{"url":"http://public2.vulnerablecode.io/api/packages/1026223?format=json","purl":"pkg:rpm/redhat/gstreamer1-plugins-good@1.22.12-5?arch=el9_7","type":"rpm","namespace":"redhat","name":"gstreamer1-plugins-good","version":"1.22.12-5","qualifiers":{"arch":"el9_7"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64265?format=json","vulnerability_id":"VCID-4ka2-hbcv-8uh2","summary":"GStreamer: GStreamer: Remote Code Execution via Heap-based Buffer Overflow in rtpqdm2depay","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3085.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3085.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-3085","reference_id":"","reference_type":"","scores":[{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50739","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50774","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50765","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50721","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50777","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50817","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50793","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50778","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00298","scoring_system":"epss","scoring_elements":"0.53196","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00298","scoring_system":"epss","scoring_elements":"0.53171","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00298","scoring_system":"epss","scoring_elements":"0.53129","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00298","scoring_system":"epss","scoring_elements":"0.53234","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00298","scoring_system":"epss","scoring_elements":"0.5324","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00298","scoring_system":"epss","scoring_elements":"0.53222","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00298","scoring_system":"epss","scoring_elements":"0.53209","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-3085"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3085","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3085"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2447495","reference_id":"2447495","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2447495"},{"reference_url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/d60a94dee3c0a0942c9981491bf83e0de1900fbf","reference_id":"d60a94dee3c0a0942c9981491bf83e0de1900fbf","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-16T20:25:47Z/"}],"url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/d60a94dee3c0a0942c9981491bf83e0de1900fbf"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6259","reference_id":"RHSA-2026:6259","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6259"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6300","reference_id":"RHSA-2026:6300","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6300"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6750","reference_id":"RHSA-2026:6750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6750"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7673","reference_id":"RHSA-2026:7673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7673"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7850","reference_id":"RHSA-2026:7850","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7850"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8854","reference_id":"RHSA-2026:8854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8857","reference_id":"RHSA-2026:8857","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8857"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8862","reference_id":"RHSA-2026:8862","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8862"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8874","reference_id":"RHSA-2026:8874","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8874"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8876","reference_id":"RHSA-2026:8876","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8876"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9446","reference_id":"RHSA-2026:9446","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9446"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9447","reference_id":"RHSA-2026:9447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9487","reference_id":"RHSA-2026:9487","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9487"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9488","reference_id":"RHSA-2026:9488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9488"},{"reference_url":"https://usn.ubuntu.com/8131-1/","reference_id":"USN-8131-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8131-1/"},{"reference_url":"https://www.zerodayinitiative.com/advisories/ZDI-26-167/","reference_id":"ZDI-26-167","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-16T20:25:47Z/"}],"url":"https://www.zerodayinitiative.com/advisories/ZDI-26-167/"}],"fixed_packages":[],"aliases":["CVE-2026-3085"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4ka2-hbcv-8uh2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64262?format=json","vulnerability_id":"VCID-a2rd-ntzd-2kdr","summary":"GStreamer: GStreamer: Arbitrary code execution via RIFF palette integer overflow in AVI file handling","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2921.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2921.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-2921","reference_id":"","reference_type":"","scores":[{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09324","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09408","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09374","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09285","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09361","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0942","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09391","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09377","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10419","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10351","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10296","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10333","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10307","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10437","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10408","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-2921"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2921","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2921"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2447496","reference_id":"2447496","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2447496"},{"reference_url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/e3a99c35266fc92dd6a18ac5fde028d0cda559e6","reference_id":"e3a99c35266fc92dd6a18ac5fde028d0cda559e6","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-16T15:26:01Z/"}],"url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/e3a99c35266fc92dd6a18ac5fde028d0cda559e6"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6259","reference_id":"RHSA-2026:6259","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6259"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6300","reference_id":"RHSA-2026:6300","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6300"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6750","reference_id":"RHSA-2026:6750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6750"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7673","reference_id":"RHSA-2026:7673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7673"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7850","reference_id":"RHSA-2026:7850","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7850"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8854","reference_id":"RHSA-2026:8854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8857","reference_id":"RHSA-2026:8857","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8857"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8862","reference_id":"RHSA-2026:8862","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8862"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8874","reference_id":"RHSA-2026:8874","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8874"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8876","reference_id":"RHSA-2026:8876","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8876"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9446","reference_id":"RHSA-2026:9446","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9446"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9447","reference_id":"RHSA-2026:9447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9487","reference_id":"RHSA-2026:9487","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9487"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9488","reference_id":"RHSA-2026:9488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9488"},{"reference_url":"https://usn.ubuntu.com/8130-1/","reference_id":"USN-8130-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8130-1/"},{"reference_url":"https://www.zerodayinitiative.com/advisories/ZDI-26-168/","reference_id":"ZDI-26-168","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-16T15:26:01Z/"}],"url":"https://www.zerodayinitiative.com/advisories/ZDI-26-168/"}],"fixed_packages":[],"aliases":["CVE-2026-2921"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a2rd-ntzd-2kdr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64269?format=json","vulnerability_id":"VCID-fkgk-c6h7-ubgh","summary":"GStreamer: GStreamer: Remote Code Execution via out-of-bounds write in RealMedia Demuxer","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2922.