Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/mplayer@1.0~rc1-12etch
Typedeb
Namespacedebian
Namemplayer
Version1.0~rc1-12etch
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2:1.5+svn38408-1
Latest_non_vulnerable_version2:1.5+svn38408-1
Affected_by_vulnerabilities
0
url VCID-1228-m28x-bkbm
vulnerability_id VCID-1228-m28x-bkbm
summary
Multiple vulnerabilities have been found in MPlayer and the bundled
    FFmpeg, the worst of which may lead to the execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4610
reference_id
reference_type
scores
0
value 0.04522
scoring_system epss
scoring_elements 0.89204
published_at 2026-05-05T12:55:00Z
1
value 0.04522
scoring_system epss
scoring_elements 0.89109
published_at 2026-04-01T12:55:00Z
2
value 0.04522
scoring_system epss
scoring_elements 0.89117
published_at 2026-04-02T12:55:00Z
3
value 0.04522
scoring_system epss
scoring_elements 0.89131
published_at 2026-04-04T12:55:00Z
4
value 0.04522
scoring_system epss
scoring_elements 0.89134
published_at 2026-04-07T12:55:00Z
5
value 0.04522
scoring_system epss
scoring_elements 0.89152
published_at 2026-04-08T12:55:00Z
6
value 0.04522
scoring_system epss
scoring_elements 0.89157
published_at 2026-04-09T12:55:00Z
7
value 0.04522
scoring_system epss
scoring_elements 0.89167
published_at 2026-04-11T12:55:00Z
8
value 0.04522
scoring_system epss
scoring_elements 0.89163
published_at 2026-04-12T12:55:00Z
9
value 0.04522
scoring_system epss
scoring_elements 0.8916
published_at 2026-04-13T12:55:00Z
10
value 0.04522
scoring_system epss
scoring_elements 0.89173
published_at 2026-04-18T12:55:00Z
11
value 0.04522
scoring_system epss
scoring_elements 0.89171
published_at 2026-04-21T12:55:00Z
12
value 0.04522
scoring_system epss
scoring_elements 0.89187
published_at 2026-04-24T12:55:00Z
13
value 0.04522
scoring_system epss
scoring_elements 0.89192
published_at 2026-04-26T12:55:00Z
14
value 0.04522
scoring_system epss
scoring_elements 0.89196
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4610
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4610
2
reference_url http://secunia.com/advisories/34296
reference_id
reference_type
scores
url http://secunia.com/advisories/34296
3
reference_url http://www.openwall.com/lists/oss-security/2008/10/07/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/10/07/1
4
reference_url http://www.ubuntu.com/usn/USN-734-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-734-1
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=407010
reference_id 407010
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=407010
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4610
reference_id CVE-2008-4610
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-4610
27
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/32856.txt
reference_id CVE-2008-4610;OSVDB-49423
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/32856.txt
28
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/32857.txt
reference_id CVE-2008-4610;OSVDB-49424
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/32857.txt
29
reference_url https://www.securityfocus.com/bid/34136/info
reference_id CVE-2008-4610;OSVDB-49424
reference_type exploit
scores
url https://www.securityfocus.com/bid/34136/info
30
reference_url https://security.gentoo.org/glsa/201310-13
reference_id GLSA-201310-13
reference_type
scores
url https://security.gentoo.org/glsa/201310-13
31
reference_url https://usn.ubuntu.com/734-1/
reference_id USN-734-1
reference_type
scores
url https://usn.ubuntu.com/734-1/
fixed_packages
0
url pkg:deb/debian/mplayer@2:1.0~rc3%2B%2Bfinal.dfsg1-1
purl pkg:deb/debian/mplayer@2:1.0~rc3%2B%2Bfinal.dfsg1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4jd9-pt54-1bag
1
vulnerability VCID-8uk8-jxh7-k7aa
2
vulnerability VCID-9tg7-9r5m-dkgn
3
vulnerability VCID-9vx1-3zb9-5bf1
4
vulnerability VCID-e178-xa31-h3c4
5
vulnerability VCID-fjy3-bfzh-7beu
6
vulnerability VCID-g1k8-4mbb-fyew
7
vulnerability VCID-h9ks-v96k-wkf7
8
vulnerability VCID-m5db-wq6e-gqeu
9
vulnerability VCID-pfcp-7vj5-rqef
10
vulnerability VCID-tff5-wrpr-hbe1
11
vulnerability VCID-vnmz-rcby-n3gs
12
vulnerability VCID-xxgu-jjrs-pkaz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.0~rc3%252B%252Bfinal.dfsg1-1
aliases CVE-2008-4610
risk_score 9.0
exploitability 2.0
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1228-m28x-bkbm
1
url VCID-1dp9-jbnu-abcm
vulnerability_id VCID-1dp9-jbnu-abcm
summary
Multiple vulnerabilities in FFmpeg may lead to the remote execution of
    arbitrary code or a Denial of Service.
references
0
reference_url http://archives.neohapsis.com/archives/fulldisclosure/2008-09/0103.html
reference_id
reference_type
scores
url http://archives.neohapsis.com/archives/fulldisclosure/2008-09/0103.html
1
reference_url http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2008-August/016352.html
reference_id
reference_type
scores
url http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2008-August/016352.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4867
reference_id
reference_type
scores
0
value 0.02422
scoring_system epss
scoring_elements 0.85197
published_at 2026-05-05T12:55:00Z
1
value 0.02422
scoring_system epss
scoring_elements 0.8506
published_at 2026-04-01T12:55:00Z
2
value 0.02422
scoring_system epss
scoring_elements 0.85073
published_at 2026-04-02T12:55:00Z
3
value 0.02422
scoring_system epss
scoring_elements 0.85091
published_at 2026-04-04T12:55:00Z
4
value 0.02422
scoring_system epss
scoring_elements 0.85095
published_at 2026-04-07T12:55:00Z
5
value 0.02422
scoring_system epss
scoring_elements 0.85116
published_at 2026-04-08T12:55:00Z
6
value 0.02422
scoring_system epss
scoring_elements 0.85124
published_at 2026-04-09T12:55:00Z
7
value 0.02422
scoring_system epss
scoring_elements 0.85138
published_at 2026-04-11T12:55:00Z
8
value 0.02422
scoring_system epss
scoring_elements 0.85136
published_at 2026-04-12T12:55:00Z
9
value 0.02422
scoring_system epss
scoring_elements 0.85132
published_at 2026-04-13T12:55:00Z
10
value 0.02422
scoring_system epss
scoring_elements 0.85154
published_at 2026-04-16T12:55:00Z
11
value 0.02422
scoring_system epss
scoring_elements 0.85157
published_at 2026-04-18T12:55:00Z
12
value 0.02422
scoring_system epss
scoring_elements 0.85155
published_at 2026-04-21T12:55:00Z
13
value 0.02422
scoring_system epss
scoring_elements 0.85178
published_at 2026-04-24T12:55:00Z
14
value 0.02422
scoring_system epss
scoring_elements 0.85187
published_at 2026-04-26T12:55:00Z
15
value 0.02422
scoring_system epss
scoring_elements 0.85184
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4867
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4867
4
reference_url http://secunia.com/advisories/34296
reference_id
reference_type
scores
url http://secunia.com/advisories/34296
5
reference_url http://secunia.com/advisories/34385
reference_id
reference_type
scores
url http://secunia.com/advisories/34385
6
reference_url http://security.gentoo.org/glsa/glsa-200903-33.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200903-33.xml
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/46324
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/46324
8
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:013
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:013
9
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:014
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:014
10
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:015
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:015
11
reference_url http://www.openwall.com/lists/oss-security/2008/10/29/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/10/29/6
12
reference_url http://www.securityfocus.com/bid/33308
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/33308
13
reference_url http://www.ubuntu.com/usn/USN-734-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-734-1
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4867
reference_id CVE-2008-4867
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-4867
30
reference_url https://security.gentoo.org/glsa/200903-33
reference_id GLSA-200903-33
reference_type
scores
url https://security.gentoo.org/glsa/200903-33
31
reference_url https://usn.ubuntu.com/734-1/
reference_id USN-734-1
reference_type
scores
url https://usn.ubuntu.com/734-1/
fixed_packages
0
url pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2
purl pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1228-m28x-bkbm
1
vulnerability VCID-4jd9-pt54-1bag
2
vulnerability VCID-8uk8-jxh7-k7aa
3
vulnerability VCID-9tg7-9r5m-dkgn
4
vulnerability VCID-9vx1-3zb9-5bf1
5
vulnerability VCID-e178-xa31-h3c4
6
vulnerability VCID-fjy3-bfzh-7beu
7
vulnerability VCID-fw24-pxsc-7bek
8
vulnerability VCID-g1k8-4mbb-fyew
9
vulnerability VCID-gxnr-jbzt-cffq
10
vulnerability VCID-h9ks-v96k-wkf7
11
vulnerability VCID-j7wp-941h-p3fc
12
vulnerability VCID-m5db-wq6e-gqeu
13
vulnerability VCID-pfcp-7vj5-rqef
14
vulnerability VCID-tff5-wrpr-hbe1
15
vulnerability VCID-tteq-u99e-ayg4
16
vulnerability VCID-vnmz-rcby-n3gs
17
vulnerability VCID-xxgu-jjrs-pkaz
18
vulnerability VCID-ybgy-yct3-6fba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-17%252Blenny3.2
aliases CVE-2008-4867
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1dp9-jbnu-abcm
2
url VCID-2ddg-c99t-9ye1
vulnerability_id VCID-2ddg-c99t-9ye1
summary
Multiple vulnerabilities have been discovered in MPlayer, possibly allowing
    for the remote execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0629
reference_id
reference_type
scores
0
value 0.02652
scoring_system epss
scoring_elements 0.85688
published_at 2026-04-01T12:55:00Z
1
value 0.02652
scoring_system epss
scoring_elements 0.85701
published_at 2026-04-02T12:55:00Z
2
value 0.02652
scoring_system epss
scoring_elements 0.85719
published_at 2026-04-04T12:55:00Z
3
value 0.02652
scoring_system epss
scoring_elements 0.85725
published_at 2026-04-07T12:55:00Z
4
value 0.02652
scoring_system epss
scoring_elements 0.85744
published_at 2026-04-08T12:55:00Z
5
value 0.02652
scoring_system epss
scoring_elements 0.85755
published_at 2026-04-09T12:55:00Z
6
value 0.02652
scoring_system epss
scoring_elements 0.8577
published_at 2026-04-11T12:55:00Z
7
value 0.02652
scoring_system epss
scoring_elements 0.85767
published_at 2026-04-12T12:55:00Z
8
value 0.02652
scoring_system epss
scoring_elements 0.85763
published_at 2026-04-13T12:55:00Z
9
value 0.02652
scoring_system epss
scoring_elements 0.85781
published_at 2026-04-16T12:55:00Z
10
value 0.02652
scoring_system epss
scoring_elements 0.85786
published_at 2026-04-18T12:55:00Z
11
value 0.02652
scoring_system epss
scoring_elements 0.8578
published_at 2026-04-21T12:55:00Z
12
value 0.02827
scoring_system epss
scoring_elements 0.86206
published_at 2026-04-24T12:55:00Z
13
value 0.02827
scoring_system epss
scoring_elements 0.86215
published_at 2026-04-29T12:55:00Z
14
value 0.02827
scoring_system epss
scoring_elements 0.86234
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0629
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0629
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464533
reference_id 464533
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464533
3
reference_url https://security.gentoo.org/glsa/200803-16
reference_id GLSA-200803-16
reference_type
scores
url https://security.gentoo.org/glsa/200803-16
fixed_packages
0
url pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2
purl pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1228-m28x-bkbm
1
vulnerability VCID-4jd9-pt54-1bag
2
vulnerability VCID-8uk8-jxh7-k7aa
3
vulnerability VCID-9tg7-9r5m-dkgn
4
vulnerability VCID-9vx1-3zb9-5bf1
5
vulnerability VCID-e178-xa31-h3c4
6
vulnerability VCID-fjy3-bfzh-7beu
7
vulnerability VCID-fw24-pxsc-7bek
8
vulnerability VCID-g1k8-4mbb-fyew
9
vulnerability VCID-gxnr-jbzt-cffq
10
vulnerability VCID-h9ks-v96k-wkf7
11
vulnerability VCID-j7wp-941h-p3fc
12
vulnerability VCID-m5db-wq6e-gqeu
13
vulnerability VCID-pfcp-7vj5-rqef
14
vulnerability VCID-tff5-wrpr-hbe1
15
vulnerability VCID-tteq-u99e-ayg4
16
vulnerability VCID-vnmz-rcby-n3gs
17
vulnerability VCID-xxgu-jjrs-pkaz
18
vulnerability VCID-ybgy-yct3-6fba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-17%252Blenny3.2
aliases CVE-2008-0629
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2ddg-c99t-9ye1
3
url VCID-38xc-8rtk-qfes
vulnerability_id VCID-38xc-8rtk-qfes
summary
Multiple vulnerabilities have been discovered in MPlayer, possibly allowing
    for the remote execution of arbitrary code.
