": "GLSA-200409-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200409-30" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942265?format=api", "purl": "pkg:deb/debian/vlc@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942266?format=api", "purl": "pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942264?format=api", "purl": "pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942268?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942267?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1077504?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie" } ], "aliases": [ "CVE-2004-1476" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cgzb-rvv6-77ga" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31483?format=api", "vulnerability_id": "VCID-cr56-z48y-v7fh", "summary": "xine-lib contains an exploitable buffer overflow in the VCD handling code", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-1475", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05483", "scoring_system": "epss", "scoring_elements": "0.90167", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05483", "scoring_system": "epss", "scoring_elements": "0.90169", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05483", "scoring_system": "epss", "scoring_elements": "0.90181", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05483", "scoring_system": "epss", "scoring_elements": "0.90187", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05483", "scoring_system": "epss", "scoring_elements": "0.90203", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05483", "scoring_system": "epss", "scoring_elements": "0.90208", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05483", "scoring_system": "epss", "scoring_elements": "0.90217", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05483", "scoring_system": "epss", "scoring_elements": "0.90216", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05483", "scoring_system": "epss", "scoring_elements": "0.90211", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05483", "scoring_system": "epss", "scoring_elements": "0.90229", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05483", "scoring_system": "epss", "scoring_elements": "0.90225", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05483", "scoring_system": "epss", "scoring_elements": "0.90239", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.05483", "scoring_system": "epss", "scoring_elements": "0.90235", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-1475" }, { "reference_url": "https://security.gentoo.org/glsa/200408-18", "reference_id": "GLSA-200408-18", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200408-18" }, { "reference_url": "https://security.gentoo.org/glsa/200409-30", "reference_id": "GLSA-200409-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200409-30" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/386.c", "reference_id": "OSVDB-10041;CVE-2004-1475", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/386.c" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942265?format=api", "purl": "pkg:deb/debian/vlc@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942266?format=api", "purl": "pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942264?format=api", "purl": "pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942268?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942267?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1077504?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie" } ], "aliases": [ "CVE-2004-1475" ], "risk_score": null, "exploitability": "2.0", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cr56-z48y-v7fh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46260?format=api", "vulnerability_id": "VCID-czjq-xn4q-qye6", "summary": "Multiple vulnerabilities in xine-lib might result in the remote execution\n of arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html" }, { "reference_url": "http://osvdb.org/47677", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/47677" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5246", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04348", "scoring_system": "epss", "scoring_elements": "0.88976", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.04348", "scoring_system": "epss", "scoring_elements": "0.88889", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04348", "scoring_system": "epss", "scoring_elements": "0.88898", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04348", "scoring_system": "epss", "scoring_elements": "0.88914", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04348", "scoring_system": "epss", "scoring_elements": "0.88916", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04348", "scoring_system": "epss", "scoring_elements": "0.88934", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04348", "scoring_system": "epss", "scoring_elements": "0.88939", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04348", "scoring_system": "epss", "scoring_elements": "0.88951", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04348", "scoring_system": "epss", "scoring_elements": "0.88945", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04348", "scoring_system": "epss", "scoring_elements": "0.88944", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04348", "scoring_system": "epss", "scoring_elements": "0.88957", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04348", "scoring_system": "epss", "scoring_elements": "0.88955", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04348", "scoring_system": "epss", "scoring_elements": "0.88952", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04348", "scoring_system": "epss", "scoring_elements": "0.88969", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5246" }, { "reference_url": "http://securitytracker.com/id?1020703", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1020703" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44468", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44468" }, { "reference_url": "http://sourceforge.net/project/shownotes.php?release_id=619869", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceforge.net/project/shownotes.php?release_id=619869" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:020", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:020" }, { "reference_url": "http://www.securityfocus.com/bid/30698", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/30698" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/2382", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/2382" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5246", "reference_id": "CVE-2008-5246", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5246" }, { "reference_url": "https://security.gentoo.org/glsa/201006-04", "reference_id": "GLSA-201006-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201006-04" }, { "reference_url": "https://usn.ubuntu.com/710-1/", "reference_id": "USN-710-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/710-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942265?format=api", "purl": "pkg:deb/debian/vlc@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942266?format=api", "purl": "pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942264?format=api", "purl": "pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942268?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942267?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1077504?