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2922.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-2922","reference_id":"","reference_type":"","scores":[{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24891","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24819","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24931","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24705","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24773","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24833","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24793","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24736","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25964","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25911","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25803","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26083","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.2606","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26025","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.2596","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-2922"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2922","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2922"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2447500","reference_id":"2447500","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2447500"},{"reference_url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/88df8d2cd063b95a076e8041b47f778a4402f363","reference_id":"88df8d2cd063b95a076e8041b47f778a4402f363","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-16T20:24:29Z/"}],"url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/88df8d2cd063b95a076e8041b47f778a4402f363"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6259","reference_id":"RHSA-2026:6259","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6259"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6300","reference_id":"RHSA-2026:6300","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6300"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8854","reference_id":"RHSA-2026:8854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8862","reference_id":"RHSA-2026:8862","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8862"},{"reference_url":"https://www.zerodayinitiative.com/advisories/ZDI-26-165/","reference_id":"ZDI-26-165","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-16T20:24:29Z/"}],"url":"https://www.zerodayinitiative.com/advisories/ZDI-26-165/"}],"fixed_packages":[],"aliases":["CVE-2026-2922"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fkgk-c6h7-ubgh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64266?format=json","vulnerability_id":"VCID-q56p-kvy2-23af","summary":"GStreamer: GStreamer: Remote Code Execution via heap-based buffer overflow in JPEG parser","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3082.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3082.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-3082","reference_id":"","reference_type":"","scores":[{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19578","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19474","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19624","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19345","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19423","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19478","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19431","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19373","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20757","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20719","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20617","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20903","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20905","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20886","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20753","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-3082"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3082","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3082"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2447492","reference_id":"2447492","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2447492"},{"reference_url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/7d3c258ed928cf59d126c8ea926b185f046f444c","reference_id":"7d3c258ed928cf59d126c8ea926b185f046f444c","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-17T12:53:08Z/"}],"url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/7d3c258ed928cf59d126c8ea926b185f046f444c"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6259","reference_id":"RHSA-2026:6259","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6259"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6300","reference_id":"RHSA-2026:6300","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6300"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6750","reference_id":"RHSA-2026:6750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6750"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7673","reference_id":"RHSA-2026:7673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7673"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8854","reference_id":"RHSA-2026:8854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8857","reference_id":"RHSA-2026:8857","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8857"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8862","reference_id":"RHSA-2026:8862","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8862"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8874","reference_id":"RHSA-2026:8874","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8874"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8876","reference_id":"RHSA-2026:8876","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8876"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9446","reference_id":"RHSA-2026:9446","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9446"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9447","reference_id":"RHSA-2026:9447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9487","reference_id":"RHSA-2026:9487","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9487"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9488","reference_id":"RHSA-2026:9488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9488"},{"reference_url":"https://www.zerodayinitiative.com/advisories/ZDI-26-163/","reference_id":"ZDI-26-163","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-17T12:53:08Z/"}],"url":"https://www.zerodayinitiative.com/advisories/ZDI-26-163/"}],"fixed_packages":[],"aliases":["CVE-2026-3082"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q56p-kvy2-23af"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64268?format=json","vulnerability_id":"VCID-qghh-5fn5-8bds","summary":"GStreamer: GStreamer: Remote Code Execution via out-of-bounds write in DVB Subtitles handling","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2923.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2923.