references
0
reference_url http://lists.mplayerhq.hu/pipermail/mplayer-announce/2007-June/000066.html
reference_id
reference_type
scores
url http://lists.mplayerhq.hu/pipermail/mplayer-announce/2007-June/000066.html
1
reference_url http://osvdb.org/36991
reference_id
reference_type
scores
url http://osvdb.org/36991
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-2948
reference_id
reference_type
scores
0
value 0.13236
scoring_system epss
scoring_elements 0.94176
published_at 2026-05-05T12:55:00Z
1
value 0.13236
scoring_system epss
scoring_elements 0.94104
published_at 2026-04-01T12:55:00Z
2
value 0.13236
scoring_system epss
scoring_elements 0.94113
published_at 2026-04-02T12:55:00Z
3
value 0.13236
scoring_system epss
scoring_elements 0.94125
published_at 2026-04-04T12:55:00Z
4
value 0.13236
scoring_system epss
scoring_elements 0.94129
published_at 2026-04-07T12:55:00Z
5
value 0.13236
scoring_system epss
scoring_elements 0.94138
published_at 2026-04-08T12:55:00Z
6
value 0.13236
scoring_system epss
scoring_elements 0.94142
published_at 2026-04-09T12:55:00Z
7
value 0.13236
scoring_system epss
scoring_elements 0.94147
published_at 2026-04-13T12:55:00Z
8
value 0.13236
scoring_system epss
scoring_elements 0.94163
published_at 2026-04-16T12:55:00Z
9
value 0.13236
scoring_system epss
scoring_elements 0.94168
published_at 2026-04-18T12:55:00Z
10
value 0.13236
scoring_system epss
scoring_elements 0.94167
published_at 2026-04-21T12:55:00Z
11
value 0.13236
scoring_system epss
scoring_elements 0.94169
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-2948
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2948
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2948
4
reference_url http://secunia.com/advisories/24302
reference_id
reference_type
scores
url http://secunia.com/advisories/24302
5
reference_url http://secunia.com/advisories/25713
reference_id
reference_type
scores
url http://secunia.com/advisories/25713
6
reference_url http://secunia.com/advisories/25940
reference_id
reference_type
scores
url http://secunia.com/advisories/25940
7
reference_url http://secunia.com/advisories/26083
reference_id
reference_type
scores
url http://secunia.com/advisories/26083
8
reference_url http://secunia.com/advisories/26207
reference_id
reference_type
scores
url http://secunia.com/advisories/26207
9
reference_url http://secunia.com/secunia_research/2007-55/
reference_id
reference_type
scores
url http://secunia.com/secunia_research/2007-55/
10
reference_url http://security.gentoo.org/glsa/glsa-200707-07.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200707-07.xml
11
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/34749
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/34749
12
reference_url http://svn.mplayerhq.hu/mplayer/trunk/stream/stream_cddb.c?r1=23287&r2=23470&diff_format=u
reference_id
reference_type
scores
url http://svn.mplayerhq.hu/mplayer/trunk/stream/stream_cddb.c?r1=23287&r2=23470&diff_format=u
13
reference_url http://www.debian.org/security/2007/dsa-1313
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1313
14
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:143
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:143
15
reference_url http://www.mplayerhq.hu/design7/news.html
reference_id
reference_type
scores
url http://www.mplayerhq.hu/design7/news.html
16
reference_url http://www.novell.com/linux/security/advisories/2007_14_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_14_sr.html
17
reference_url http://www.securityfocus.com/bid/24339
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24339
18
reference_url http://www.vupen.com/english/advisories/2007/2080
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2080
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_rc1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_rc1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_rc1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-2948
reference_id CVE-2007-2948
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-2948
21
reference_url https://security.gentoo.org/glsa/200707-07
reference_id GLSA-200707-07
reference_type
scores
url https://security.gentoo.org/glsa/200707-07
fixed_packages
0
url pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2
purl pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1228-m28x-bkbm
1
vulnerability VCID-4jd9-pt54-1bag
2
vulnerability VCID-8uk8-jxh7-k7aa
3
vulnerability VCID-9tg7-9r5m-dkgn
4
vulnerability VCID-9vx1-3zb9-5bf1
5
vulnerability VCID-e178-xa31-h3c4
6
vulnerability VCID-fjy3-bfzh-7beu
7
vulnerability VCID-fw24-pxsc-7bek
8
vulnerability VCID-g1k8-4mbb-fyew
9
vulnerability VCID-gxnr-jbzt-cffq
10
vulnerability VCID-h9ks-v96k-wkf7
11
vulnerability VCID-j7wp-941h-p3fc
12
vulnerability VCID-m5db-wq6e-gqeu
13
vulnerability VCID-pfcp-7vj5-rqef
14
vulnerability VCID-tff5-wrpr-hbe1
15
vulnerability VCID-tteq-u99e-ayg4
16
vulnerability VCID-vnmz-rcby-n3gs
17
vulnerability VCID-xxgu-jjrs-pkaz
18
vulnerability VCID-ybgy-yct3-6fba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-17%252Blenny3.2
aliases CVE-2007-2948
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-38xc-8rtk-qfes
4
url VCID-4jd9-pt54-1bag
vulnerability_id VCID-4jd9-pt54-1bag
summary Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-38851
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.18492
published_at 2026-04-02T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18546
published_at 2026-04-04T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18254
published_at 2026-04-07T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.18337
published_at 2026-04-08T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.1839
published_at 2026-04-11T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18342
published_at 2026-04-12T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.1829
published_at 2026-04-13T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18234
published_at 2026-04-16T12:55:00Z
8
value 0.00058
scoring_system epss
scoring_elements 0.18246
published_at 2026-04-18T12:55:00Z
9
value 0.00058
scoring_system epss
scoring_elements 0.18273
published_at 2026-04-21T12:55:00Z
10
value 0.00058
scoring_system epss
scoring_elements 0.18172
published_at 2026-04-24T12:55:00Z
11
value 0.00058
scoring_system epss
scoring_elements 0.18155
published_at 2026-04-26T12:55:00Z
12
value 0.00058
scoring_system epss
scoring_elements 0.18119
published_at 2026-04-29T12:55:00Z
13
value 0.00058
scoring_system epss
scoring_elements 0.1798
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-38851
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38851
2
reference_url https://security.gentoo.org/glsa/202405-05
reference_id GLSA-202405-05
reference_type
scores
url https://security.gentoo.org/glsa/202405-05
3
reference_url https://usn.ubuntu.com/5895-1/
reference_id USN-5895-1
reference_type
scores
url https://usn.ubuntu.com/5895-1/
fixed_packages
0
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1
aliases CVE-2022-38851
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4jd9-pt54-1bag
5
url VCID-8uk8-jxh7-k7aa
vulnerability_id VCID-8uk8-jxh7-k7aa
summary Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-38863
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.19364
published_at 2026-04-02T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.19415
published_at 2026-04-04T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19132
published_at 2026-04-07T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.19212
published_at 2026-04-08T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.19264
published_at 2026-04-09T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.1927
published_at 2026-04-11T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.19224
published_at 2026-04-12T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.19169
published_at 2026-04-13T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.1913
published_at 2026-04-16T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.19139
published_at 2026-04-18T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.19147
published_at 2026-04-21T12:55:00Z
11
value 0.00061
scoring_system epss
scoring_elements 0.19039
published_at 2026-04-24T12:55:00Z
12
value 0.00061
scoring_system epss
scoring_elements 0.19028
published_at 2026-04-26T12:55:00Z
13
value 0.00061
scoring_system epss
scoring_elements 0.18984
published_at 2026-04-29T12:55:00Z
14
value 0.00061
scoring_system epss
scoring_elements 0.18863
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-38863
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38863
2
reference_url https://security.gentoo.org/glsa/202405-05
reference_id GLSA-202405-05
reference_type
scores
url https://security.gentoo.org/glsa/202405-05
3
reference_url https://usn.ubuntu.com/5895-1/
reference_id USN-5895-1
reference_type
scores
url https://usn.ubuntu.com/5895-1/
fixed_packages
0
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1
aliases CVE-2022-38863
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8uk8-jxh7-k7aa
6
url VCID-9tg7-9r5m-dkgn
vulnerability_id VCID-9tg7-9r5m-dkgn
summary Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-38861
reference_id
reference_type
scores
0
value 0.00069
scoring_system epss
scoring_elements 0.21284
published_at 2026-04-02T12:55:00Z
1
value 0.00069
scoring_system epss
scoring_elements 0.21337
published_at 2026-04-04T12:55:00Z
2
value 0.00069
scoring_system epss
scoring_elements 0.2109
published_at 2026-04-07T12:55:00Z
3
value 0.00069
scoring_system epss
scoring_elements 0.2117
published_at 2026-04-08T12:55:00Z
4
value 0.00069
scoring_system epss
scoring_elements 0.2123
published_at 2026-04-09T12:55:00Z
5
value 0.00069
scoring_system epss
scoring_elements 0.21241
published_at 2026-04-11T12:55:00Z
6
value 0.00069
scoring_system epss
scoring_elements 0.21199
published_at 2026-04-12T12:55:00Z
7
value 0.00069
scoring_system epss
scoring_elements 0.21147
published_at 2026-04-13T12:55:00Z
8
value 0.00069
scoring_system epss
scoring_elements 0.2114
published_at 2026-04-16T12:55:00Z
9
value 0.00069
scoring_system epss
scoring_elements 0.2115
published_at 2026-04-18T12:55:00Z
10
value 0.00069
scoring_system epss
scoring_elements 0.21127
published_at 2026-04-21T12:55:00Z
11
value 0.00069
scoring_system epss
scoring_elements 0.20998
published_at 2026-04-24T12:55:00Z
12
value 0.00069
scoring_system epss
scoring_elements 0.21003
published_at 2026-04-26T12:55:00Z
13
value 0.00069
scoring_system epss
scoring_elements 0.20974
published_at 2026-04-29T12:55:00Z
14
value 0.00069
scoring_system epss
scoring_elements 0.20872
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-38861
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38861
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021013
reference_id 1021013
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021013
3
reference_url https://security.gentoo.org/glsa/202405-05
reference_id GLSA-202405-05
reference_type
scores
url https://security.gentoo.org/glsa/202405-05
4
reference_url https://usn.ubuntu.com/5895-1/
reference_id USN-5895-1
reference_type
scores
url https://usn.ubuntu.com/5895-1/
fixed_packages
0
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1
aliases CVE-2022-38861
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9tg7-9r5m-dkgn
7
url VCID-9vx1-3zb9-5bf1
vulnerability_id VCID-9vx1-3zb9-5bf1
summary Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-38866
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20954
published_at 2026-04-02T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.21012
published_at 2026-04-04T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20729
published_at 2026-04-07T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20807
published_at 2026-04-08T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20868
published_at 2026-04-09T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20883
published_at 2026-04-11T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.2084
published_at 2026-04-12T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20788
published_at 2026-04-13T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20778
published_at 2026-04-16T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.2077
published_at 2026-04-18T12:55:00Z
10
value 0.00067
scoring_system epss
scoring_elements 0.20756
published_at 2026-04-21T12:55:00Z
11
value 0.00067
scoring_system epss
scoring_elements 0.20638
published_at 2026-04-24T12:55:00Z
12
value 0.00067
scoring_system epss
scoring_elements 0.20634
published_at 2026-04-26T12:55:00Z
13
value 0.00067
scoring_system epss
scoring_elements 0.206
published_at 2026-04-29T12:55:00Z
14
value 0.00067
scoring_system epss
scoring_elements 0.20494
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-38866
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38866
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38866
2
reference_url https://security.gentoo.org/glsa/202405-05
reference_id GLSA-202405-05
reference_type
scores
url https://security.gentoo.org/glsa/202405-05
3
reference_url https://usn.ubuntu.com/5895-1/
reference_id USN-5895-1
reference_type
scores
url https://usn.ubuntu.com/5895-1/
fixed_packages
0
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1
aliases CVE-2022-38866
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9vx1-3zb9-5bf1
8
url VCID-bv1x-tr6m-qke1
vulnerability_id VCID-bv1x-tr6m-qke1
summary
Multiple vulnerabilities in FFmpeg may lead to the remote execution of
    arbitrary code or a Denial of Service.
