{"url":"http://public2.vulnerablecode.io/api/packages/1035194?format=json","purl":"pkg:deb/debian/mplayer@1.0~rc1-12etch","type":"deb","namespace":"debian","name":"mplayer","version":"1.0~rc1-12etch","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"2:1.5+svn38408-1","latest_non_vulnerable_version":"2:1.5+svn38408-1","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34979?format=json","vulnerability_id":"VCID-1228-m28x-bkbm","summary":"Multiple vulnerabilities have been found in MPlayer and the bundled\n    FFmpeg, the worst of which may lead to the execution of arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-4610","reference_id":"","reference_type":"","scores":[{"value":"0.04522","scoring_system":"epss","scoring_elements":"0.89204","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04522","scoring_system":"epss","scoring_elements":"0.89109","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04522","scoring_system":"epss","scoring_elements":"0.89117","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04522","scoring_system":"epss","scoring_elements":"0.89131","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04522","scoring_system":"epss","scoring_elements":"0.89134","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04522","scoring_system":"epss","scoring_elements":"0.89152","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04522","scoring_system":"epss","scoring_elements":"0.89157","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04522","scoring_system":"epss","scoring_elements":"0.89167","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04522","scoring_system":"epss","scoring_elements":"0.89163","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04522","scoring_system":"epss","scoring_elements":"0.8916","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04522","scoring_system":"epss","scoring_elements":"0.89173","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04522","scoring_system":"epss","scoring_elements":"0.89171","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04522","scoring_system":"epss","scoring_elements":"0.89187","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04522","scoring_system":"epss","scoring_elements":"0.89192","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04522","scoring_system":"epss","scoring_elements":"0.89196","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-4610"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4610","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4610"},{"reference_url":"http://secunia.com/advisories/34296","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34296"},{"reference_url":"http://www.openwall.com/lists/oss-security/2008/10/07/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2008/10/07/1"},{"reference_url":"http://www.ubuntu.com/usn/USN-734-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-734-1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=407010","reference_id":"407010","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=407010"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-4610","reference_id":"CVE-2008-4610","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-4610"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/32856.txt","reference_id":"CVE-2008-4610;OSVDB-49423","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/32856.txt"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/32857.txt","reference_id":"CVE-2008-4610;OSVDB-49424","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/32857.txt"},{"reference_url":"https://www.securityfocus.com/bid/34136/info","reference_id":"CVE-2008-4610;OSVDB-49424","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/34136/info"},{"reference_url":"https://security.gentoo.org/glsa/201310-13","reference_id":"GLSA-201310-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-13"},{"reference_url":"https://usn.ubuntu.com/734-1/","reference_id":"USN-734-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/734-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035197?format=json","purl":"pkg:deb/debian/mplayer@2:1.0~rc3%2B%2Bfinal.dfsg1-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4jd9-pt54-1bag"},{"vulnerability":"VCID-8uk8-jxh7-k7aa"},{"vulnerability":"VCID-9tg7-9r5m-dkgn"},{"vulnerability":"VCID-9vx1-3zb9-5bf1"},{"vulnerability":"VCID-e178-xa31-h3c4"},{"vulnerability":"VCID-fjy3-bfzh-7beu"},{"vulnerability":"VCID-g1k8-4mbb-fyew"},{"vulnerability":"VCID-h9ks-v96k-wkf7"},{"vulnerability":"VCID-m5db-wq6e-gqeu"},{"vulnerability":"VCID-pfcp-7vj5-rqef"},{"vulnerability":"VCID-tff5-wrpr-hbe1"},{"vulnerability":"VCID-vnmz-rcby-n3gs"},{"vulnerability":"VCID-xxgu-jjrs-pkaz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.0~rc3%252B%252Bfinal.dfsg1-1"}],"aliases":["CVE-2008-4610"],"risk_score":9.0,"exploitability":"2.0","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1228-m28x-bkbm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40187?format=json","vulnerability_id":"VCID-1dp9-jbnu-abcm","summary":"Multiple vulnerabilities in FFmpeg may lead to the remote execution of\n    arbitrary code or a Denial of Service.","references":[{"reference_url":"http://archives.neohapsis.com/archives/fulldisclosure/2008-09/0103.html","reference_id":"","reference_type":"","scores":[],"url":"http://archives.neohapsis.com/archives/fulldisclosure/2008-09/0103.html"},{"reference_url":"http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2008-August/016352.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2008-August/016352.