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-2923","reference_id":"","reference_type":"","scores":[{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24891","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24819","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24931","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24705","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24773","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24833","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24793","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24736","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25964","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25911","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25803","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26083","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.2606","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26025","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.2596","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-2923"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2923","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2923"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130059","reference_id":"1130059","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130059"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2447503","reference_id":"2447503","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2447503"},{"reference_url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/3b8253f447bcc9831dbf643d2c69b205fedbe086","reference_id":"3b8253f447bcc9831dbf643d2c69b205fedbe086","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-16T20:25:14Z/"}],"url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/3b8253f447bcc9831dbf643d2c69b205fedbe086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6259","reference_id":"RHSA-2026:6259","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6259"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6300","reference_id":"RHSA-2026:6300","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6300"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6750","reference_id":"RHSA-2026:6750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6750"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8854","reference_id":"RHSA-2026:8854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8862","reference_id":"RHSA-2026:8862","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8862"},{"reference_url":"https://www.zerodayinitiative.com/advisories/ZDI-26-161/","reference_id":"ZDI-26-161","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-16T20:25:14Z/"}],"url":"https://www.zerodayinitiative.com/advisories/ZDI-26-161/"}],"fixed_packages":[],"aliases":["CVE-2026-2923"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qghh-5fn5-8bds"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64270?format=json","vulnerability_id":"VCID-qprd-2m5u-bbe7","summary":"GStreamer: GStreamer: Arbitrary code execution via ASF file processing","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2920.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2920.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-2920","reference_id":"","reference_type":"","scores":[{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19578","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19474","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19624","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19345","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19423","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19478","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19431","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19373","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20757","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20719","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20617","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20903","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20905","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20886","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20753","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-2920"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2920","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2920"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2447490","reference_id":"2447490","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2447490"},{"reference_url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/37d7991168a223d0810fd1f4493ec6a8b6a510d3","reference_id":"37d7991168a223d0810fd1f4493ec6a8b6a510d3","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-16T20:23:45Z/"}],"url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/37d7991168a223d0810fd1f4493ec6a8b6a510d3"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6259","reference_id":"RHSA-2026:6259","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6259"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6300","reference_id":"RHSA-2026:6300","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6300"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6750","reference_id":"RHSA-2026:6750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6750"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8854","reference_id":"RHSA-2026:8854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8862","reference_id":"RHSA-2026:8862","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8862"},{"reference_url":"https://www.zerodayinitiative.com/advisories/ZDI-26-164/","reference_id":"ZDI-26-164","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-16T20:23:45Z/"}],"url":"https://www.zerodayinitiative.com/advisories/ZDI-26-164/"}],"fixed_packages":[],"aliases":["CVE-2026-2920"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qprd-2m5u-bbe7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64263?format=json","vulnerability_id":"VCID-upbh-pvqc-4ubn","summary":"GStreamer: GStreamer: Remote Code Execution via Out-Of-Bounds Write in rtpqdm2depay","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3083.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3083.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-3083","reference_id":"","reference_type":"","scores":[{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65814","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65873","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65844","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65809","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65862","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65892","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.6588","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.6585","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.67713","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.67743","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.67746","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.67723","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.67719","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.67732","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-3083"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3083","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3083"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2447498","reference_id":"2447498","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2447498"},{"reference_url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/d60a94dee3c0a0942c9981491bf83e0de1900fbf","reference_id":"d60a94dee3c0a0942c9981491bf83e0de1900fbf","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-16T15:25:51Z/"}],"url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/d60a94dee3c0a0942c9981491bf83e0de1900fbf"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6259","reference_id":"RHSA-2026:6259","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6259"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6300","reference_id":"RHSA-2026:6300","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6300"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6750","reference_id":"RHSA-2026:6750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6750"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7673","reference_id":"RHSA-2026:7673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7673"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7850","reference_id":"RHSA-2026:7850","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7850"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8854","reference_id":"RHSA-2026:8854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8857","reference_id":"RHSA-2026:8857","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8857"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8862","reference_id":"RHSA-2026:8862","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8862"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8874","reference_id":"RHSA-2026:8874","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8874"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8876","reference_id":"RHSA-2026:8876","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8876"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9446","reference_id":"RHSA-2026:9446","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9446"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9447","reference_id":"RHSA-2026:9447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9487","reference_id":"RHSA-2026:9487","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9487"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9488","reference_id":"RHSA-2026:9488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9488"},{"reference_url":"https://usn.ubuntu.com/8131-1/","reference_id":"USN-8131-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8131-1/"},{"reference_url":"https://www.zerodayinitiative.com/advisories/ZDI-26-166/","reference_id":"ZDI-26-166","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-16T15:25:51Z/"}],"url":"https://www.zerodayinitiative.com/advisories/ZDI-26-166/"}],"fixed_packages":[],"aliases":["CVE-2026-3083"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-upbh-pvqc-4ubn"}],"fixing_vulnerabilities":[],"risk_score":"4.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/gstreamer1-plugins-good@1.22.12-5%3Farch=el9_7"}