references
0
reference_url http://archives.neohapsis.com/archives/fulldisclosure/2008-09/0103.html
reference_id
reference_type
scores
url http://archives.neohapsis.com/archives/fulldisclosure/2008-09/0103.html
1
reference_url http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2008-August/016136.html
reference_id
reference_type
scores
url http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2008-August/016136.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4868
reference_id
reference_type
scores
0
value 0.00728
scoring_system epss
scoring_elements 0.72707
published_at 2026-05-05T12:55:00Z
1
value 0.00728
scoring_system epss
scoring_elements 0.72577
published_at 2026-04-07T12:55:00Z
2
value 0.00728
scoring_system epss
scoring_elements 0.72584
published_at 2026-04-02T12:55:00Z
3
value 0.00728
scoring_system epss
scoring_elements 0.72601
published_at 2026-04-04T12:55:00Z
4
value 0.00728
scoring_system epss
scoring_elements 0.72616
published_at 2026-04-08T12:55:00Z
5
value 0.00728
scoring_system epss
scoring_elements 0.72628
published_at 2026-04-09T12:55:00Z
6
value 0.00728
scoring_system epss
scoring_elements 0.72651
published_at 2026-04-11T12:55:00Z
7
value 0.00728
scoring_system epss
scoring_elements 0.72634
published_at 2026-04-12T12:55:00Z
8
value 0.00728
scoring_system epss
scoring_elements 0.72624
published_at 2026-04-13T12:55:00Z
9
value 0.00728
scoring_system epss
scoring_elements 0.72666
published_at 2026-04-16T12:55:00Z
10
value 0.00728
scoring_system epss
scoring_elements 0.72676
published_at 2026-04-18T12:55:00Z
11
value 0.00728
scoring_system epss
scoring_elements 0.72668
published_at 2026-04-21T12:55:00Z
12
value 0.00728
scoring_system epss
scoring_elements 0.72709
published_at 2026-04-24T12:55:00Z
13
value 0.00728
scoring_system epss
scoring_elements 0.72719
published_at 2026-04-26T12:55:00Z
14
value 0.00728
scoring_system epss
scoring_elements 0.72715
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4868
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4868
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4868
4
reference_url http://secunia.com/advisories/34385
reference_id
reference_type
scores
url http://secunia.com/advisories/34385
5
reference_url http://security.gentoo.org/glsa/glsa-200903-33.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200903-33.xml
6
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/46325
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/46325
7
reference_url http://www.openwall.com/lists/oss-security/2008/10/29/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/10/29/6
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4868
reference_id CVE-2008-4868
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-4868
24
reference_url https://security.gentoo.org/glsa/200903-33
reference_id GLSA-200903-33
reference_type
scores
url https://security.gentoo.org/glsa/200903-33
fixed_packages
0
url pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2
purl pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1228-m28x-bkbm
1
vulnerability VCID-4jd9-pt54-1bag
2
vulnerability VCID-8uk8-jxh7-k7aa
3
vulnerability VCID-9tg7-9r5m-dkgn
4
vulnerability VCID-9vx1-3zb9-5bf1
5
vulnerability VCID-e178-xa31-h3c4
6
vulnerability VCID-fjy3-bfzh-7beu
7
vulnerability VCID-fw24-pxsc-7bek
8
vulnerability VCID-g1k8-4mbb-fyew
9
vulnerability VCID-gxnr-jbzt-cffq
10
vulnerability VCID-h9ks-v96k-wkf7
11
vulnerability VCID-j7wp-941h-p3fc
12
vulnerability VCID-m5db-wq6e-gqeu
13
vulnerability VCID-pfcp-7vj5-rqef
14
vulnerability VCID-tff5-wrpr-hbe1
15
vulnerability VCID-tteq-u99e-ayg4
16
vulnerability VCID-vnmz-rcby-n3gs
17
vulnerability VCID-xxgu-jjrs-pkaz
18
vulnerability VCID-ybgy-yct3-6fba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-17%252Blenny3.2
aliases CVE-2008-4868
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bv1x-tr6m-qke1
9
url VCID-e178-xa31-h3c4
vulnerability_id VCID-e178-xa31-h3c4
summary Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-38850
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.12332
published_at 2026-04-02T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.12379
published_at 2026-04-04T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.1218
published_at 2026-04-07T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.1226
published_at 2026-04-08T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.1231
published_at 2026-04-09T12:55:00Z
5
value 0.0004
scoring_system epss
scoring_elements 0.12318
published_at 2026-04-11T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.12282
published_at 2026-04-12T12:55:00Z
7
value 0.0004
scoring_system epss
scoring_elements 0.12245
published_at 2026-04-13T12:55:00Z
8
value 0.0004
scoring_system epss
scoring_elements 0.12134
published_at 2026-04-16T12:55:00Z
9
value 0.0004
scoring_system epss
scoring_elements 0.12136
published_at 2026-04-18T12:55:00Z
10
value 0.0004
scoring_system epss
scoring_elements 0.12246
published_at 2026-04-21T12:55:00Z
11
value 0.0004
scoring_system epss
scoring_elements 0.12226
published_at 2026-04-24T12:55:00Z
12
value 0.0004
scoring_system epss
scoring_elements 0.12191
published_at 2026-04-26T12:55:00Z
13
value 0.0004
scoring_system epss
scoring_elements 0.12081
published_at 2026-04-29T12:55:00Z
14
value 0.0004
scoring_system epss
scoring_elements 0.11994
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-38850
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38850
2
reference_url https://security.gentoo.org/glsa/202405-05
reference_id GLSA-202405-05
reference_type
scores
url https://security.gentoo.org/glsa/202405-05
3
reference_url https://usn.ubuntu.com/5895-1/
reference_id USN-5895-1
reference_type
scores
url https://usn.ubuntu.com/5895-1/
fixed_packages
0
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1
aliases CVE-2022-38850
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e178-xa31-h3c4
10
url VCID-fjy3-bfzh-7beu
vulnerability_id VCID-fjy3-bfzh-7beu
summary
Multiple vulnerabilities have been found in MPlayer and the bundled
    FFmpeg, the worst of which may lead to the execution of arbitrary code.
references
0
reference_url http://git.mplayer2.org/mplayer2/commit/?id=27b88a09c5319deb62221b8cd0ecc14cd1136e4a
reference_id
reference_type
scores
url http://git.mplayer2.org/mplayer2/commit/?id=27b88a09c5319deb62221b8cd0ecc14cd1136e4a
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3625
reference_id
reference_type
scores
0
value 0.68101
scoring_system epss
scoring_elements 0.98612
published_at 2026-05-05T12:55:00Z
1
value 0.68101
scoring_system epss
scoring_elements 0.98582
published_at 2026-04-01T12:55:00Z
2
value 0.68101
scoring_system epss
scoring_elements 0.98584
published_at 2026-04-02T12:55:00Z
3
value 0.68101
scoring_system epss
scoring_elements 0.98587
published_at 2026-04-04T12:55:00Z
4
value 0.68101
scoring_system epss
scoring_elements 0.98589
published_at 2026-04-07T12:55:00Z
5
value 0.68101
scoring_system epss
scoring_elements 0.98591
published_at 2026-04-08T12:55:00Z
6
value 0.68101
scoring_system epss
scoring_elements 0.98592
published_at 2026-04-09T12:55:00Z
7
value 0.68101
scoring_system epss
scoring_elements 0.98595
published_at 2026-04-12T12:55:00Z
8
value 0.68101
scoring_system epss
scoring_elements 0.98597
published_at 2026-04-13T12:55:00Z
9
value 0.68101
scoring_system epss
scoring_elements 0.98602
published_at 2026-04-21T12:55:00Z
10
value 0.68101
scoring_system epss
scoring_elements 0.98603
published_at 2026-04-18T12:55:00Z
11
value 0.68101
scoring_system epss
scoring_elements 0.98606
published_at 2026-04-24T12:55:00Z
12
value 0.68101
scoring_system epss
scoring_elements 0.98607
published_at 2026-04-26T12:55:00Z
13
value 0.68101
scoring_system epss
scoring_elements 0.98608
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3625
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3625
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3625
3
reference_url http://secunia.com/advisories/55486
reference_id
reference_type
scores
url http://secunia.com/advisories/55486
4
reference_url http://security.gentoo.org/glsa/glsa-201310-13.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201310-13.xml
5
reference_url https://labs.mwrinfosecurity.com/system/assets/149/original/mwri_mplayer-sami-subtitles_2011-08-12.pdf
reference_id
reference_type
scores
url https://labs.mwrinfosecurity.com/system/assets/149/original/mwri_mplayer-sami-subtitles_2011-08-12.pdf
6
reference_url http://www.openwall.com/lists/oss-security/2011/10/18/12
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2011/10/18/12
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=645987
reference_id 645987
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=645987
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer2:mplayer2:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer2:mplayer2:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer2:mplayer2:-:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ricardo_villalba:smplayer:0.6.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ricardo_villalba:smplayer:0.6.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ricardo_villalba:smplayer:0.6.9:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-3625
reference_id CVE-2011-3625
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-3625
11
reference_url https://security.gentoo.org/glsa/201310-13
reference_id GLSA-201310-13
reference_type
scores
url https://security.gentoo.org/glsa/201310-13
12
reference_url http://labs.mwrinfosecurity.com/files/Advisories/mwri_mplayer-sami-subtitles_2011-08-12.pdf
reference_id OSVDB-74604;CVE-2011-3625
reference_type exploit
scores
url http://labs.mwrinfosecurity.com/files/Advisories/mwri_mplayer-sami-subtitles_2011-08-12.pdf
13
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/18954.rb
reference_id OSVDB-74604;CVE-2011-3625
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/18954.rb
fixed_packages
0
url pkg:deb/debian/mplayer@2:1.0~rc4.dfsg1%2Bsvn34540-1%2Bdeb7u1
purl pkg:deb/debian/mplayer@2:1.0~rc4.dfsg1%2Bsvn34540-1%2Bdeb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4jd9-pt54-1bag
1
vulnerability VCID-8uk8-jxh7-k7aa
2
vulnerability VCID-9tg7-9r5m-dkgn
3
vulnerability VCID-9vx1-3zb9-5bf1
4
vulnerability VCID-e178-xa31-h3c4
5
vulnerability VCID-g1k8-4mbb-fyew
6
vulnerability VCID-h9ks-v96k-wkf7
7
vulnerability VCID-m5db-wq6e-gqeu
8
vulnerability VCID-pfcp-7vj5-rqef
9
vulnerability VCID-tff5-wrpr-hbe1
10
vulnerability VCID-vnmz-rcby-n3gs
11
vulnerability VCID-xxgu-jjrs-pkaz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.0~rc4.dfsg1%252Bsvn34540-1%252Bdeb7u1
aliases CVE-2011-3625
risk_score 10.0
exploitability 2.0
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fjy3-bfzh-7beu
11
url VCID-fw24-pxsc-7bek
vulnerability_id VCID-fw24-pxsc-7bek
summary
Multiple vulnerabilities in MPlayer may lead to the execution of arbitrary
    code or a Denial of Service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5616
reference_id
reference_type
scores
0
value 0.25394
scoring_system epss
scoring_elements 0.96238
published_at 2026-05-05T12:55:00Z
1
value 0.25394
scoring_system epss
scoring_elements 0.96173
published_at 2026-04-01T12:55:00Z
2
value 0.25394
scoring_system epss
scoring_elements 0.9618
published_at 2026-04-02T12:55:00Z
3
value 0.25394
scoring_system epss
scoring_elements 0.96188
published_at 2026-04-04T12:55:00Z
4
value 0.25394
scoring_system epss
scoring_elements 0.96191
published_at 2026-04-07T12:55:00Z
5
value 0.25394
scoring_system epss
scoring_elements 0.96201
published_at 2026-04-08T12:55:00Z
6
value 0.25394
scoring_system epss
scoring_elements 0.96204
published_at 2026-04-09T12:55:00Z
7
value 0.25394
scoring_system epss
scoring_elements 0.96209
published_at 2026-04-11T12:55:00Z
8
value 0.25394
scoring_system epss
scoring_elements 0.96208
published_at 2026-04-12T12:55:00Z
9
value 0.25394
scoring_system epss
scoring_elements 0.9621
published_at 2026-04-13T12:55:00Z
10
value 0.25394
scoring_system epss
scoring_elements 0.96218
published_at 2026-04-16T12:55:00Z
11
value 0.25394
scoring_system epss
scoring_elements 0.96223
published_at 2026-04-21T12:55:00Z
12
value 0.25394
scoring_system epss
scoring_elements 0.96225
published_at 2026-04-24T12:55:00Z
13
value 0.25394
scoring_system epss
scoring_elements 0.96226
published_at 2026-04-26T12:55:00Z
14
value 0.25394
scoring_system epss
scoring_elements 0.96227
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5616
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5616
2
reference_url http://secunia.com/advisories/33136
reference_id
reference_type
scores
url http://secunia.com/advisories/33136
3
reference_url http://secunia.com/advisories/34845
reference_id
reference_type
scores
url http://secunia.com/advisories/34845
4
reference_url http://svn.mplayerhq.hu/mplayer/branches/1.0rc2/libmpdemux/demux_vqf.c?r1=24723&r2=28150&pathrev=28150
reference_id
reference_type
scores
url http://svn.mplayerhq.hu/mplayer/branches/1.0rc2/libmpdemux/demux_vqf.c?r1=24723&r2=28150&pathrev=28150
5
reference_url http://svn.mplayerhq.hu/mplayer/branches/1.0rc2/libmpdemux/demux_vqf.c?view=log&pathrev=28150#rev28150
reference_id
reference_type
scores
url http://svn.mplayerhq.hu/mplayer/branches/1.0rc2/libmpdemux/demux_vqf.c?view=log&pathrev=28150#rev28150
6
reference_url http://trapkit.de/advisories/TKADV2008-014.txt
reference_id
reference_type
scores
url http://trapkit.de/advisories/TKADV2008-014.txt
7
reference_url http://www.debian.org/security/2009/dsa-1782
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1782
8
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:013
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:013
9
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:014
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:014
10
reference_url http://www.securityfocus.com/archive/1/499214/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/499214/100/0/threaded
11
reference_url http://www.securityfocus.com/bid/32822
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32822
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=508803
reference_id 508803
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=508803
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5616
reference_id CVE-2008-5616
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-5616
34
reference_url https://security.gentoo.org/glsa/200901-07
reference_id GLSA-200901-07
reference_type
scores
url https://security.gentoo.org/glsa/200901-07
fixed_packages
0
url pkg:deb/debian/mplayer@2:1.0~rc3%2B%2Bfinal.dfsg1-1
purl pkg:deb/debian/mplayer@2:1.0~rc3%2B%2Bfinal.dfsg1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4jd9-pt54-1bag
1
vulnerability VCID-8uk8-jxh7-k7aa
2
vulnerability VCID-9tg7-9r5m-dkgn
3
vulnerability VCID-9vx1-3zb9-5bf1
4
vulnerability VCID-e178-xa31-h3c4
5