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie" } ], "aliases": [ "CVE-2008-5246" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-czjq-xn4q-qye6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35003?format=api", "vulnerability_id": "VCID-dphy-1hau-gqgz", "summary": "Multiple vulnerabilities have been found in VLC, the worst of which\n could lead to user-assisted execution of arbitrary code.", "references": [ { "reference_url": "http://git.videolan.org/?p=vlc/vlc-1.1.git%3Ba=blobdiff%3Bf=bin/winvlc.c%3Bh=ac9b97ca9f5f9ba001f13bf61eb5127a1c1dbcbf%3Bhp=2d09cba320e3b0def7069ce1ebab25d1340161c5%3Bhb=43a31df56c37bd62c691cdbe3c1f11babd164b56%3Bhpb=2d366da738b19f8d761d7084746c6db6f52808c6", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.videolan.org/?p=vlc/vlc-1.1.git%3Ba=blobdiff%3Bf=bin/winvlc.c%3Bh=ac9b97ca9f5f9ba001f13bf61eb5127a1c1dbcbf%3Bhp=2d09cba320e3b0def7069ce1ebab25d1340161c5%3Bhb=43a31df56c37bd62c691cdbe3c1f11babd164b56%3Bhpb=2d366da738b19f8d761d7084746c6db6f52808c6" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3124", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08392", "scoring_system": "epss", "scoring_elements": "0.92337", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.08392", "scoring_system": "epss", "scoring_elements": "0.92283", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.08392", "scoring_system": "epss", "scoring_elements": "0.9229", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08392", "scoring_system": "epss", "scoring_elements": "0.92295", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08392", "scoring_system": "epss", "scoring_elements": "0.92298", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.08392", "scoring_system": "epss", "scoring_elements": "0.9231", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08392", "scoring_system": "epss", "scoring_elements": "0.92314", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.08392", "scoring_system": "epss", "scoring_elements": "0.9232", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.08392", "scoring_system": "epss", "scoring_elements": "0.92321", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08392", "scoring_system": "epss", "scoring_elements": "0.92319", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08392", "scoring_system": "epss", "scoring_elements": "0.92332", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.08392", "scoring_system": "epss", "scoring_elements": "0.92331", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.08392", "scoring_system": "epss", "scoring_elements": "0.92336", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3124" }, { "reference_url": "http://secunia.com/advisories/41107", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/41107" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12190", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12190" }, { "reference_url": "http://www.exploit-db.com/exploits/14750", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.exploit-db.com/exploits/14750" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2010/08/25/10", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2010/08/25/10" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2010/08/25/9", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2010/08/25/9" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2172", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2172" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.1.99b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99e:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.1.99e:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99e:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99f:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.1.99f:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99f:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99g:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.1.99g:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99g:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99h:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.1.99h:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99h:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99i:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.1.99i:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99i:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.60:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.2.60:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.60:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.61:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.2.61:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.61:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.62:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.2.62:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.62:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.63:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.2.63:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.63:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.70:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.2.70:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.70:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.71:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.2.71:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.71:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.72:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.2.72:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.72:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.73:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.2.73:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.73:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.80:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.2.80:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.80:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.81:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.2.81:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.81:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.82:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.2.82:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.82:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.83:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.2.83:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.83:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.90:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.2.90:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.90:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.91:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.2.91:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.91:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.92:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.2.92:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.92:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.4.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.4.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.4.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3124", "reference_id": "CVE-2010-3124", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3124" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/14750.txt", "reference_id": "CVE-2010-3124;OSVDB-67492", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/14750.txt" }, { "reference_url": "https://security.gentoo.org/glsa/201411-01", "reference_id": "GLSA-201411-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201411-01" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942265?format=api", "purl": "pkg:deb/debian/vlc@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942266?format=api", "purl": "pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942264?format=api", "purl": "pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942268?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942267?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1077504?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie" } ], "aliases": [ "CVE-2010-3124" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dphy-1hau-gqgz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/148550?format=api", "vulnerability_id": "VCID-f75g-5ga6-7qgh", "summary": "codec\\libpng_plugin.dll in VideoLAN VLC Media Player 2.1.3 allows remote attackers to cause a denial of service (crash) via a crafted .png file, as demonstrated by a png in a .wave file.