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-4867","reference_id":"","reference_type":"","scores":[{"value":"0.02422","scoring_system":"epss","scoring_elements":"0.85197","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02422","scoring_system":"epss","scoring_elements":"0.8506","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02422","scoring_system":"epss","scoring_elements":"0.85073","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02422","scoring_system":"epss","scoring_elements":"0.85091","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02422","scoring_system":"epss","scoring_elements":"0.85095","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02422","scoring_system":"epss","scoring_elements":"0.85116","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02422","scoring_system":"epss","scoring_elements":"0.85124","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02422","scoring_system":"epss","scoring_elements":"0.85138","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02422","scoring_system":"epss","scoring_elements":"0.85136","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02422","scoring_system":"epss","scoring_elements":"0.85132","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02422","scoring_system":"epss","scoring_elements":"0.85154","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02422","scoring_system":"epss","scoring_elements":"0.85157","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02422","scoring_system":"epss","scoring_elements":"0.85155","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02422","scoring_system":"epss","scoring_elements":"0.85178","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02422","scoring_system":"epss","scoring_elements":"0.85187","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02422","scoring_system":"epss","scoring_elements":"0.85184","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-4867"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4867"},{"reference_url":"http://secunia.com/advisories/34296","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34296"},{"reference_url":"http://secunia.com/advisories/34385","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34385"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200903-33.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200903-33.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/46324","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/46324"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:013","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:013"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:014","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:014"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:015","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:015"},{"reference_url":"http://www.openwall.com/lists/oss-security/2008/10/29/6","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2008/10/29/6"},{"reference_url":"http://www.securityfocus.com/bid/33308","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/33308"},{"reference_url":"http://www.ubuntu.com/usn/USN-734-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-734-1"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-4867","reference_id":"CVE-2008-4867","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-4867"},{"reference_url":"https://security.gentoo.org/glsa/200903-33","reference_id":"GLSA-200903-33","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200903-33"},{"reference_url":"https://usn.ubuntu.com/734-1/","reference_id":"USN-734-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/734-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035196?format=json","purl":"pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1228-m28x-bkbm"},{"vulnerability":"VCID-4jd9-pt54-1bag"},{"vulnerability":"VCID-8uk8-jxh7-k7aa"},{"vulnerability":"VCID-9tg7-9r5m-dkgn"},{"vulnerability":"VCID-9vx1-3zb9-5bf1"},{"vulnerability":"VCID-e178-xa31-h3c4"},{"vulnerability":"VCID-fjy3-bfzh-7beu"},{"vulnerability":"VCID-fw24-pxsc-7bek"},{"vulnerability":"VCID-g1k8-4mbb-fyew"},{"vulnerability":"VCID-gxnr-jbzt-cffq"},{"vulnerability":"VCID-h9ks-v96k-wkf7"},{"vulnerability":"VCID-j7wp-941h-p3fc"},{"vulnerability":"VCID-m5db-wq6e-gqeu"},{"vulnerability":"VCID-pfcp-7vj5-rqef"},{"vulnerability":"VCID-tff5-wrpr-hbe1"},{"vulnerability":"VCID-tteq-u99e-ayg4"},{"vulnerability":"VCID-vnmz-rcby-n3gs"},{"vulnerability":"VCID-xxgu-jjrs-pkaz"},{"vulnerability":"VCID-ybgy-yct3-6fba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-17%252Blenny3.2"}],"aliases":["CVE-2008-4867"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1dp9-jbnu-abcm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58563?format=json","vulnerability_id":"VCID-2ddg-c99t-9ye1","summary":"Multiple vulnerabilities have been discovered in MPlayer, possibly allowing\n    for the remote execution of arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0629","reference_id":"","reference_type":"","scores":[{"value":"0.02652","scoring_system":"epss","scoring_elements":"0.85688","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02652","scoring_system":"epss","scoring_elements":"0.85701","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02652","scoring_system":"epss","scoring_elements":"0.85719","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02652","scoring_system":"epss","scoring_elements":"0.85725","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02652","scoring_system":"epss","scoring_elements":"0.85744","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02652","scoring_system":"epss","scoring_elements":"0.85755","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02652","scoring_system":"epss","scoring_elements":"0.8577","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02652","scoring_system":"epss","scoring_elements":"0.85767","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02652","scoring_system":"epss","scoring_elements":"0.85763","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02652","scoring_system":"epss","scoring_elements":"0.85781","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02652","scoring_system":"epss","scoring_elements":"0.85786","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02652","scoring_system":"epss","scoring_elements":"0.8578","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02827","scoring_system":"epss","scoring_elements":"0.86206","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02827","scoring_system":"epss","scoring_elements":"0.86215","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02827","scoring_system":"epss","scoring_elements":"0.86234","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0629"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464533","reference_id":"464533","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464533"},{"reference_url":"https://security.gentoo.org/glsa/200803-16","reference_id":"GLSA-200803-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200803-16"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035196?format=json","purl":"pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1228-m28x-bkbm"},{"vulnerability":"VCID-4jd9-pt54-1bag"},{"vulnerability":"VCID-8uk8-jxh7-k7aa"},{"vulnerability":"VCID-9tg7-9r5m-dkgn"},{"vulnerability":"VCID-9vx1-3zb9-5bf1"},{"vulnerability":"VCID-e178-xa31-h3c4"},{"vulnerability":"VCID-fjy3-bfzh-7beu"},{"vulnerability":"VCID-fw24-pxsc-7bek"},{"vulnerability":"VCID-g1k8-4mbb-fyew"},{"vulnerability":"VCID-gxnr-jbzt-cffq"},{"vulnerability":"VCID-h9ks-v96k-wkf7"},{"vulnerability":"VCID-j7wp-941h-p3fc"},{"vulnerability":"VCID-m5db-wq6e-gqeu"},{"vulnerability":"VCID-pfcp-7vj5-rqef"},{"vulnerability":"VCID-tff5-wrpr-hbe1"},{"vulnerability":"VCID-tteq-u99e-ayg4"},{"vulnerability":"VCID-vnmz-rcby-n3gs"},{"vulnerability":"VCID-xxgu-jjrs-pkaz"},{"vulnerability":"VCID-ybgy-yct3-6fba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-17%252Blenny3.2"}],"aliases":["CVE-2008-0629"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2ddg-c99t-9ye1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46599?format=json","vulnerability_id":"VCID-38xc-8rtk-qfes","summary":"Multiple vulnerabilities have been discovered in MPlayer, possibly allowing\n    for the remote execution of arbitrary code.","references":[{"reference_url":"http://lists.mplayerhq.hu/pipermail/mplayer-announce/2007-June/000066.