vulnerability VCID-fjy3-bfzh-7beu
6
vulnerability VCID-g1k8-4mbb-fyew
7
vulnerability VCID-h9ks-v96k-wkf7
8
vulnerability VCID-m5db-wq6e-gqeu
9
vulnerability VCID-pfcp-7vj5-rqef
10
vulnerability VCID-tff5-wrpr-hbe1
11
vulnerability VCID-vnmz-rcby-n3gs
12
vulnerability VCID-xxgu-jjrs-pkaz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.0~rc3%252B%252Bfinal.dfsg1-1
aliases CVE-2008-5616
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fw24-pxsc-7bek
12
url VCID-g1k8-4mbb-fyew
vulnerability_id VCID-g1k8-4mbb-fyew
summary Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-38865
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.18492
published_at 2026-04-02T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18546
published_at 2026-04-04T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18254
published_at 2026-04-07T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.18337
published_at 2026-04-08T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.1839
published_at 2026-04-11T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18342
published_at 2026-04-12T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.1829
published_at 2026-04-13T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18234
published_at 2026-04-16T12:55:00Z
8
value 0.00058
scoring_system epss
scoring_elements 0.18246
published_at 2026-04-18T12:55:00Z
9
value 0.00058
scoring_system epss
scoring_elements 0.18273
published_at 2026-04-21T12:55:00Z
10
value 0.00058
scoring_system epss
scoring_elements 0.18172
published_at 2026-04-24T12:55:00Z
11
value 0.00058
scoring_system epss
scoring_elements 0.18155
published_at 2026-04-26T12:55:00Z
12
value 0.00058
scoring_system epss
scoring_elements 0.18119
published_at 2026-04-29T12:55:00Z
13
value 0.00058
scoring_system epss
scoring_elements 0.1798
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-38865
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38865
2
reference_url https://security.gentoo.org/glsa/202405-05
reference_id GLSA-202405-05
reference_type
scores
url https://security.gentoo.org/glsa/202405-05
3
reference_url https://usn.ubuntu.com/5895-1/
reference_id USN-5895-1
reference_type
scores
url https://usn.ubuntu.com/5895-1/
fixed_packages
0
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1
aliases CVE-2022-38865
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g1k8-4mbb-fyew
13
url VCID-gaa2-bekm-6bbt
vulnerability_id VCID-gaa2-bekm-6bbt
summary
Multiple vulnerabilities have been discovered in MPlayer, possibly allowing
    for the remote execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0630
reference_id
reference_type
scores
0
value 0.06989
scoring_system epss
scoring_elements 0.9141
published_at 2026-04-01T12:55:00Z
1
value 0.06989
scoring_system epss
scoring_elements 0.91416
published_at 2026-04-02T12:55:00Z
2
value 0.06989
scoring_system epss
scoring_elements 0.91426
published_at 2026-04-04T12:55:00Z
3
value 0.06989
scoring_system epss
scoring_elements 0.91434
published_at 2026-04-07T12:55:00Z
4
value 0.06989
scoring_system epss
scoring_elements 0.91446
published_at 2026-04-08T12:55:00Z
5
value 0.06989
scoring_system epss
scoring_elements 0.91452
published_at 2026-04-09T12:55:00Z
6
value 0.06989
scoring_system epss
scoring_elements 0.91458
published_at 2026-04-11T12:55:00Z
7
value 0.06989
scoring_system epss
scoring_elements 0.91461
published_at 2026-04-12T12:55:00Z
8
value 0.06989
scoring_system epss
scoring_elements 0.9146
published_at 2026-04-13T12:55:00Z
9
value 0.06989
scoring_system epss
scoring_elements 0.91484
published_at 2026-04-16T12:55:00Z
10
value 0.06989
scoring_system epss
scoring_elements 0.91479
published_at 2026-04-21T12:55:00Z
11
value 0.07422
scoring_system epss
scoring_elements 0.91771
published_at 2026-04-24T12:55:00Z
12
value 0.07422
scoring_system epss
scoring_elements 0.91769
published_at 2026-04-26T12:55:00Z
13
value 0.07422
scoring_system epss
scoring_elements 0.91765
published_at 2026-04-29T12:55:00Z
14
value 0.07422
scoring_system epss
scoring_elements 0.91779
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0630
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0630
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0630
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464532
reference_id 464532
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464532
3
reference_url https://security.gentoo.org/glsa/200803-16
reference_id GLSA-200803-16
reference_type
scores
url https://security.gentoo.org/glsa/200803-16
fixed_packages
0
url pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2
purl pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1228-m28x-bkbm
1
vulnerability VCID-4jd9-pt54-1bag
2
vulnerability VCID-8uk8-jxh7-k7aa
3
vulnerability VCID-9tg7-9r5m-dkgn
4
vulnerability VCID-9vx1-3zb9-5bf1
5
vulnerability VCID-e178-xa31-h3c4
6
vulnerability VCID-fjy3-bfzh-7beu
7
vulnerability VCID-fw24-pxsc-7bek
8
vulnerability VCID-g1k8-4mbb-fyew
9
vulnerability VCID-gxnr-jbzt-cffq
10
vulnerability VCID-h9ks-v96k-wkf7
11
vulnerability VCID-j7wp-941h-p3fc
12
vulnerability VCID-m5db-wq6e-gqeu
13
vulnerability VCID-pfcp-7vj5-rqef
14
vulnerability VCID-tff5-wrpr-hbe1
15
vulnerability VCID-tteq-u99e-ayg4
16
vulnerability VCID-vnmz-rcby-n3gs
17
vulnerability VCID-xxgu-jjrs-pkaz
18
vulnerability VCID-ybgy-yct3-6fba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-17%252Blenny3.2
aliases CVE-2008-0630
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gaa2-bekm-6bbt
14
url VCID-gxnr-jbzt-cffq
vulnerability_id VCID-gxnr-jbzt-cffq
summary
Multiple vulnerabilities in MPlayer may lead to the execution of arbitrary
    code or a Denial of Service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3827
reference_id
reference_type
scores
0
value 0.03588
scoring_system epss
scoring_elements 0.87802
published_at 2026-05-05T12:55:00Z
1
value 0.03588
scoring_system epss
scoring_elements 0.87699
published_at 2026-04-01T12:55:00Z
2
value 0.03588
scoring_system epss
scoring_elements 0.8771
published_at 2026-04-02T12:55:00Z
3
value 0.03588
scoring_system epss
scoring_elements 0.87721
published_at 2026-04-04T12:55:00Z
4
value 0.03588
scoring_system epss
scoring_elements 0.87723
published_at 2026-04-07T12:55:00Z
5
value 0.03588
scoring_system epss
scoring_elements 0.87745
published_at 2026-04-08T12:55:00Z
6
value 0.03588
scoring_system epss
scoring_elements 0.87751
published_at 2026-04-09T12:55:00Z
7
value 0.03588
scoring_system epss
scoring_elements 0.87761
published_at 2026-04-11T12:55:00Z
8
value 0.03588
scoring_system epss
scoring_elements 0.87756
published_at 2026-04-12T12:55:00Z
9
value 0.03588
scoring_system epss
scoring_elements 0.87754
published_at 2026-04-13T12:55:00Z
10
value 0.03588
scoring_system epss
scoring_elements 0.87768
published_at 2026-04-16T12:55:00Z
11
value 0.03588
scoring_system epss
scoring_elements 0.87767
published_at 2026-04-18T12:55:00Z
12
value 0.03588
scoring_system epss
scoring_elements 0.87766
published_at 2026-04-21T12:55:00Z
13
value 0.03588
scoring_system epss
scoring_elements 0.87783
published_at 2026-04-24T12:55:00Z
14
value 0.03588
scoring_system epss
scoring_elements 0.8779
published_at 2026-04-26T12:55:00Z
15
value 0.03588
scoring_system epss
scoring_elements 0.87787
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3827
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3827
2
reference_url http://secunia.com/advisories/32045
reference_id
reference_type
scores
url http://secunia.com/advisories/32045
3
reference_url http://secunia.com/advisories/32153
reference_id
reference_type
scores
url http://secunia.com/advisories/32153
4
reference_url http://securityreason.com/securityalert/4326
reference_id
reference_type
scores
url http://securityreason.com/securityalert/4326
5
reference_url http://svn.mplayerhq.hu/mplayer/trunk/libmpdemux/demux_real.c?r1=27314&r2=27675
reference_id
reference_type
scores
url http://svn.mplayerhq.hu/mplayer/trunk/libmpdemux/demux_real.c?r1=27314&r2=27675
6
reference_url http://www.debian.org/security/2008/dsa-1644
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1644
7
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:219
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:219
8
reference_url http://www.ocert.org/advisories/ocert-2008-013.html
reference_id
reference_type
scores
url http://www.ocert.org/advisories/ocert-2008-013.html
9
reference_url http://www.securityfocus.com/archive/1/496806/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/496806/100/0/threaded
10
reference_url http://www.securityfocus.com/bid/31473
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/31473
11
reference_url http://www.securitytracker.com/id?1020952
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020952
12
reference_url http://www.vupen.com/english/advisories/2008/2703
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2703
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=500683
reference_id 500683
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=500683
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_rc1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_rc1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_rc1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3827
reference_id CVE-2008-3827
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-3827
36
reference_url https://security.gentoo.org/glsa/200901-07
reference_id GLSA-200901-07
reference_type
scores
url https://security.gentoo.org/glsa/200901-07
fixed_packages
0
url pkg:deb/debian/mplayer@2:1.0~rc3%2B%2Bfinal.dfsg1-1
purl pkg:deb/debian/mplayer@2:1.0~rc3%2B%2Bfinal.dfsg1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4jd9-pt54-1bag
1
vulnerability VCID-8uk8-jxh7-k7aa
2
vulnerability VCID-9tg7-9r5m-dkgn
3
vulnerability VCID-9vx1-3zb9-5bf1
4
vulnerability VCID-e178-xa31-h3c4
5
vulnerability VCID-fjy3-bfzh-7beu
6
vulnerability VCID-g1k8-4mbb-fyew
7
vulnerability VCID-h9ks-v96k-wkf7
8
vulnerability VCID-m5db-wq6e-gqeu
9
vulnerability VCID-pfcp-7vj5-rqef
10
vulnerability VCID-tff5-wrpr-hbe1
11
vulnerability VCID-vnmz-rcby-n3gs
12
vulnerability VCID-xxgu-jjrs-pkaz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.0~rc3%252B%252Bfinal.dfsg1-1
aliases CVE-2008-3827
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gxnr-jbzt-cffq
15
url VCID-h9ks-v96k-wkf7
vulnerability_id VCID-h9ks-v96k-wkf7
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6933
reference_id
reference_type
scores
0
value 0.03355
scoring_system epss
scoring_elements 0.87278
published_at 2026-04-01T12:55:00Z
1
value 0.03355
scoring_system epss
scoring_elements 0.87288
published_at 2026-04-02T12:55:00Z
2
value 0.03355
scoring_system epss
scoring_elements 0.87304
published_at 2026-04-04T12:55:00Z
3
value 0.03355
scoring_system epss
scoring_elements 0.87303
published_at 2026-04-07T12:55:00Z
4
value 0.03355
scoring_system epss
scoring_elements 0.87322
published_at 2026-04-08T12:55:00Z
5
value 0.03355
scoring_system epss
scoring_elements 0.87329
published_at 2026-04-09T12:55:00Z
6
value 0.03355
scoring_system epss
scoring_elements 0.87342
published_at 2026-04-11T12:55:00Z
7
value 0.03355
scoring_system epss
scoring_elements 0.87336
published_at 2026-04-12T12:55:00Z
8
value 0.03355
scoring_system epss
scoring_elements 0.87332
published_at 2026-04-13T12:55:00Z
9
value 0.03355
scoring_system epss
scoring_elements 0.87346
published_at 2026-04-16T12:55:00Z
10
value 0.03355
scoring_system epss
scoring_elements 0.8735
published_at 2026-04-18T12:55:00Z
11
value 0.03355
scoring_system epss
scoring_elements 0.87344
published_at 2026-04-21T12:55:00Z
12
value 0.03355
scoring_system epss
scoring_elements 0.87361
published_at 2026-04-24T12:55:00Z
13
value 0.03355
scoring_system epss
scoring_elements 0.87368
published_at 2026-04-26T12:55:00Z
14
value 0.03355
scoring_system epss
scoring_elements 0.87369
published_at 2026-04-29T12:55:00Z
15
value 0.03355
scoring_system epss
scoring_elements 0.87385
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6933
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6933
fixed_packages
0
url pkg:deb/debian/mplayer@2:1.0~rc4.dfsg1%2Bsvn34540-1%2Bdeb7u1
purl pkg:deb/debian/mplayer@2:1.0~rc4.dfsg1%2Bsvn34540-1%2Bdeb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4jd9-pt54-1bag
1
vulnerability VCID-8uk8-jxh7-k7aa
2
vulnerability VCID-9tg7-9r5m-dkgn
3
vulnerability VCID-9vx1-3zb9-5bf1
4
vulnerability VCID-e178-xa31-h3c4
5
vulnerability VCID-g1k8-4mbb-fyew
6
vulnerability VCID-h9ks-v96k-wkf7
7
vulnerability VCID-m5db-wq6e-gqeu
8
vulnerability VCID-pfcp-7vj5-rqef
9
vulnerability VCID-tff5-wrpr-hbe1
10
vulnerability VCID-vnmz-rcby-n3gs
11
vulnerability VCID-xxgu-jjrs-pkaz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.0~rc4.dfsg1%252Bsvn34540-1%252Bdeb7u1
1
url pkg:deb/debian/mplayer@2:1.3.0-6
purl pkg:deb/debian/mplayer@2:1.3.0-6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4jd9-pt54-1bag
1
vulnerability VCID-8uk8-jxh7-k7aa
2
vulnerability VCID-9tg7-9r5m-dkgn
3
vulnerability VCID-9vx1-3zb9-5bf1
4
vulnerability VCID-e178-xa31-h3c4
5
vulnerability VCID-g1k8-4mbb-fyew
6
vulnerability VCID-m5db-wq6e-gqeu
7
vulnerability VCID-pfcp-7vj5-rqef
8
vulnerability VCID-tff5-wrpr-hbe1
9
vulnerability VCID-vnmz-rcby-n3gs
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.3.0-6
aliases CVE-2013-6933
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h9ks-v96k-wkf7
16
url VCID-hujx-y363-e3cg
vulnerability_id VCID-hujx-y363-e3cg
summary
Multiple vulnerabilities have been discovered in MPlayer, possibly allowing
    for the remote execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0485
reference_id
reference_type
scores
0
value 0.16295
scoring_system epss
scoring_elements 0.94796
published_at 2026-04-01T12:55:00Z
1
value 0.16295
scoring_system epss
scoring_elements 0.94806
published_at 2026-04-02T12:55:00Z
2
value 0.16295
scoring_system epss
scoring_elements 0.94809
published_at 2026-04-04T12:55:00Z
3
value 0.16295
scoring_system epss
scoring_elements 0.94811
published_at 2026-04-07T12:55:00Z
4
value 0.16295
scoring_system epss
scoring_elements 0.94821
published_at 2026-04-08T12:55:00Z
5
value 0.16295
scoring_system epss
scoring_elements 0.94825
published_at 2026-04-09T12:55:00Z
6
value 0.16295
scoring_system epss
scoring_elements 0.94829
published_at 2026-04-11T12:55:00Z
7
value 0.16295
scoring_system epss
scoring_elements 0.94832
published_at 2026-04-12T12:55:00Z
8
value 0.16295
scoring_system epss
scoring_elements 0.94834
published_at 2026-04-13T12:55:00Z
9
value 0.16295
scoring_system epss
scoring_elements 0.9484
published_at 2026-04-16T12:55:00Z
10
value 0.16295
scoring_system epss
scoring_elements 0.94844
published_at 2026-04-18T12:55:00Z
11
value 0.16295
scoring_system epss
scoring_elements 0.94847
published_at 2026-04-21T12:55:00Z
12
value 0.16295
scoring_system epss
scoring_elements 0.94849