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3441", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07967", "scoring_system": "epss", "scoring_elements": "0.92042", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07967", "scoring_system": "epss", "scoring_elements": "0.92048", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07967", "scoring_system": "epss", "scoring_elements": "0.92055", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07967", "scoring_system": "epss", "scoring_elements": "0.9206", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07967", "scoring_system": "epss", "scoring_elements": "0.92072", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07967", "scoring_system": "epss", "scoring_elements": "0.92075", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07967", "scoring_system": "epss", "scoring_elements": "0.92079", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07967", "scoring_system": "epss", "scoring_elements": "0.92086", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.07967", "scoring_system": "epss", "scoring_elements": "0.92084", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.07967", "scoring_system": "epss", "scoring_elements": "0.92082", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.07967", "scoring_system": "epss", "scoring_elements": "0.92083", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3441" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/39177.py", "reference_id": "CVE-2014-3441;OSVDB-106843", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/39177.py" }, { "reference_url": "https://www.securityfocus.com/bid/67315/info", "reference_id": "CVE-2014-3441;OSVDB-106843", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/67315/info" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942265?format=api", "purl": "pkg:deb/debian/vlc@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942266?format=api", "purl": "pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942264?format=api", "purl": "pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942268?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942267?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1077504?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie" } ], "aliases": [ "CVE-2014-3441" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f75g-5ga6-7qgh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/102601?format=api", "vulnerability_id": "VCID-f8gy-t4tp-8ugv", "summary": "Buffer overflow in the open_aiff_file function in demux_aiff.c for xine-lib (libxine) 1-rc7 allows remote attackers to execute arbitrary code via a crafted AIFF file.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-1300", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.09687", "scoring_system": "epss", "scoring_elements": "0.92939", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.09687", "scoring_system": "epss", "scoring_elements": "0.92892", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.09687", "scoring_system": "epss", "scoring_elements": "0.929", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.09687", "scoring_system": "epss", "scoring_elements": "0.92904", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.09687", "scoring_system": "epss", "scoring_elements": "0.92911", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.09687", "scoring_system": "epss", "scoring_elements": "0.92916", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.09687", "scoring_system": "epss", "scoring_elements": "0.92921", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.09687", "scoring_system": "epss", "scoring_elements": "0.92919", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.09687", "scoring_system": "epss", "scoring_elements": "0.9292", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.09687", "scoring_system": "epss", "scoring_elements": "0.92931", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.09687", "scoring_system": "epss", "scoring_elements": "0.92933", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.09687", "scoring_system": "epss", "scoring_elements": "0.92938", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.09687", "scoring_system": "epss", "scoring_elements": "0.92941", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.09687", "scoring_system": "epss", "scoring_elements": "0.92943", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-1300" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18611", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18611" }, { "reference_url": "http://tigger.uic.edu/~jlongs2/holes/xine-lib.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://tigger.uic.edu/~jlongs2/holes/xine-lib.txt" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:011", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:011" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_rc7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1300", "reference_id": "CVE-2004-1300", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1300" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/24978.txt", "reference_id": "CVE-2004-1300;OSVDB-12474", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/24978.txt" }, { "reference_url": "https://www.securityfocus.com/bid/11969/info", "reference_id": "CVE-2004-1300;OSVDB-12474", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/11969/info" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942265?format=api", "purl": "pkg:deb/debian/vlc@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942266?format=api", "purl": "pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942264?format=api", "purl": "pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942268?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942267?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1077504?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie" } ], "aliases": [ "CVE-2004-1300" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f8gy-t4tp-8ugv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/139359?format=api", "vulnerability_id": "VCID-nnx3-tewc-vfgx", "summary": "VLC media player 1.1.11 allows remote attackers to cause a denial of service (crash) via a long string in an amr file.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0904", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08336", "scoring_system": "epss", "scoring_elements": "0.92251", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.08336", "scoring_system": "epss", "scoring_elements": "0.92258", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08336", "scoring_system": "epss", "scoring_elements": "0.92264", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08336", "scoring_system": "epss", "scoring_elements": "0.92266", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.08336", "scoring_system": "epss", "scoring_elements": "0.92278", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08336", "scoring_system": "epss", "scoring_elements": "0.92282", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.08336", "scoring_system": "epss", "scoring_elements": "0.92288", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.08336", "scoring_system": "epss", "scoring_elements": "0.92289", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08336", "scoring_system": "epss", "scoring_elements": "0.92286", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08336", "scoring_system": "epss", "scoring_elements": "0.92298", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.08336", "scoring_system": "epss", "scoring_elements": "0.92303", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.08336", "scoring_system": "epss", "scoring_elements": "0.92304", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.08336", "scoring_system": "epss", "scoring_elements": "0.923", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0904" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/18309.pl", "reference_id": "OSVDB-78618;CVE-2012-0904", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/18309.pl" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942265?format=api", "purl": "pkg:deb/debian/vlc@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942266?format=api", "purl": "pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942264?format=api", "purl": "pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942268?