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.mplayerhq.hu/pipermail/mplayer-announce/2007-June/000066.html"},{"reference_url":"http://osvdb.org/36991","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/36991"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2948","reference_id":"","reference_type":"","scores":[{"value":"0.13236","scoring_system":"epss","scoring_elements":"0.94176","published_at":"2026-05-05T12:55:00Z"},{"value":"0.13236","scoring_system":"epss","scoring_elements":"0.94104","published_at":"2026-04-01T12:55:00Z"},{"value":"0.13236","scoring_system":"epss","scoring_elements":"0.94113","published_at":"2026-04-02T12:55:00Z"},{"value":"0.13236","scoring_system":"epss","scoring_elements":"0.94125","published_at":"2026-04-04T12:55:00Z"},{"value":"0.13236","scoring_system":"epss","scoring_elements":"0.94129","published_at":"2026-04-07T12:55:00Z"},{"value":"0.13236","scoring_system":"epss","scoring_elements":"0.94138","published_at":"2026-04-08T12:55:00Z"},{"value":"0.13236","scoring_system":"epss","scoring_elements":"0.94142","published_at":"2026-04-09T12:55:00Z"},{"value":"0.13236","scoring_system":"epss","scoring_elements":"0.94147","published_at":"2026-04-13T12:55:00Z"},{"value":"0.13236","scoring_system":"epss","scoring_elements":"0.94163","published_at":"2026-04-16T12:55:00Z"},{"value":"0.13236","scoring_system":"epss","scoring_elements":"0.94168","published_at":"2026-04-18T12:55:00Z"},{"value":"0.13236","scoring_system":"epss","scoring_elements":"0.94167","published_at":"2026-04-21T12:55:00Z"},{"value":"0.13236","scoring_system":"epss","scoring_elements":"0.94169","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2948"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2948","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2948"},{"reference_url":"http://secunia.com/advisories/24302","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24302"},{"reference_url":"http://secunia.com/advisories/25713","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25713"},{"reference_url":"http://secunia.com/advisories/25940","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25940"},{"reference_url":"http://secunia.com/advisories/26083","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26083"},{"reference_url":"http://secunia.com/advisories/26207","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26207"},{"reference_url":"http://secunia.com/secunia_research/2007-55/","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/secunia_research/2007-55/"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200707-07.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200707-07.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34749","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34749"},{"reference_url":"http://svn.mplayerhq.hu/mplayer/trunk/stream/stream_cddb.c?r1=23287&r2=23470&diff_format=u","reference_id":"","reference_type":"","scores":[],"url":"http://svn.mplayerhq.hu/mplayer/trunk/stream/stream_cddb.c?r1=23287&r2=23470&diff_format=u"},{"reference_url":"http://www.debian.org/security/2007/dsa-1313","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2007/dsa-1313"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:143","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:143"},{"reference_url":"http://www.mplayerhq.hu/design7/news.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mplayerhq.hu/design7/news.html"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_14_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_14_sr.html"},{"reference_url":"http://www.securityfocus.com/bid/24339","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/24339"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2080","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2080"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_rc1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_rc1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_rc1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2948","reference_id":"CVE-2007-2948","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2948"},{"reference_url":"https://security.gentoo.org/glsa/200707-07","reference_id":"GLSA-200707-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200707-07"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035196?format=json","purl":"pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1228-m28x-bkbm"},{"vulnerability":"VCID-4jd9-pt54-1bag"},{"vulnerability":"VCID-8uk8-jxh7-k7aa"},{"vulnerability":"VCID-9tg7-9r5m-dkgn"},{"vulnerability":"VCID-9vx1-3zb9-5bf1"},{"vulnerability":"VCID-e178-xa31-h3c4"},{"vulnerability":"VCID-fjy3-bfzh-7beu"},{"vulnerability":"VCID-fw24-pxsc-7bek"},{"vulnerability":"VCID-g1k8-4mbb-fyew"},{"vulnerability":"VCID-gxnr-jbzt-cffq"},{"vulnerability":"VCID-h9ks-v96k-wkf7"},{"vulnerability":"VCID-j7wp-941h-p3fc"},{"vulnerability":"VCID-m5db-wq6e-gqeu"},{"vulnerability":"VCID-pfcp-7vj5-rqef"},{"vulnerability":"VCID-tff5-wrpr-hbe1"},{"vulnerability":"VCID-tteq-u99e-ayg4"},{"vulnerability":"VCID-vnmz-rcby-n3gs"},{"vulnerability":"VCID-xxgu-jjrs-pkaz"},{"vulnerability":"VCID-ybgy-yct3-6fba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-17%252Blenny3.2"}],"aliases":["CVE-2007-2948"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-38xc-8rtk-qfes"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49465?format=json","vulnerability_id":"VCID-4jd9-pt54-1bag","summary":"Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38851","reference_id":"","reference_type":"","scores":[{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