published_at 2026-04-26T12:55:00Z
13
value 0.16295
scoring_system epss
scoring_elements 0.9485
published_at 2026-04-29T12:55:00Z
14
value 0.16295
scoring_system epss
scoring_elements 0.94857
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0485
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0485
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464060
reference_id 464060
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464060
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/31076.py
reference_id CVE-2008-0485;OSVDB-42201
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/31076.py
4
reference_url https://www.securityfocus.com/bid/27499/info
reference_id CVE-2008-0485;OSVDB-42201
reference_type exploit
scores
url https://www.securityfocus.com/bid/27499/info
5
reference_url https://security.gentoo.org/glsa/200803-16
reference_id GLSA-200803-16
reference_type
scores
url https://security.gentoo.org/glsa/200803-16
fixed_packages
0
url pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2
purl pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1228-m28x-bkbm
1
vulnerability VCID-4jd9-pt54-1bag
2
vulnerability VCID-8uk8-jxh7-k7aa
3
vulnerability VCID-9tg7-9r5m-dkgn
4
vulnerability VCID-9vx1-3zb9-5bf1
5
vulnerability VCID-e178-xa31-h3c4
6
vulnerability VCID-fjy3-bfzh-7beu
7
vulnerability VCID-fw24-pxsc-7bek
8
vulnerability VCID-g1k8-4mbb-fyew
9
vulnerability VCID-gxnr-jbzt-cffq
10
vulnerability VCID-h9ks-v96k-wkf7
11
vulnerability VCID-j7wp-941h-p3fc
12
vulnerability VCID-m5db-wq6e-gqeu
13
vulnerability VCID-pfcp-7vj5-rqef
14
vulnerability VCID-tff5-wrpr-hbe1
15
vulnerability VCID-tteq-u99e-ayg4
16
vulnerability VCID-vnmz-rcby-n3gs
17
vulnerability VCID-xxgu-jjrs-pkaz
18
vulnerability VCID-ybgy-yct3-6fba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-17%252Blenny3.2
aliases CVE-2008-0485
risk_score 0.2
exploitability 2.0
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hujx-y363-e3cg
17
url VCID-j7wp-941h-p3fc
vulnerability_id VCID-j7wp-941h-p3fc
summary
Multiple vulnerabilities in xine-lib might result in the remote execution
    of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5244
reference_id
reference_type
scores
0
value 0.00435
scoring_system epss
scoring_elements 0.62945
published_at 2026-05-05T12:55:00Z
1
value 0.00435
scoring_system epss
scoring_elements 0.62825
published_at 2026-04-01T12:55:00Z
2
value 0.00435
scoring_system epss
scoring_elements 0.62883
published_at 2026-04-02T12:55:00Z
3
value 0.00435
scoring_system epss
scoring_elements 0.62913
published_at 2026-04-04T12:55:00Z
4
value 0.00435
scoring_system epss
scoring_elements 0.62876
published_at 2026-04-07T12:55:00Z
5
value 0.00435
scoring_system epss
scoring_elements 0.62927
published_at 2026-04-08T12:55:00Z
6
value 0.00435
scoring_system epss
scoring_elements 0.62943
published_at 2026-04-09T12:55:00Z
7
value 0.00435
scoring_system epss
scoring_elements 0.62962
published_at 2026-04-11T12:55:00Z
8
value 0.00435
scoring_system epss
scoring_elements 0.6295
published_at 2026-04-12T12:55:00Z
9
value 0.00435
scoring_system epss
scoring_elements 0.62928
published_at 2026-04-13T12:55:00Z
10
value 0.00435
scoring_system epss
scoring_elements 0.62968
published_at 2026-04-16T12:55:00Z
11
value 0.00435
scoring_system epss
scoring_elements 0.62976
published_at 2026-04-18T12:55:00Z
12
value 0.00435
scoring_system epss
scoring_elements 0.62955
published_at 2026-04-21T12:55:00Z
13
value 0.00435
scoring_system epss
scoring_elements 0.62975
published_at 2026-04-24T12:55:00Z
14
value 0.00435
scoring_system epss
scoring_elements 0.6299
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5244
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5244
3
reference_url http://securitytracker.com/id?1020703
reference_id
reference_type
scores
url http://securitytracker.com/id?1020703
4
reference_url http://sourceforge.net/project/shownotes.php?release_id=619869
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?release_id=619869
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=407010
reference_id 407010
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=407010
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.14:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5244
reference_id CVE-2008-5244
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-5244
56
reference_url https://security.gentoo.org/glsa/201006-04
reference_id GLSA-201006-04
reference_type
scores
url https://security.gentoo.org/glsa/201006-04
57
reference_url https://usn.ubuntu.com/710-1/
reference_id USN-710-1
reference_type
scores
url https://usn.ubuntu.com/710-1/
fixed_packages
0
url pkg:deb/debian/mplayer@2:1.0~rc3%2B%2Bfinal.dfsg1-1
purl pkg:deb/debian/mplayer@2:1.0~rc3%2B%2Bfinal.dfsg1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4jd9-pt54-1bag
1
vulnerability VCID-8uk8-jxh7-k7aa
2
vulnerability VCID-9tg7-9r5m-dkgn
3
vulnerability VCID-9vx1-3zb9-5bf1
4
vulnerability VCID-e178-xa31-h3c4
5
vulnerability VCID-fjy3-bfzh-7beu
6
vulnerability VCID-g1k8-4mbb-fyew
7
vulnerability VCID-h9ks-v96k-wkf7
8
vulnerability VCID-m5db-wq6e-gqeu
9
vulnerability VCID-pfcp-7vj5-rqef
10
vulnerability VCID-tff5-wrpr-hbe1
11
vulnerability VCID-vnmz-rcby-n3gs
12
vulnerability VCID-xxgu-jjrs-pkaz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.0~rc3%252B%252Bfinal.dfsg1-1
aliases CVE-2008-5244
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j7wp-941h-p3fc
18
url VCID-m5db-wq6e-gqeu
vulnerability_id VCID-m5db-wq6e-gqeu
summary Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-38855
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.19364
published_at 2026-04-02T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.19415
published_at 2026-04-04T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19132
published_at 2026-04-07T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.19212
published_at 2026-04-08T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.19264
published_at 2026-04-09T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.1927
published_at 2026-04-11T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.19224
published_at 2026-04-12T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.19169
published_at 2026-04-13T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.1913
published_at 2026-04-16T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.19139
published_at 2026-04-18T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.19147
published_at 2026-04-21T12:55:00Z
11
value 0.00061
scoring_system epss
scoring_elements 0.19039
published_at 2026-04-24T12:55:00Z
12
value 0.00061
scoring_system epss
scoring_elements 0.19028
published_at 2026-04-26T12:55:00Z
13
value 0.00061
scoring_system epss
scoring_elements 0.18984
published_at 2026-04-29T12:55:00Z
14
value 0.00061
scoring_system epss
scoring_elements 0.18863
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-38855
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38855
2
reference_url https://security.gentoo.org/glsa/202405-05
reference_id GLSA-202405-05
reference_type
scores
url https://security.gentoo.org/glsa/202405-05
3
reference_url https://usn.ubuntu.com/5895-1/
reference_id USN-5895-1
reference_type
scores
url https://usn.ubuntu.com/5895-1/
fixed_packages
0
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1
aliases CVE-2022-38855
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m5db-wq6e-gqeu
19
url VCID-pbr8-afjj-pbdq
vulnerability_id VCID-pbr8-afjj-pbdq
summary
Two vulnerabilities have been discovered in MPlayer, each one could lead to
    the execution of arbitrary code.
references
0
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414072
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414072
1
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414072%3Bmsg=12%3Bfilename=DS_VideoDecoder.c---SVN--22205.patch%3Batt=1
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414072%3Bmsg=12%3Bfilename=DS_VideoDecoder.c---SVN--22205.patch%3Batt=1
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-1387
reference_id
reference_type
scores
0
value 0.05109
scoring_system epss
scoring_elements 0.89877
published_at 2026-05-05T12:55:00Z
1
value 0.05109
scoring_system epss
scoring_elements 0.898
published_at 2026-04-01T12:55:00Z
2
value 0.05109
scoring_system epss
scoring_elements 0.89803
published_at 2026-04-02T12:55:00Z
3
value 0.05109
scoring_system epss
scoring_elements 0.89817
published_at 2026-04-04T12:55:00Z
4
value 0.05109
scoring_system epss
scoring_elements 0.89821
published_at 2026-04-07T12:55:00Z
5
value 0.05109
scoring_system epss
scoring_elements 0.89839
published_at 2026-04-08T12:55:00Z
6
value 0.05109
scoring_system epss
scoring_elements 0.89845
published_at 2026-04-09T12:55:00Z
7
value 0.05109
scoring_system epss
scoring_elements 0.89851
published_at 2026-04-11T12:55:00Z
8
value 0.05109
scoring_system epss
scoring_elements 0.89849
published_at 2026-04-12T12:55:00Z
9
value 0.05109
scoring_system epss
scoring_elements 0.89842
published_at 2026-04-13T12:55:00Z
10
value 0.05109
scoring_system epss
scoring_elements 0.89856
published_at 2026-04-16T12:55:00Z
11
value 0.05109
scoring_system epss
scoring_elements 0.89857
published_at 2026-04-18T12:55:00Z
12
value 0.05109
scoring_system epss
scoring_elements 0.8985
published_at 2026-04-21T12:55:00Z
13
value 0.05109
scoring_system epss
scoring_elements 0.89865
published_at 2026-04-26T12:55:00Z
14
value 0.05109
scoring_system epss
scoring_elements 0.89863
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-1387
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1387
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1387
4
reference_url http://secunia.com/advisories/24443
reference_id
reference_type
scores
url http://secunia.com/advisories/24443
5
reference_url http://secunia.com/advisories/24444
reference_id
reference_type
scores
url http://secunia.com/advisories/24444
6
reference_url http://secunia.com/advisories/24462
reference_id
reference_type
scores
url http://secunia.com/advisories/24462
7
reference_url http://secunia.com/advisories/25462
reference_id
reference_type
scores
url http://secunia.com/advisories/25462
8
reference_url http://secunia.com/advisories/29601
reference_id
reference_type
scores
url http://secunia.com/advisories/29601
9
reference_url http://security.gentoo.org/glsa/glsa-200705-21.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200705-21.xml
10
reference_url http://www.debian.org/security/2008/dsa-1536
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1536
11
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:061
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:061
12
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:062
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:062
13
reference_url http://www.securityfocus.com/bid/22933
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/22933
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414075
reference_id 414075
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414075
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-1387
reference_id CVE-2007-1387
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:M/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-1387
17
reference_url https://security.gentoo.org/glsa/200705-21
reference_id GLSA-200705-21
reference_type
scores
url https://security.gentoo.org/glsa/200705-21
18
reference_url https://usn.ubuntu.com/435-1/
reference_id USN-435-1
reference_type
scores
url https://usn.ubuntu.com/435-1/
fixed_packages
0
url pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2
purl pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1228-m28x-bkbm
1
vulnerability VCID-4jd9-pt54-1bag
2
vulnerability VCID-8uk8-jxh7-k7aa
3
vulnerability VCID-9tg7-9r5m-dkgn
4
vulnerability VCID-9vx1-3zb9-5bf1
5
vulnerability VCID-e178-xa31-h3c4
6
vulnerability VCID-fjy3-bfzh-7beu
7
vulnerability VCID-fw24-pxsc-7bek
8
vulnerability VCID-g1k8-4mbb-fyew
9
vulnerability VCID-gxnr-jbzt-cffq
10
vulnerability VCID-h9ks-v96k-wkf7
11
vulnerability VCID-j7wp-941h-p3fc
12
vulnerability VCID-m5db-wq6e-gqeu
13
vulnerability VCID-pfcp-7vj5-rqef
14
vulnerability VCID-tff5-wrpr-hbe1
15
vulnerability VCID-tteq-u99e-ayg4
16
vulnerability VCID-vnmz-rcby-n3gs
17
vulnerability VCID-xxgu-jjrs-pkaz
18
vulnerability VCID-ybgy-yct3-6fba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-17%252Blenny3.2
aliases CVE-2007-1387
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pbr8-afjj-pbdq
20
url VCID-pbz2-w6vz-cqhx
vulnerability_id VCID-pbz2-w6vz-cqhx
summary
An integer overflow vulnerability in MPlayer may allow for the execution of
    arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1558
reference_id
reference_type
scores
0
value 0.21937
scoring_system epss
scoring_elements 0.95731
published_at 2026-04-01T12:55:00Z
1
value 0.21937
scoring_system epss
scoring_elements 0.9574
published_at 2026-04-02T12:55:00Z
2
value 0.21937
scoring_system epss
scoring_elements 0.95748
published_at 2026-04-04T12:55:00Z
3
value 0.21937
scoring_system epss
scoring_elements 0.95751
published_at 2026-04-07T12:55:00Z
4
value 0.21937
scoring_system epss
scoring_elements 0.95759
published_at 2026-04-08T12:55:00Z
5
value 0.21937
scoring_system epss
scoring_elements 0.95763
published_at 2026-04-09T12:55:00Z
6
value 0.21937
scoring_system epss
scoring_elements 0.95766
published_at 2026-04-12T12:55:00Z
7
value 0.21937
scoring_system epss
scoring_elements 0.95767
published_at 2026-04-13T12:55:00Z
8
value 0.21937
scoring_system epss
scoring_elements 0.95777
published_at 2026-04-16T12:55:00Z
9
value 0.21937
scoring_system epss
scoring_elements 0.95781
published_at 2026-04-18T12:55:00Z
10
value 0.21937
scoring_system epss
scoring_elements 0.95783
published_at 2026-04-29T12:55:00Z
11
value 0.21937
scoring_system epss
scoring_elements 0.95785
published_at 2026-04-26T12:55:00Z
12
value 0.21937
scoring_system epss
scoring_elements 0.95796
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1558
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1558
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=473056
reference_id 473056
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=473056
3
reference_url https://security.gentoo.org/glsa/200805-22
reference_id GLSA-200805-22
reference_type
scores
url https://security.gentoo.org/glsa/200805-22
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/5307.pl
reference_id OSVDB-43740;CVE-2008-1558
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/5307.pl
fixed_packages
0
url pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2
purl pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1228-m28x-bkbm
1
vulnerability VCID-4jd9-pt54-1bag
2
vulnerability VCID-8uk8-jxh7-k7aa
3
vulnerability VCID-9tg7-9r5m-dkgn
4
vulnerability VCID-9vx1-3zb9-5bf1
5
vulnerability VCID-e178-xa31-h3c4
6
vulnerability VCID-fjy3-bfzh-7beu