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942267?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1077504?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-0904" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nnx3-tewc-vfgx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/130098?format=api", "vulnerability_id": "VCID-pwwt-2djv-nfdj", "summary": "Stack-based buffer overflow in the Win32AddConnection function in modules/access/smb.c in VideoLAN VLC media player 0.9.9, when running on Microsoft Windows, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a long smb URI in a playlist file.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-2484", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.71229", "scoring_system": "epss", "scoring_elements": "0.98702", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.71229", "scoring_system": "epss", "scoring_elements": "0.98703", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.71229", "scoring_system": "epss", "scoring_elements": "0.98706", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.71229", "scoring_system": "epss", "scoring_elements": "0.9871", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.71229", "scoring_system": "epss", "scoring_elements": "0.98713", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.71229", "scoring_system": "epss", "scoring_elements": "0.98714", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.71229", "scoring_system": "epss", "scoring_elements": "0.98716", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.71229", "scoring_system": "epss", "scoring_elements": "0.98718", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.71229", "scoring_system": "epss", "scoring_elements": "0.98719", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.71229", "scoring_system": "epss", "scoring_elements": "0.98723", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.71229", "scoring_system": "epss", "scoring_elements": "0.98725", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-2484" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows_x86/local/16678.rb", "reference_id": "CVE-2009-2484;OSVDB-55509", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows_x86/local/16678.rb" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/9029.rb", "reference_id": "OSVDB-55509;CVE-2009-2484", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/9029.rb" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942265?format=api", "purl": "pkg:deb/debian/vlc@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942266?format=api", "purl": "pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942264?format=api", "purl": "pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942268?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942267?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1077504?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-2484" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pwwt-2djv-nfdj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/302501?format=api", "vulnerability_id": "VCID-q6jt-16jx-kyf3", "summary": "A binary hijacking vulnerability exists within the VideoLAN VLC media player before 3.0.19 on Windows. The uninstaller attempts to execute code with elevated privileges out of a standard user writable location. Standard users may use this to gain arbitrary code execution as SYSTEM.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-46814", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28578", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.29045", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.29095", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28904", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28971", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.29014", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.29018", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28973", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28923", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28948", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28924", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28878", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28758", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28647", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-46814" }, { "reference_url": "https://www.videolan.org/security/sb-vlc3019.html", "reference_id": "sb-vlc3019.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T15:15:48Z/" } ], "url": "https://www.videolan.org/security/sb-vlc3019.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942265?format=api", "purl": "pkg:deb/debian/vlc@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942266?format=api", "purl": "pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942264?format=api", "purl": "pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942268?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942267?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1077504?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-46814" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q6jt-16jx-kyf3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46262?format=api", "vulnerability_id": "VCID-qb91-xxjz-7ka2", "summary": "Multiple vulnerabilities in xine-lib might result in the remote execution\n of arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5248", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00564", "scoring_system": "epss", "scoring_elements": "0.68493", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00564", "scoring_system": "epss", "scoring_elements": "0.68339", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00564", "scoring_system": "epss", "scoring_elements": "0.68359", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00564", "scoring_system": "epss", "scoring_elements": "0.68378", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00564", "scoring_system": "epss", "scoring_elements": "0.68355", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00564", "scoring_system": "epss", "scoring_elements": "0.68406", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00564", "scoring_system": "epss", "scoring_elements": "0.68423", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00564", "scoring_system": "epss", "scoring_elements": "0.68449", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00564", "scoring_system": "epss", "scoring_elements": "0.68437", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00564", "scoring_system": "epss", "scoring_elements": "0.68404", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00564", "scoring_system": "epss", "scoring_elements": "0.68442", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00564", "scoring_system": "epss", "scoring_elements": "0.68456", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00564", "scoring_system": "epss", "scoring_elements": "0.68434", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00564", "scoring_system": "epss", "scoring_elements": "0.68482", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00564", "scoring_system": "epss", "scoring_elements": "0.68487", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5248" }, { "reference_url": "http://sourceforge.net/project/shownotes.php?release_id=619869", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceforge.net/project/shownotes.php?release_id=619869" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:298", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:298" }, { "reference_url": "http://www.securityfocus.com/bid/32505", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/32505" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5248", "reference_id": "CVE-2008-5248", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5248" }, { "reference_url": "https://security.gentoo.org/glsa/201006-04", "reference_id": "GLSA-201006-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201006-04" }, { "reference_url": "https://usn.ubuntu.com/710-1/", "reference_id": "USN-710-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/710-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942265?format=api", "purl": "pkg:deb/debian/vlc@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942266?format=api", "purl": "pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942264?format=api", "purl": "pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942268?