18492","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18546","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18254","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18337","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1839","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18342","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1829","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18234","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18246","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18273","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18172","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18155","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18119","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1798","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38851"},{"reference_url":"https://security.gentoo.org/glsa/202405-05","reference_id":"GLSA-202405-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-05"},{"reference_url":"https://usn.ubuntu.com/5895-1/","reference_id":"USN-5895-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5895-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995157?format=json","purl":"pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4f83-6dmk-rybu"},{"vulnerability":"VCID-kyv5-fhuz-n7f1"},{"vulnerability":"VCID-z3dv-rb28-kycj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1"}],"aliases":["CVE-2022-38851"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4jd9-pt54-1bag"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49473?format=json","vulnerability_id":"VCID-8uk8-jxh7-k7aa","summary":"Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38863","reference_id":"","reference_type":"","scores":[{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19364","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19415","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19132","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19212","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19264","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.1927","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19224","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19169","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.1913","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19139","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19147","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19039","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19028","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18984","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18863","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38863"},{"reference_url":"https://security.gentoo.org/glsa/202405-05","reference_id":"GLSA-202405-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-05"},{"reference_url":"https://usn.ubuntu.com/5895-1/","reference_id":"USN-5895-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5895-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995157?format=json","purl":"pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4f83-6dmk-rybu"},{"vulnerability":"VCID-kyv5-fhuz-n7f1"},{"vulnerability":"VCID-z3dv-rb28-kycj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1"}],"aliases":["CVE-2022-38863"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8uk8-jxh7-k7aa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49471?format=json","vulnerability_id":"VCID-9tg7-9r5m-dkgn","summary":"Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38861","reference_id":"","reference_type":"","scores":[{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21284","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21337","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.2109","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.2117","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.2123","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21241","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21199","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21147","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.2114","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.2115","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21127","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.20998","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21003","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.20974","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.20872","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38861"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021013","reference_id":"1021013","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021013"},{"reference_url":"https://security.gentoo.org/glsa/202405-05","reference_id":"GLSA-202405-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-05"},{"reference_url":"https://usn.ubuntu.com/5895-1/","reference_id":"USN-5895-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5895-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995157?format=json","purl":"pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4f83-6dmk-rybu"},{"vulnerability":"VCID-kyv5-fhuz-n7f1"},{"vulnerability":"VCID-z3dv-rb28-kycj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1"}],"aliases":["CVE-2022-38861"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9tg7-9r5m-dkgn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49476?format=json","vulnerability_id":"VCID-9vx1-3zb9-5bf1","summary":"Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38866","reference_id":"","reference_type":"","scores":[{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20954","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.21012","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20729","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20807","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20868","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20883","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2084","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20788","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20778","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2077","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20756","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20638","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20634","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.206