7
vulnerability VCID-fw24-pxsc-7bek
8
vulnerability VCID-g1k8-4mbb-fyew
9
vulnerability VCID-gxnr-jbzt-cffq
10
vulnerability VCID-h9ks-v96k-wkf7
11
vulnerability VCID-j7wp-941h-p3fc
12
vulnerability VCID-m5db-wq6e-gqeu
13
vulnerability VCID-pfcp-7vj5-rqef
14
vulnerability VCID-tff5-wrpr-hbe1
15
vulnerability VCID-tteq-u99e-ayg4
16
vulnerability VCID-vnmz-rcby-n3gs
17
vulnerability VCID-xxgu-jjrs-pkaz
18
vulnerability VCID-ybgy-yct3-6fba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-17%252Blenny3.2
aliases CVE-2008-1558
risk_score 0.4
exploitability 2.0
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pbz2-w6vz-cqhx
21
url VCID-pfcp-7vj5-rqef
vulnerability_id VCID-pfcp-7vj5-rqef
summary Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-38864
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.19364
published_at 2026-04-02T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.19415
published_at 2026-04-04T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19132
published_at 2026-04-07T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.19212
published_at 2026-04-08T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.19264
published_at 2026-04-09T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.1927
published_at 2026-04-11T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.19224
published_at 2026-04-12T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.19169
published_at 2026-04-13T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.1913
published_at 2026-04-16T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.19139
published_at 2026-04-18T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.19147
published_at 2026-04-21T12:55:00Z
11
value 0.00061
scoring_system epss
scoring_elements 0.19039
published_at 2026-04-24T12:55:00Z
12
value 0.00061
scoring_system epss
scoring_elements 0.19028
published_at 2026-04-26T12:55:00Z
13
value 0.00061
scoring_system epss
scoring_elements 0.18984
published_at 2026-04-29T12:55:00Z
14
value 0.00061
scoring_system epss
scoring_elements 0.18863
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-38864
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38864
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021013
reference_id 1021013
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021013
3
reference_url https://security.gentoo.org/glsa/202405-05
reference_id GLSA-202405-05
reference_type
scores
url https://security.gentoo.org/glsa/202405-05
4
reference_url https://usn.ubuntu.com/5895-1/
reference_id USN-5895-1
reference_type
scores
url https://usn.ubuntu.com/5895-1/
fixed_packages
0
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1
aliases CVE-2022-38864
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pfcp-7vj5-rqef
22
url VCID-pxrz-2835-dfhm
vulnerability_id VCID-pxrz-2835-dfhm
summary Heap-based buffer overflow in libmpdemux/aviheader.c in MPlayer 1.0rc1 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a .avi file with certain large "indx truck size" and nEntriesInuse values, and a certain wLongsPerEntry value.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4938
reference_id
reference_type
scores
0
value 0.09968
scoring_system epss
scoring_elements 0.93011
published_at 2026-04-01T12:55:00Z
1
value 0.09968
scoring_system epss
scoring_elements 0.9302
published_at 2026-04-02T12:55:00Z
2
value 0.09968
scoring_system epss
scoring_elements 0.93024
published_at 2026-04-04T12:55:00Z
3
value 0.09968
scoring_system epss
scoring_elements 0.93023
published_at 2026-04-07T12:55:00Z
4
value 0.09968
scoring_system epss
scoring_elements 0.93031
published_at 2026-04-08T12:55:00Z
5
value 0.09968
scoring_system epss
scoring_elements 0.93036
published_at 2026-04-09T12:55:00Z
6
value 0.09968
scoring_system epss
scoring_elements 0.93041
published_at 2026-04-11T12:55:00Z
7
value 0.09968
scoring_system epss
scoring_elements 0.93038
published_at 2026-04-12T12:55:00Z
8
value 0.09968
scoring_system epss
scoring_elements 0.9304
published_at 2026-04-13T12:55:00Z
9
value 0.09968
scoring_system epss
scoring_elements 0.9305
published_at 2026-04-16T12:55:00Z
10
value 0.09968
scoring_system epss
scoring_elements 0.93053
published_at 2026-04-18T12:55:00Z
11
value 0.09968
scoring_system epss
scoring_elements 0.9306
published_at 2026-04-21T12:55:00Z
12
value 0.09968
scoring_system epss
scoring_elements 0.93067
published_at 2026-05-05T12:55:00Z
13
value 0.09968
scoring_system epss
scoring_elements 0.93062
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4938
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4938
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=443478
reference_id 443478
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=443478
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/30578.txt
reference_id CVE-2007-4938;OSVDB-45940
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/30578.txt
4
reference_url https://www.securityfocus.com/bid/25648/info
reference_id CVE-2007-4938;OSVDB-45940
reference_type exploit
scores
url https://www.securityfocus.com/bid/25648/info
fixed_packages
0
url pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2
purl pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1228-m28x-bkbm
1
vulnerability VCID-4jd9-pt54-1bag
2
vulnerability VCID-8uk8-jxh7-k7aa
3
vulnerability VCID-9tg7-9r5m-dkgn
4
vulnerability VCID-9vx1-3zb9-5bf1
5
vulnerability VCID-e178-xa31-h3c4
6
vulnerability VCID-fjy3-bfzh-7beu
7
vulnerability VCID-fw24-pxsc-7bek
8
vulnerability VCID-g1k8-4mbb-fyew
9
vulnerability VCID-gxnr-jbzt-cffq
10
vulnerability VCID-h9ks-v96k-wkf7
11
vulnerability VCID-j7wp-941h-p3fc
12
vulnerability VCID-m5db-wq6e-gqeu
13
vulnerability VCID-pfcp-7vj5-rqef
14
vulnerability VCID-tff5-wrpr-hbe1
15
vulnerability VCID-tteq-u99e-ayg4
16
vulnerability VCID-vnmz-rcby-n3gs
17
vulnerability VCID-xxgu-jjrs-pkaz
18
vulnerability VCID-ybgy-yct3-6fba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-17%252Blenny3.2
aliases CVE-2007-4938
risk_score 0.2
exploitability 2.0
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pxrz-2835-dfhm
23
url VCID-q7u2-mhac-r7fp
vulnerability_id VCID-q7u2-mhac-r7fp
summary
xine-lib is vulnerable to multiple buffer overflows when processing FLAC
    and ASF streams.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0486.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0486.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0486
reference_id
reference_type
scores
0
value 0.0457
scoring_system epss
scoring_elements 0.89158
published_at 2026-04-01T12:55:00Z
1
value 0.0457
scoring_system epss
scoring_elements 0.89165
published_at 2026-04-02T12:55:00Z
2
value 0.0457
scoring_system epss
scoring_elements 0.8918
published_at 2026-04-04T12:55:00Z
3
value 0.0457
scoring_system epss
scoring_elements 0.89182
published_at 2026-04-07T12:55:00Z
4
value 0.0457
scoring_system epss
scoring_elements 0.892
published_at 2026-04-08T12:55:00Z
5
value 0.0457
scoring_system epss
scoring_elements 0.89205
published_at 2026-04-09T12:55:00Z
6
value 0.0457
scoring_system epss
scoring_elements 0.89215
published_at 2026-04-11T12:55:00Z
7
value 0.0457
scoring_system epss
scoring_elements 0.89211
published_at 2026-04-12T12:55:00Z
8
value 0.0457
scoring_system epss
scoring_elements 0.89209
published_at 2026-04-13T12:55:00Z
9
value 0.0457
scoring_system epss
scoring_elements 0.89221
published_at 2026-04-18T12:55:00Z
10
value 0.0457
scoring_system epss
scoring_elements 0.89217
published_at 2026-04-21T12:55:00Z
11
value 0.04864
scoring_system epss
scoring_elements 0.89577
published_at 2026-04-24T12:55:00Z
12
value 0.04864
scoring_system epss
scoring_elements 0.89581
published_at 2026-04-29T12:55:00Z
13
value 0.04864
scoring_system epss
scoring_elements 0.89588
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0486
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0486
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=431541
reference_id 431541
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=431541
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464060
reference_id 464060
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464060
5
reference_url https://security.gentoo.org/glsa/200802-12
reference_id GLSA-200802-12
reference_type
scores
url https://security.gentoo.org/glsa/200802-12
6
reference_url https://security.gentoo.org/glsa/200803-16
reference_id GLSA-200803-16
reference_type
scores
url https://security.gentoo.org/glsa/200803-16
7
reference_url https://usn.ubuntu.com/635-1/
reference_id USN-635-1
reference_type
scores
url https://usn.ubuntu.com/635-1/
fixed_packages
0
url pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2
purl pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1228-m28x-bkbm
1
vulnerability VCID-4jd9-pt54-1bag
2
vulnerability VCID-8uk8-jxh7-k7aa
3
vulnerability VCID-9tg7-9r5m-dkgn
4
vulnerability VCID-9vx1-3zb9-5bf1
5
vulnerability VCID-e178-xa31-h3c4
6
vulnerability VCID-fjy3-bfzh-7beu
7
vulnerability VCID-fw24-pxsc-7bek
8
vulnerability VCID-g1k8-4mbb-fyew
9
vulnerability VCID-gxnr-jbzt-cffq
10
vulnerability VCID-h9ks-v96k-wkf7
11
vulnerability VCID-j7wp-941h-p3fc
12
vulnerability VCID-m5db-wq6e-gqeu
13
vulnerability VCID-pfcp-7vj5-rqef
14
vulnerability VCID-tff5-wrpr-hbe1
15
vulnerability VCID-tteq-u99e-ayg4
16
vulnerability VCID-vnmz-rcby-n3gs
17
vulnerability VCID-xxgu-jjrs-pkaz
18
vulnerability VCID-ybgy-yct3-6fba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-17%252Blenny3.2
aliases CVE-2008-0486
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q7u2-mhac-r7fp
24
url VCID-r4rz-8ey9-fqb4
vulnerability_id VCID-r4rz-8ey9-fqb4
summary
Multiple vulnerabilities in FFmpeg may lead to the remote execution of
    arbitrary code or a Denial of Service.
references
0
reference_url http://archives.neohapsis.com/archives/fulldisclosure/2008-09/0103.html
reference_id
reference_type
scores
url http://archives.neohapsis.com/archives/fulldisclosure/2008-09/0103.html
1
reference_url http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2008-August/016011.html
reference_id
reference_type
scores
url http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2008-August/016011.html
2
reference_url http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2008-August/016012.html
reference_id
reference_type
scores
url http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2008-August/016012.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4866
reference_id
reference_type
scores
0
value 0.05735
scoring_system epss
scoring_elements 0.90477
published_at 2026-05-05T12:55:00Z
1
value 0.05735
scoring_system epss
scoring_elements 0.90404
published_at 2026-04-01T12:55:00Z
2
value 0.05735
scoring_system epss
scoring_elements 0.90408
published_at 2026-04-02T12:55:00Z
3
value 0.05735
scoring_system epss
scoring_elements 0.9042
published_at 2026-04-04T12:55:00Z
4
value 0.05735
scoring_system epss
scoring_elements 0.90424
published_at 2026-04-07T12:55:00Z
5
value 0.05735
scoring_system epss
scoring_elements 0.90438
published_at 2026-04-08T12:55:00Z
6
value 0.05735
scoring_system epss
scoring_elements 0.90444
published_at 2026-04-13T12:55:00Z
7
value 0.05735
scoring_system epss
scoring_elements 0.90452
published_at 2026-04-12T12:55:00Z
8
value 0.05735
scoring_system epss
scoring_elements 0.9046
published_at 2026-04-16T12:55:00Z
9
value 0.05735
scoring_system epss
scoring_elements 0.90459
published_at 2026-04-18T12:55:00Z
10
value 0.05735
scoring_system epss
scoring_elements 0.90457
published_at 2026-04-21T12:55:00Z
11
value 0.05735
scoring_system epss
scoring_elements 0.9047
published_at 2026-04-24T12:55:00Z
12
value 0.05735
scoring_system epss
scoring_elements 0.90469
published_at 2026-04-26T12:55:00Z
13
value 0.05735
scoring_system epss
scoring_elements 0.90465
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4866
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4866
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4866
5
reference_url http://secunia.com/advisories/34296
reference_id
reference_type
scores
url http://secunia.com/advisories/34296
6
reference_url http://secunia.com/advisories/34385
reference_id
reference_type
scores
url http://secunia.com/advisories/34385
7
reference_url http://secunia.com/advisories/34845
reference_id
reference_type
scores
url http://secunia.com/advisories/34845
8
reference_url http://security.gentoo.org/glsa/glsa-200903-33.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200903-33.xml
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/46322
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/46322
10
reference_url http://www.debian.org/security/2009/dsa-1782
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1782
11
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:013
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:013
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:015
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:015
13
reference_url http://www.openwall.com/lists/oss-security/2008/10/29/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/10/29/6
14
reference_url http://www.securityfocus.com/bid/33308
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/33308
15
reference_url http://www.ubuntu.com/usn/USN-734-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-734-1
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4866
reference_id CVE-2008-4866
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-4866
32
reference_url https://security.gentoo.org/glsa/200903-33
reference_id GLSA-200903-33
reference_type
scores
url https://security.gentoo.org/glsa/200903-33
33
reference_url https://usn.ubuntu.com/734-1/
reference_id USN-734-1
reference_type
scores
url https://usn.ubuntu.com/734-1/
fixed_packages
0
url pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2
purl pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1228-m28x-bkbm
1
vulnerability VCID-4jd9-pt54-1bag
2
vulnerability VCID-8uk8-jxh7-k7aa
3
vulnerability VCID-9tg7-9r5m-dkgn
4
vulnerability VCID-9vx1-3zb9-5bf1
5
vulnerability VCID-e178-xa31-h3c4
6
vulnerability VCID-fjy3-bfzh-7beu
7
vulnerability VCID-fw24-pxsc-7bek
8
vulnerability VCID-g1k8-4mbb-fyew
9
vulnerability VCID-gxnr-jbzt-cffq
10
vulnerability VCID-h9ks-v96k-wkf7
11
vulnerability VCID-j7wp-941h-p3fc
12
vulnerability VCID-m5db-wq6e-gqeu
13
vulnerability VCID-pfcp-7vj5-rqef
14
vulnerability VCID-tff5-wrpr-hbe1
15
vulnerability VCID-tteq-u99e-ayg4
16
vulnerability VCID-vnmz-rcby-n3gs
17
vulnerability VCID-xxgu-jjrs-pkaz
18
vulnerability VCID-ybgy-yct3-6fba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-17%252Blenny3.2
aliases CVE-2008-4866
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r4rz-8ey9-fqb4
25
url VCID-sgm1-d98g-nff9
vulnerability_id VCID-sgm1-d98g-nff9
summary
Multiple vulnerabilities in FFmpeg may lead to the remote execution of
    arbitrary code or a Denial of Service.