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942267?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1077504?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie" } ], "aliases": [ "CVE-2008-5248" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qb91-xxjz-7ka2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60105?format=api", "vulnerability_id": "VCID-s3wy-3zks-4bcj", "summary": "Multiple vulnerabilities have been found in VLC allowing remote\n attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9625", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01634", "scoring_system": "epss", "scoring_elements": "0.81844", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01634", "scoring_system": "epss", "scoring_elements": "0.81855", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01634", "scoring_system": "epss", "scoring_elements": "0.81878", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01634", "scoring_system": "epss", "scoring_elements": "0.81874", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01634", "scoring_system": "epss", "scoring_elements": "0.81901", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01634", "scoring_system": "epss", "scoring_elements": "0.81907", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01634", "scoring_system": "epss", "scoring_elements": "0.81927", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01634", "scoring_system": "epss", "scoring_elements": "0.81915", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01634", "scoring_system": "epss", "scoring_elements": "0.8191", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01634", "scoring_system": "epss", "scoring_elements": "0.81946", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01634", "scoring_system": "epss", "scoring_elements": "0.81948", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01634", "scoring_system": "epss", "scoring_elements": "0.8197", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01634", "scoring_system": "epss", "scoring_elements": "0.81981", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01634", "scoring_system": "epss", "scoring_elements": "0.81987", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9625" }, { "reference_url": "https://security.gentoo.org/glsa/201603-08", "reference_id": "GLSA-201603-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-08" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942265?format=api", "purl": "pkg:deb/debian/vlc@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942266?format=api", "purl": "pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942264?format=api", "purl": "pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942268?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942267?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1077504?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie" } ], "aliases": [ "CVE-2014-9625" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s3wy-3zks-4bcj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46264?format=api", "vulnerability_id": "VCID-v6g4-5jg7-fkad", "summary": "Multiple vulnerabilities in xine-lib might result in the remote execution\n of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1274.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1274.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1274", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04836", "scoring_system": "epss", "scoring_elements": "0.89485", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04836", "scoring_system": "epss", "scoring_elements": "0.89488", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04836", "scoring_system": "epss", "scoring_elements": "0.895", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04836", "scoring_system": "epss", "scoring_elements": "0.89516", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04836", "scoring_system": "epss", "scoring_elements": "0.8952", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04836", "scoring_system": "epss", "scoring_elements": "0.89527", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04836", "scoring_system": "epss", "scoring_elements": "0.89525", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04836", "scoring_system": "epss", "scoring_elements": "0.89534", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04836", "scoring_system": "epss", "scoring_elements": "0.89535", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04836", "scoring_system": "epss", "scoring_elements": "0.89533", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04836", "scoring_system": "epss", "scoring_elements": "0.89548", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04836", "scoring_system": "epss", "scoring_elements": "0.89552", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1274" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=495031", "reference_id": "495031", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=495031" }, { "reference_url": "https://security.gentoo.org/glsa/201006-04", "reference_id": "GLSA-201006-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201006-04" }, { "reference_url": "https://usn.ubuntu.com/763-1/", "reference_id": "USN-763-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/763-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942265?format=api", "purl": "pkg:deb/debian/vlc@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942266?format=api", "purl": "pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942264?format=api", "purl": "pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942268?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942267?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1077504?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-1274" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v6g4-5jg7-fkad" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35023?format=api", "vulnerability_id": "VCID-v8gd-4b6v-6qaw", "summary": "Multiple vulnerabilities have been found in VLC, the worst of which\n could lead to user-assisted execution of arbitrary code.", "references": [ { "reference_url": "http://marc.info/?l=oss-security&m=135274330022215&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=135274330022215&w=2" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-5855", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.56983", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.56912", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57009", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57031", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57008", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57058", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.5706", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57071", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.5705", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57027", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57055", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.57052", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.5703", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00344", "scoring_system": "epss", "scoring_elements": "0.56964", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-5855" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16781", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16781" }, { "reference_url": "http://www.securityfocus.com/archive/1/524626", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/524626" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:videolan:vlc_media_player:2.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5855", "reference_id": "CVE-2012-5855", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5855" }, { "reference_url": "https://security.gentoo.org/glsa/201411-01", "reference_id": "GLSA-201411-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201411-01" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942265?format=api", "purl": "pkg:deb/debian/vlc@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942266?format=api", "purl": "pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942264?format=api", "purl": "pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942268?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942267?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1077504?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-5855" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v8gd-4b6v-6qaw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/122110?format=api", "vulnerability_id": "VCID-vn64-q1cr-rub4", "summary": "A certain ActiveX control in axvlc.dll in VideoLAN VLC 0.8.6 before 0.8.6d allows remote attackers to execute arbitrary code via crafted arguments to the (1) addTarget, (2) getVariable, or (3) setVariable function, resulting from a \"bad initialized pointer,\" aka a \"recursive plugin release vulnerability.\"", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-6262", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.22802", "scoring_system": "epss", "scoring_elements": "0.95842", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.22802", "scoring_system": "epss", "scoring_elements": "0.9585", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.22802", "scoring_system": "epss", "scoring_elements": "0.95859", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.22802", "scoring_system": "epss", "scoring_elements": "0.95862", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.22802", "scoring_system": "epss", "scoring_elements": "0.95871", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.22802", "scoring_system": "epss", "scoring_elements": "0.95874", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.22802", "scoring_system": "epss", "scoring_elements": "0.95877", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.22802", "scoring_system": "epss", "scoring_elements": "0.95879", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.22802", "scoring_system": "epss", "scoring_elements": "0.9589", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.22802", "scoring_system": "epss", "scoring_elements": "0.95896", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.22802", "scoring_system": "epss", "scoring_elements": "0.95898", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.22802", "scoring_system": "epss", "scoring_elements": "0.95899", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-6262" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/4688.html", "reference_id": "OSVDB-42192;CVE-2007-6262", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/4688.html" }, { "reference_url": "http://www.coresecurity.com/?action=item&id=2035", "reference_id": "OSVDB-42192;CVE-2007-6262", "reference_type": "exploit", "scores": [], "url": "http://www.coresecurity.com/?action=item&id=2035" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942265?format=api", "purl": "pkg:deb/debian/vlc@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942266?format=api", "purl": "pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942264?format=api", "purl": "pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942268?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942267?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1077504?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie" } ], "aliases": [ "CVE-2007-6262" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vn64-q1cr-rub4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46263?format=api", "vulnerability_id": "VCID-xuxj-e3ez-g3bx", "summary": "Multiple vulnerabilities in xine-lib might result in the remote execution\n of arbitrary code.", "references": [ { "reference_url": "http://bugs.xine-project.org/show_bug.cgi?id=205", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.xine-project.org/show_bug.cgi?id=205" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0698", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02442", "scoring_system": "epss", "scoring_elements": "0.85231", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02442", "scoring_system": "epss", "scoring_elements": "0.85108", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02442", "scoring_system": "epss", "scoring_elements": "0.85121", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02442", "scoring_system": "epss", "scoring_elements": "0.85138", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02442", "scoring_system": "epss", "scoring_elements": "0.85142", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02442", "scoring_system": "epss", "scoring_elements": "0.85164", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02442", "scoring_system": "epss", "scoring_elements": "0.85171", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02442", "scoring_system": "epss", "scoring_elements": "0.85186", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02442", "scoring_system": "epss", "scoring_elements": "0.85183", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02442", "scoring_system": "epss", "scoring_elements": "0.8518", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02442", "scoring_system": "epss", "scoring_elements": "0.85202", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02442", "scoring_system": "epss", "scoring_elements": "0.85203", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02442", "scoring_system": "epss", "scoring_elements": "0.85225", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02442", "scoring_system": "epss", "scoring_elements": "0.85234", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0698" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48954", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48954" }, { "reference_url": "http://sourceforge.net/project/shownotes.php?release_id=660071", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceforge.net/project/shownotes.php?release_id=660071" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:298", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:298" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:299", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:299" }, { "reference_url": "http://www.securityfocus.com/archive/1/500514/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/500514/100/0/threaded" }, { "reference_url": "http://www.trapkit.de/advisories/TKADV2009-004.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trapkit.de/advisories/TKADV2009-004.txt" }, { "reference_url": "http://www.ubuntu.com/usn/USN-746-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-746-1" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.16.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.16.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.16.