references
0
reference_url http://git.ffmpeg.org/?p=ffmpeg%3Ba=commitdiff%3Bh=72e715fb798f2cb79fd24a6d2eaeafb7c6eeda17
reference_id
reference_type
scores
url http://git.ffmpeg.org/?p=ffmpeg%3Ba=commitdiff%3Bh=72e715fb798f2cb79fd24a6d2eaeafb7c6eeda17
1
reference_url http://osvdb.org/51643
reference_id
reference_type
scores
url http://osvdb.org/51643
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0385
reference_id
reference_type
scores
0
value 0.11552
scoring_system epss
scoring_elements 0.93669
published_at 2026-05-05T12:55:00Z
1
value 0.11552
scoring_system epss
scoring_elements 0.93594
published_at 2026-04-01T12:55:00Z
2
value 0.11552
scoring_system epss
scoring_elements 0.93603
published_at 2026-04-02T12:55:00Z
3
value 0.11552
scoring_system epss
scoring_elements 0.93612
published_at 2026-04-04T12:55:00Z
4
value 0.11552
scoring_system epss
scoring_elements 0.93614
published_at 2026-04-07T12:55:00Z
5
value 0.11552
scoring_system epss
scoring_elements 0.93623
published_at 2026-04-08T12:55:00Z
6
value 0.11552
scoring_system epss
scoring_elements 0.93625
published_at 2026-04-09T12:55:00Z
7
value 0.11552
scoring_system epss
scoring_elements 0.9363
published_at 2026-04-12T12:55:00Z
8
value 0.11552
scoring_system epss
scoring_elements 0.93631
published_at 2026-04-13T12:55:00Z
9
value 0.11552
scoring_system epss
scoring_elements 0.93649
published_at 2026-04-16T12:55:00Z
10
value 0.11552
scoring_system epss
scoring_elements 0.93656
published_at 2026-04-18T12:55:00Z
11
value 0.11552
scoring_system epss
scoring_elements 0.9366
published_at 2026-04-21T12:55:00Z
12
value 0.11552
scoring_system epss
scoring_elements 0.93665
published_at 2026-04-24T12:55:00Z
13
value 0.11552
scoring_system epss
scoring_elements 0.93663
published_at 2026-04-26T12:55:00Z
14
value 0.11552
scoring_system epss
scoring_elements 0.93661
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0385
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0385
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0385
4
reference_url http://secunia.com/advisories/33711
reference_id
reference_type
scores
url http://secunia.com/advisories/33711
5
reference_url http://secunia.com/advisories/34296
reference_id
reference_type
scores
url http://secunia.com/advisories/34296
6
reference_url http://secunia.com/advisories/34385
reference_id
reference_type
scores
url http://secunia.com/advisories/34385
7
reference_url http://secunia.com/advisories/34712
reference_id
reference_type
scores
url http://secunia.com/advisories/34712
8
reference_url http://secunia.com/advisories/34845
reference_id
reference_type
scores
url http://secunia.com/advisories/34845
9
reference_url http://secunia.com/advisories/34905
reference_id
reference_type
scores
url http://secunia.com/advisories/34905
10
reference_url http://security.gentoo.org/glsa/glsa-200903-33.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200903-33.xml
11
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/48330
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/48330
12
reference_url http://svn.mplayerhq.hu/ffmpeg/trunk/libavformat/4xm.c?r1=16838&r2=16846&pathrev=16846
reference_id
reference_type
scores
url http://svn.mplayerhq.hu/ffmpeg/trunk/libavformat/4xm.c?r1=16838&r2=16846&pathrev=16846
13
reference_url http://svn.mplayerhq.hu/ffmpeg?view=rev&revision=16846
reference_id
reference_type
scores
url http://svn.mplayerhq.hu/ffmpeg?view=rev&revision=16846
14
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00210.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00210.html
15
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00215.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00215.html
16
reference_url http://www.debian.org/security/2009/dsa-1781
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1781
17
reference_url http://www.debian.org/security/2009/dsa-1782
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1782
18
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:297
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:297
19
reference_url http://www.securityfocus.com/archive/1/500514/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/500514/100/0/threaded
20
reference_url http://www.securityfocus.com/bid/33502
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/33502
21
reference_url http://www.trapkit.de/advisories/TKADV2009-004.txt
reference_id
reference_type
scores
url http://www.trapkit.de/advisories/TKADV2009-004.txt
22
reference_url http://www.ubuntu.com/usn/USN-734-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-734-1
23
reference_url http://www.vupen.com/english/advisories/2009/0277
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0277
24
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524805
reference_id 524805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524805
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/detail/CVE-2009-0385
reference_id CVE-2009-0385
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2009-0385
35
reference_url https://security.gentoo.org/glsa/200903-33
reference_id GLSA-200903-33
reference_type
scores
url https://security.gentoo.org/glsa/200903-33
36
reference_url https://usn.ubuntu.com/734-1/
reference_id USN-734-1
reference_type
scores
url https://usn.ubuntu.com/734-1/
fixed_packages
0
url pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2
purl pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1228-m28x-bkbm
1
vulnerability VCID-4jd9-pt54-1bag
2
vulnerability VCID-8uk8-jxh7-k7aa
3
vulnerability VCID-9tg7-9r5m-dkgn
4
vulnerability VCID-9vx1-3zb9-5bf1
5
vulnerability VCID-e178-xa31-h3c4
6
vulnerability VCID-fjy3-bfzh-7beu
7
vulnerability VCID-fw24-pxsc-7bek
8
vulnerability VCID-g1k8-4mbb-fyew
9
vulnerability VCID-gxnr-jbzt-cffq
10
vulnerability VCID-h9ks-v96k-wkf7
11
vulnerability VCID-j7wp-941h-p3fc
12
vulnerability VCID-m5db-wq6e-gqeu
13
vulnerability VCID-pfcp-7vj5-rqef
14
vulnerability VCID-tff5-wrpr-hbe1
15
vulnerability VCID-tteq-u99e-ayg4
16
vulnerability VCID-vnmz-rcby-n3gs
17
vulnerability VCID-xxgu-jjrs-pkaz
18
vulnerability VCID-ybgy-yct3-6fba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-17%252Blenny3.2
aliases CVE-2009-0385
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sgm1-d98g-nff9
26
url VCID-tff5-wrpr-hbe1
vulnerability_id VCID-tff5-wrpr-hbe1
summary Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-38860
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.18492
published_at 2026-04-02T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18546
published_at 2026-04-04T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18254
published_at 2026-04-07T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.18337
published_at 2026-04-08T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.1839
published_at 2026-04-11T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18342
published_at 2026-04-12T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.1829
published_at 2026-04-13T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18234
published_at 2026-04-16T12:55:00Z
8
value 0.00058
scoring_system epss
scoring_elements 0.18246
published_at 2026-04-18T12:55:00Z
9
value 0.00058
scoring_system epss
scoring_elements 0.18273
published_at 2026-04-21T12:55:00Z
10
value 0.00058
scoring_system epss
scoring_elements 0.18172
published_at 2026-04-24T12:55:00Z
11
value 0.00058
scoring_system epss
scoring_elements 0.18155
published_at 2026-04-26T12:55:00Z
12
value 0.00058
scoring_system epss
scoring_elements 0.18119
published_at 2026-04-29T12:55:00Z
13
value 0.00058
scoring_system epss
scoring_elements 0.1798
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-38860
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38860
2
reference_url https://security.gentoo.org/glsa/202405-05
reference_id GLSA-202405-05
reference_type
scores
url https://security.gentoo.org/glsa/202405-05
3
reference_url https://usn.ubuntu.com/5895-1/
reference_id USN-5895-1
reference_type
scores
url https://usn.ubuntu.com/5895-1/
fixed_packages
0
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1
aliases CVE-2022-38860
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tff5-wrpr-hbe1
27
url VCID-tteq-u99e-ayg4
vulnerability_id VCID-tteq-u99e-ayg4
summary
Multiple vulnerabilities have been found in MPlayer and the bundled
    FFmpeg, the worst of which may lead to the execution of arbitrary code.
references
0
reference_url http://sam.zoy.org/blog/2007-01-16-exposing-file-parsing-vulnerabilities
reference_id
reference_type
scores
url http://sam.zoy.org/blog/2007-01-16-exposing-file-parsing-vulnerabilities
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-6718
reference_id
reference_type
scores
0
value 0.00443
scoring_system epss
scoring_elements 0.63348
published_at 2026-05-05T12:55:00Z
1
value 0.00443
scoring_system epss
scoring_elements 0.63242
published_at 2026-04-01T12:55:00Z
2
value 0.00443
scoring_system epss
scoring_elements 0.63301
published_at 2026-04-02T12:55:00Z
3
value 0.00443
scoring_system epss
scoring_elements 0.63328
published_at 2026-04-04T12:55:00Z
4
value 0.00443
scoring_system epss
scoring_elements 0.63294
published_at 2026-04-07T12:55:00Z
5
value 0.00443
scoring_system epss
scoring_elements 0.63345
published_at 2026-04-08T12:55:00Z
6
value 0.00443
scoring_system epss
scoring_elements 0.63363
published_at 2026-04-12T12:55:00Z
7
value 0.00443
scoring_system epss
scoring_elements 0.6338
published_at 2026-04-11T12:55:00Z
8
value 0.00443
scoring_system epss
scoring_elements 0.63327
published_at 2026-04-13T12:55:00Z
9
value 0.00443
scoring_system epss
scoring_elements 0.63361
published_at 2026-04-16T12:55:00Z
10
value 0.00443
scoring_system epss
scoring_elements 0.63369
published_at 2026-04-18T12:55:00Z
11
value 0.00443
scoring_system epss
scoring_elements 0.63347
published_at 2026-04-21T12:55:00Z
12
value 0.00443
scoring_system epss
scoring_elements 0.63366
published_at 2026-04-24T12:55:00Z
13
value 0.00443
scoring_system epss
scoring_elements 0.63379
published_at 2026-04-26T12:55:00Z
14
value 0.00443
scoring_system epss
scoring_elements 0.63377
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-6718
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6718
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6718
3
reference_url http://www.openwall.com/lists/oss-security/2008/10/07/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/10/07/1
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=407010
reference_id 407010
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=407010
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-6718
reference_id CVE-2007-6718
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-6718
26
reference_url https://security.gentoo.org/glsa/201310-13
reference_id GLSA-201310-13
reference_type
scores
url https://security.gentoo.org/glsa/201310-13
fixed_packages
0
url pkg:deb/debian/mplayer@2:1.0~rc3%2B%2Bfinal.dfsg1-1
purl pkg:deb/debian/mplayer@2:1.0~rc3%2B%2Bfinal.dfsg1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4jd9-pt54-1bag
1
vulnerability VCID-8uk8-jxh7-k7aa
2
vulnerability VCID-9tg7-9r5m-dkgn
3
vulnerability VCID-9vx1-3zb9-5bf1
4
vulnerability VCID-e178-xa31-h3c4
5
vulnerability VCID-fjy3-bfzh-7beu
6
vulnerability VCID-g1k8-4mbb-fyew
7
vulnerability VCID-h9ks-v96k-wkf7
8
vulnerability VCID-m5db-wq6e-gqeu
9
vulnerability VCID-pfcp-7vj5-rqef
10
vulnerability VCID-tff5-wrpr-hbe1
11
vulnerability VCID-vnmz-rcby-n3gs
12
vulnerability VCID-xxgu-jjrs-pkaz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.0~rc3%252B%252Bfinal.dfsg1-1
aliases CVE-2007-6718
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tteq-u99e-ayg4
28
url VCID-vnmz-rcby-n3gs
vulnerability_id VCID-vnmz-rcby-n3gs
summary Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-38858
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.19364
published_at 2026-04-02T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.19415
published_at 2026-04-04T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19132
published_at 2026-04-07T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.19212
published_at 2026-04-08T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.19264
published_at 2026-04-09T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.1927
published_at 2026-04-11T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.19224
published_at 2026-04-12T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.19169
published_at 2026-04-13T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.1913
published_at 2026-04-16T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.19139
published_at 2026-04-18T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.19147
published_at 2026-04-21T12:55:00Z
11
value 0.00061
scoring_system epss
scoring_elements 0.19039
published_at 2026-04-24T12:55:00Z
12
value 0.00061
scoring_system epss
scoring_elements 0.19028
published_at 2026-04-26T12:55:00Z
13
value 0.00061
scoring_system epss
scoring_elements 0.18984
published_at 2026-04-29T12:55:00Z
14
value 0.00061
scoring_system epss
scoring_elements 0.18863
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-38858
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38858
2
reference_url https://security.gentoo.org/glsa/202405-05
reference_id GLSA-202405-05
reference_type
scores
url https://security.gentoo.org/glsa/202405-05
3
reference_url https://usn.ubuntu.com/5895-1/
reference_id USN-5895-1
reference_type
scores
url https://usn.ubuntu.com/5895-1/
fixed_packages
0
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1
aliases CVE-2022-38858
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vnmz-rcby-n3gs
29
url VCID-xfdf-djbw-3yht
vulnerability_id VCID-xfdf-djbw-3yht
summary
Two vulnerabilities have been discovered in MPlayer, each one could lead to
    the execution of arbitrary code.
references
0
reference_url http://lists.grok.org.uk/pipermail/full-disclosure/2007-March/052738.html
reference_id
reference_type
scores
url http://lists.grok.org.uk/pipermail/full-disclosure/2007-March/052738.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-1246
reference_id
reference_type
scores
0
value 0.09304
scoring_system epss
scoring_elements 0.92774
published_at 2026-05-05T12:55:00Z
1
value 0.09304
scoring_system epss
scoring_elements 0.92718
published_at 2026-04-01T12:55:00Z
2
value 0.09304
scoring_system epss
scoring_elements 0.92725
published_at 2026-04-02T12:55:00Z
3
value 0.09304
scoring_system epss
scoring_elements 0.9273
published_at 2026-04-04T12:55:00Z
4
value 0.09304
scoring_system epss
scoring_elements 0.92728
published_at 2026-04-07T12:55:00Z
5
value 0.09304
scoring_system epss
scoring_elements 0.92738
published_at 2026-04-08T12:55:00Z
6
value 0.09304
scoring_system epss
scoring_elements 0.92742
published_at 2026-04-09T12:55:00Z
7
value 0.09304
scoring_system epss
scoring_elements 0.92748
published_at 2026-04-11T12:55:00Z
8
value 0.09304
scoring_system epss
scoring_elements 0.92746
published_at 2026-04-13T12:55:00Z
9
value 0.09304
scoring_system epss
scoring_elements 0.92758
published_at 2026-04-18T12:55:00Z
10
value 0.09304
scoring_system epss
scoring_elements 0.92762
published_at 2026-04-21T12:55:00Z
11
value 0.09304
scoring_system epss
scoring_elements 0.92769
published_at 2026-04-26T12:55:00Z
12
value 0.09304
scoring_system epss
scoring_elements 0.92764
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-1246
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1246
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1246
3
reference_url http://secunia.com/advisories/24443
reference_id
reference_type
scores
url http://secunia.com/advisories/24443
4
reference_url http://secunia.com/advisories/24444
reference_id
reference_type
scores
url http://secunia.com/advisories/24444
5
reference_url http://secunia.com/advisories/24446
reference_id
reference_type
scores
url http://secunia.com/advisories/24446
6
reference_url http://secunia.com/advisories/24448
reference_id
reference_type
scores
url http://secunia.com/advisories/24448
7
reference_url http://secunia.com/advisories/24462
reference_id
reference_type
scores
url http://secunia.com/advisories/24462
8
reference_url http://secunia.com/advisories/24866
reference_id
reference_type
scores
url http://secunia.com/advisories/24866
9
reference_url http://secunia.com/advisories/24897
reference_id
reference_type
scores
url http://secunia.com/advisories/24897
10
reference_url http://secunia.com/advisories/24995
reference_id
reference_type
scores
url http://secunia.com/advisories/24995
11
reference_url http://secunia.com/advisories/25462
reference_id
reference_type
scores
url http://secunia.com/advisories/25462
12
reference_url http://secunia.com/advisories/29601
reference_id
reference_type
scores
url http://secunia.com/advisories/29601
13
reference_url http://security.gentoo.org/glsa/glsa-200704-09.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200704-09.xml
14
reference_url http://security.gentoo.org/glsa/glsa-200705-21.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200705-21.xml
15
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/32747
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/32747
16
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.449141
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.449141
17
reference_url http://svn.mplayerhq.hu/mplayer/trunk/loader/dmo/DMO_VideoDecoder.c
reference_id
reference_type
scores
url http://svn.mplayerhq.hu/mplayer/trunk/loader/dmo/DMO_VideoDecoder.c
18
reference_url http://svn.mplayerhq.hu/mplayer/trunk/loader/dmo/DMO_VideoDecoder.c?r1=22019&r2=22204
reference_id
reference_type
scores
url http://svn.mplayerhq.hu/mplayer/trunk/loader/dmo/DMO_VideoDecoder.c?r1=22019&r2=22204
19
reference_url http://www.debian.org/security/2008/dsa-1536
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1536
20
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:055
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:055
21
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:057
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:057
22
reference_url http://www.novell.com/linux/security/advisories/2007_007_suse.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_007_suse.html
23
reference_url http://www.novell.com/linux/security/advisories/2007_5_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_5_sr.html
24
reference_url http://www.securityfocus.com/archive/1/466691/30/6900/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/466691/30/6900/threaded
25
reference_url http://www.securityfocus.com/bid/22771
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/22771
26
reference_url http://www.ubuntu.com/usn/usn-433-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-433-1
27
reference_url http://www.vupen.com/english/advisories/2007/0794
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0794
28
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414075
reference_id 414075
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414075
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-1246
reference_id CVE-2007-1246
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-1246
31
reference_url https://security.gentoo.org/glsa/200704-09
reference_id GLSA-200704-09
reference_type
scores
url https://security.gentoo.org/glsa/200704-09
32
reference_url https://security.gentoo.org/glsa/200705-21
reference_id GLSA-200705-21
reference_type
scores
url https://security.gentoo.org/glsa/200705-21
33
reference_url https://usn.ubuntu.com/433-1/
reference_id USN-433-1
reference_type
scores
url https://usn.ubuntu.com/433-1/
fixed_packages
0
url pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2
purl pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1228-m28x-bkbm
1
vulnerability VCID-4jd9-pt54-1bag
2
vulnerability VCID-8uk8-jxh7-k7aa
3
vulnerability VCID-9tg7-9r5m-dkgn
4
vulnerability VCID-9vx1-3zb9-5bf1
5
vulnerability VCID-e178-xa31-h3c4
6
vulnerability VCID-fjy3-bfzh-7beu
7
vulnerability VCID-fw24-pxsc-7bek
8
vulnerability VCID-g1k8-4mbb-fyew
9
vulnerability VCID-gxnr-jbzt-cffq
10
vulnerability VCID-h9ks-v96k-wkf7
11
vulnerability VCID-j7wp-941h-p3fc
12
vulnerability VCID-m5db-wq6e-gqeu
13
vulnerability VCID-pfcp-7vj5-rqef
14
vulnerability VCID-tff5-wrpr-hbe1
15
vulnerability VCID-tteq-u99e-ayg4
16
vulnerability VCID-vnmz-rcby-n3gs
17
vulnerability VCID-xxgu-jjrs-pkaz
18
vulnerability VCID-ybgy-yct3-6fba
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-17%252Blenny3.2
aliases CVE-2007-1246
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xfdf-djbw-3yht
30
url VCID-xxgu-jjrs-pkaz
vulnerability_id VCID-xxgu-jjrs-pkaz
summary Integer overflow in the demuxer function in libmpdemux/demux_gif.c in Mplayer allows remote attackers to cause a denial of service (crash) via large dimensions in a gif file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4352
reference_id
reference_type
scores
0
value 0.00202
scoring_system epss
scoring_elements 0.42241
published_at 2026-04-01T12:55:00Z
1
value 0.00202
scoring_system epss
scoring_elements 0.42316
published_at 2026-04-02T12:55:00Z
2
value 0.00202
scoring_system epss
scoring_elements 0.42345
published_at 2026-04-04T12:55:00Z
3
value 0.00202
scoring_system epss
scoring_elements 0.42286
published_at 2026-04-07T12:55:00Z
4
value 0.00202
scoring_system epss
scoring_elements 0.42334
published_at 2026-04-08T12:55:00Z
5
value 0.00202
scoring_system epss
scoring_elements 0.42342
published_at 2026-04-09T12:55:00Z
6
value 0.00202
scoring_system epss
scoring_elements 0.42365
published_at 2026-04-11T12:55:00Z
7
value 0.00202
scoring_system epss
scoring_elements 0.42328
published_at 2026-04-12T12:55:00Z
8
value 0.00202
scoring_system epss
scoring_elements 0.423
published_at 2026-04-13T12:55:00Z
9
value 0.00202
scoring_system epss
scoring_elements 0.4235
published_at 2026-04-16T12:55:00Z
10
value 0.00202
scoring_system epss
scoring_elements 0.42326
published_at 2026-04-18T12:55:00Z
11
value 0.00202
scoring_system epss
scoring_elements 0.42253
published_at 2026-04-21T12:55:00Z
12
value 0.00202
scoring_system epss
scoring_elements 0.42185
published_at 2026-04-24T12:55:00Z
13
value 0.00202
scoring_system epss
scoring_elements 0.4218
published_at 2026-04-26T12:55:00Z
14
value 0.00202
scoring_system epss
scoring_elements 0.42098
published_at 2026-04-29T12:55:00Z
15
value 0.00202
scoring_system epss
scoring_elements 0.41956
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4352
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4352
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823723
reference_id 823723
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823723
fixed_packages
0
url pkg:deb/debian/mplayer@2:1.3.0-6
purl pkg:deb/debian/mplayer@2:1.3.0-6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4jd9-pt54-1bag
1
vulnerability VCID-8uk8-jxh7-k7aa
2
vulnerability VCID-9tg7-9r5m-dkgn
3
vulnerability VCID-9vx1-3zb9-5bf1
4
vulnerability VCID-e178-xa31-h3c4
5
vulnerability VCID-g1k8-4mbb-fyew
6
vulnerability VCID-m5db-wq6e-gqeu
7
vulnerability VCID-pfcp-7vj5-rqef
8
vulnerability VCID-tff5-wrpr-hbe1
9
vulnerability VCID-vnmz-rcby-n3gs
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.3.0-6
aliases CVE-2016-4352
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xxgu-jjrs-pkaz
31
url VCID-ybgy-yct3-6fba
vulnerability_id VCID-ybgy-yct3-6fba
summary
Multiple vulnerabilities have been found in MPlayer and the bundled
    FFmpeg, the worst of which may lead to the execution of arbitrary code.
references
0
reference_url http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=dc74600c97eb834c08674676e209afa842053aca
reference_id
reference_type
scores
url http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=dc74600c97eb834c08674676e209afa842053aca
1
reference_url http://openwall.com/lists/oss-security/2010/06/04/4
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/06/04/4
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2062
reference_id
reference_type
scores
0
value 0.02991
scoring_system epss
scoring_elements 0.86607
published_at 2026-05-05T12:55:00Z
1
value 0.02991
scoring_system epss
scoring_elements 0.86483
published_at 2026-04-01T12:55:00Z
2
value 0.02991
scoring_system epss
scoring_elements 0.86493
published_at 2026-04-02T12:55:00Z
3
value 0.02991
scoring_system epss
scoring_elements 0.86512
published_at 2026-04-04T12:55:00Z
4
value 0.02991
scoring_system epss
scoring_elements 0.86511
published_at 2026-04-07T12:55:00Z
5
value 0.02991
scoring_system epss
scoring_elements 0.86531
published_at 2026-04-08T12:55:00Z
6
value 0.02991
scoring_system epss
scoring_elements 0.86541
published_at 2026-04-09T12:55:00Z
7
value 0.02991
scoring_system epss
scoring_elements 0.86556
published_at 2026-04-11T12:55:00Z
8
value 0.02991
scoring_system epss
scoring_elements 0.86552
published_at 2026-04-12T12:55:00Z
9
value 0.02991
scoring_system epss
scoring_elements 0.86547
published_at 2026-04-13T12:55:00Z
10
value 0.02991
scoring_system epss
scoring_elements 0.86561
published_at 2026-04-16T12:55:00Z
11
value 0.02991
scoring_system epss
scoring_elements 0.86567
published_at 2026-04-18T12:55:00Z
12
value 0.02991
scoring_system epss
scoring_elements 0.8656
published_at 2026-04-21T12:55:00Z
13
value 0.02991
scoring_system epss
scoring_elements 0.86578
published_at 2026-04-24T12:55:00Z
14
value 0.02991
scoring_system epss
scoring_elements 0.86587
published_at 2026-04-26T12:55:00Z
15
value 0.02991
scoring_system epss
scoring_elements 0.86586
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2062
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2062
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2062
4
reference_url https://dzcore.wordpress.com/2009/07/27/dzc-2009-001-the-movie-player-and-vlc-media-player-real-data-transport-parsing-integer-underflow/
reference_id
reference_type
scores
url https://dzcore.wordpress.com/2009/07/27/dzc-2009-001-the-movie-player-and-vlc-media-player-real-data-transport-parsing-integer-underflow/
5
reference_url http://seclists.org/fulldisclosure/2009/Jul/418
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2009/Jul/418
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=581245
reference_id 581245
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=581245
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1337:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.1337:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1337:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2062
reference_id CVE-2010-2062
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2062
47
reference_url https://security.gentoo.org/glsa/201310-13
reference_id GLSA-201310-13
reference_type
scores
url https://security.gentoo.org/glsa/201310-13
48
reference_url https://security.gentoo.org/glsa/201411-01
reference_id GLSA-201411-01
reference_type
scores
url https://security.gentoo.org/glsa/201411-01
fixed_packages
0
url pkg:deb/debian/mplayer@2:1.0~rc3%2B%2Bfinal.dfsg1-1
purl pkg:deb/debian/mplayer@2:1.0~rc3%2B%2Bfinal.dfsg1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4jd9-pt54-1bag
1
vulnerability VCID-8uk8-jxh7-k7aa
2
vulnerability VCID-9tg7-9r5m-dkgn
3
vulnerability VCID-9vx1-3zb9-5bf1
4
vulnerability VCID-e178-xa31-h3c4
5
vulnerability VCID-fjy3-bfzh-7beu
6
vulnerability VCID-g1k8-4mbb-fyew
7
vulnerability VCID-h9ks-v96k-wkf7
8
vulnerability VCID-m5db-wq6e-gqeu
9
vulnerability VCID-pfcp-7vj5-rqef
10
vulnerability VCID-tff5-wrpr-hbe1
11
vulnerability VCID-vnmz-rcby-n3gs
12
vulnerability VCID-xxgu-jjrs-pkaz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.0~rc3%252B%252Bfinal.dfsg1-1
aliases CVE-2010-2062
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ybgy-yct3-6fba
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc1-12etch