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0698", "reference_id": "CVE-2009-0698", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0698" }, { "reference_url": "https://security.gentoo.org/glsa/201006-04", "reference_id": "GLSA-201006-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201006-04" }, { "reference_url": "https://usn.ubuntu.com/746-1/", "reference_id": "USN-746-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/746-1/" }, { "reference_url": "https://usn.ubuntu.com/763-1/", "reference_id": "USN-763-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/763-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942265?format=api", "purl": "pkg:deb/debian/vlc@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942266?format=api", "purl": "pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942264?format=api", "purl": "pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942268?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942267?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1077504?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-0698" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xuxj-e3ez-g3bx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46244?format=api", "vulnerability_id": "VCID-ys55-8nfw-cbc3", "summary": "Multiple vulnerabilities in xine-lib might result in the remote execution\n of arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5233", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01413", "scoring_system": "epss", "scoring_elements": "0.80613", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01413", "scoring_system": "epss", "scoring_elements": "0.80479", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01413", "scoring_system": "epss", "scoring_elements": "0.80485", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01413", "scoring_system": "epss", "scoring_elements": "0.80506", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01413", "scoring_system": "epss", "scoring_elements": "0.80496", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01413", "scoring_system": "epss", "scoring_elements": "0.80526", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01413", "scoring_system": "epss", "scoring_elements": "0.80536", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01413", "scoring_system": "epss", "scoring_elements": "0.80554", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01413", "scoring_system": "epss", "scoring_elements": "0.8054", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01413", "scoring_system": "epss", "scoring_elements": "0.80533", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01413", "scoring_system": "epss", "scoring_elements": "0.80562", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01413", "scoring_system": "epss", "scoring_elements": "0.80564", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01413", "scoring_system": "epss", "scoring_elements": "0.80567", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01413", "scoring_system": "epss", "scoring_elements": "0.80593", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01413", "scoring_system": "epss", "scoring_elements": "0.80596", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5233" }, { "reference_url": "http://secunia.com/advisories/31827", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31827" }, { "reference_url": "http://securityreason.com/securityalert/4648", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securityreason.com/securityalert/4648" }, { "reference_url": "http://securitytracker.com/id?1020703", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1020703" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44639", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44639" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44648", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44648" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44649", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44649" }, { "reference_url": "http://sourceforge.net/project/shownotes.php?release_id=619869", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceforge.net/project/shownotes.php?release_id=619869" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00174.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00174.html" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00385.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00385.html" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:020", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:020" }, { "reference_url": "http://www.ocert.org/analysis/2008-008/analysis.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ocert.org/analysis/2008-008/analysis.txt" }, { "reference_url": "http://www.osvdb.org/47747", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.osvdb.org/47747" }, { "reference_url": "http://www.securityfocus.com/archive/1/495674/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/495674/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/30797", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/30797" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5233", "reference_id": "CVE-2008-5233", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5233" }, { "reference_url": "https://security.gentoo.org/glsa/201006-04", "reference_id": "GLSA-201006-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201006-04" }, { "reference_url": "https://usn.ubuntu.com/710-1/", "reference_id": "USN-710-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/710-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942265?format=api", "purl": "pkg:deb/debian/vlc@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942266?format=api", "purl": "pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942264?format=api", "purl": "pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942268?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942267?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1077504?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie" } ], "aliases": [ "CVE-2008-5233" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ys55-8nfw-cbc3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46246?format=api", "vulnerability_id": "VCID-yzgd-n56h-gyfb", "summary": "Multiple vulnerabilities in xine-lib might result in the remote execution\n of arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5235.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5235.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5235", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03478", "scoring_system": "epss", "scoring_elements": "0.876", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03478", "scoring_system": "epss", "scoring_elements": "0.87508", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03478", "scoring_system": "epss", "scoring_elements": "0.87518", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03478", "scoring_system": "epss", "scoring_elements": "0.87532", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03478", "scoring_system": "epss", "scoring_elements": "0.87535", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03478", "scoring_system": "epss", "scoring_elements": "0.87554", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03478", "scoring_system": "epss", "scoring_elements": "0.8756", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03478", "scoring_system": "epss", "scoring_elements": "0.87572", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03478", "scoring_system": "epss", "scoring_elements": "0.87568", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03478", "scoring_system": "epss", "scoring_elements": "0.87564", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03478", "scoring_system": "epss", "scoring_elements": "0.87578", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03478", "scoring_system": "epss", "scoring_elements": "0.87579", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03478", "scoring_system": "epss", "scoring_elements": "0.87577", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03478", "scoring_system": "epss", "scoring_elements": "0.87595", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03478", "scoring_system": "epss", "scoring_elements": "0.87602", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5235" }, { "reference_url": "http://secunia.com/advisories/31502", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31502" }, { "reference_url": "http://securitytracker.com/id?1020703", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1020703" }, { "reference_url": "http://sourceforge.net/project/shownotes.php?release_id=619869", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceforge.net/project/shownotes.php?release_id=619869" }, { "reference_url": "http://www.securityfocus.com/bid/30698", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/30698" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/2382", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/2382" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=473234", "reference_id": "473234", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=473234" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:0.9.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:0.9.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:0.9.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.0.3a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1.0.3a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.0.3a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1.1.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1.1.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.11.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1.1.11.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.11.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta10:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1:beta10:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta10:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta11:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1:beta11:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta11:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta12:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1:beta12:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta12:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1:beta4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1:beta5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta6:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1:beta6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta7:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1:beta7:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta7:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta8:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1:beta8:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta8:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta9:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1:beta9:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta9:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc0a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1:rc0a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc0a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc3a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1:rc3a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc3a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc3b:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1:rc3b:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc3b:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc3c:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1:rc3c:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc3c:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc4a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1:rc4a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc4a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1:rc5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc6a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1:rc6a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc6a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc7:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1:rc7:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc7:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc8:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xine:xine:1:rc8:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc8:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5235", "reference_id": "CVE-2008-5235", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5235" }, { "reference_url": "https://security.gentoo.org/glsa/201006-04", "reference_id": "GLSA-201006-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201006-04" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942265?format=api", "purl": "pkg:deb/debian/vlc@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942266?format=api", "purl": "pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942264?format=api", "purl": "pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942268?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942267?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1077504?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie" } ], "aliases": [ "CVE-2008-5235" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yzgd-n56h-gyfb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31093?format=api", "vulnerability_id": "VCID-zdpz-ctms-skgj", "summary": "xine-lib is vulnerable to multiple buffer overflows when processing FLAC\n and ASF streams.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-1664", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06458", "scoring_system": "epss", "scoring_elements": "0.91023", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06458", "scoring_system": "epss", "scoring_elements": "0.91028", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06458", "scoring_system": "epss", "scoring_elements": "0.91037", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06458", "scoring_system": "epss", "scoring_elements": "0.91045", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06458", "scoring_system": "epss", "scoring_elements": "0.91058", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06458", "scoring_system": "epss", "scoring_elements": "0.91064", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06458", "scoring_system": "epss", "scoring_elements": "0.91073", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06458", "scoring_system": "epss", "scoring_elements": "0.91097", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.06458", "scoring_system": "epss", "scoring_elements": "0.911", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.06458", "scoring_system": "epss", "scoring_elements": "0.91113", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.06458", "scoring_system": "epss", "scoring_elements": "0.91111", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.06458", "scoring_system": "epss", "scoring_elements": "0.91106", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-1664" }, { "reference_url": "https://security.gentoo.org/glsa/200604-16", "reference_id": "GLSA-200604-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200604-16" }, { "reference_url": "https://security.gentoo.org/glsa/200802-12", "reference_id": "GLSA-200802-12", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200802-12" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/1641.pl", "reference_id": "OSVDB-42658;CVE-2008-1110;OSVDB-25004;CVE-2006-1664;OSVDB-24581", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/1641.pl" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942265?format=api", "purl": "pkg:deb/debian/vlc@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942266?format=api", "purl": "pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942264?format=api", "purl": "pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942268?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942267?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1077504?format=api", "purl": "pkg:deb/debian/vlc@3.0.23-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie" } ], "aliases": [ "CVE-2006-1664" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zdpz-ctms-skgj" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie" }