","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20494","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38866"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38866","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38866"},{"reference_url":"https://security.gentoo.org/glsa/202405-05","reference_id":"GLSA-202405-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-05"},{"reference_url":"https://usn.ubuntu.com/5895-1/","reference_id":"USN-5895-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5895-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995157?format=json","purl":"pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4f83-6dmk-rybu"},{"vulnerability":"VCID-kyv5-fhuz-n7f1"},{"vulnerability":"VCID-z3dv-rb28-kycj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1"}],"aliases":["CVE-2022-38866"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9vx1-3zb9-5bf1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40197?format=json","vulnerability_id":"VCID-bv1x-tr6m-qke1","summary":"Multiple vulnerabilities in FFmpeg may lead to the remote execution of\n    arbitrary code or a Denial of Service.","references":[{"reference_url":"http://archives.neohapsis.com/archives/fulldisclosure/2008-09/0103.html","reference_id":"","reference_type":"","scores":[],"url":"http://archives.neohapsis.com/archives/fulldisclosure/2008-09/0103.html"},{"reference_url":"http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2008-August/016136.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2008-August/016136.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-4868","reference_id":"","reference_type":"","scores":[{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72707","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72577","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72584","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72601","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72616","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72628","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72651","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72634","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72624","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72666","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72676","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72668","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72709","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72719","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72715","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-4868"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4868","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4868"},{"reference_url":"http://secunia.com/advisories/34385","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34385"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200903-33.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200903-33.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/46325","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/46325"},{"reference_url":"http://www.openwall.com/lists/oss-security/2008/10/29/6","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2008/10/29/6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-4868","reference_id":"CVE-2008-4868","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-4868"},{"reference_url":"https://security.gentoo.org/glsa/200903-33","reference_id":"GLSA-200903-33","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200903-33"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035196?format=json","purl":"pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1228-m28x-bkbm"},{"vulnerability":"VCID-4jd9-pt54-1bag"},{"vulnerability":"VCID-8uk8-jxh7-k7aa"},{"vulnerability":"VCID-9tg7-9r5m-dkgn"},{"vulnerability":"VCID-9vx1-3zb9-5bf1"},{"vulnerability":"VCID-e178-xa31-h3c4"},{"vulnerability":"VCID-fjy3-bfzh-7beu"},{"vulnerability":"VCID-fw24-pxsc-7bek"},{"vulnerability":"VCID-g1k8-4mbb-fyew"},{"vulnerability":"VCID-gxnr-jbzt-cffq"},{"vulnerability":"VCID-h9ks-v96k-wkf7"},{"vulnerability":"VCID-j7wp-941h-p3fc"},{"vulnerability":"VCID-m5db-wq6e-gqeu"},{"vulnerability":"VCID-pfcp-7vj5-rqef"},{"vulnerability":"VCID-tff5-wrpr-hbe1"},{"vulnerability":"VCID-tteq-u99e-ayg4"},{"vulnerability":"VCID-vnmz-rcby-n3gs"},{"vulnerability":"VCID-xxgu-jjrs-pkaz"},{"vulnerability":"VCID-ybgy-yct3-6fba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-17%252Blenny3.2"}],"aliases":["CVE-2008-4868"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bv1x-tr6m-qke1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49464?format=json","vulnerability_id":"VCID-e178-xa31-h3c4","summary":"Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38850","reference_id":"","reference_type":"","scores":[{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12332","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12379","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.1218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.1226","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.1231","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12318","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12282","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12245","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12134","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12136","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12246","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12226","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12191","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12081","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.11994","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38850"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38850","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38850"},{"reference_url":"https://security.gentoo.org/glsa/202405-05","reference_id":"GLSA-202405-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-05"},{"reference_url":"https://usn.ubuntu.com/5895-1/","reference_id":"USN-5895-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5895-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995157?format=json","purl":"pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4f83-6dmk-rybu"},{"vulnerability":"VCID-kyv5-fhuz-n7f1"},{"vulnerability":"VCID-z3dv-rb28-kycj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1"}],"aliases":["CVE-2022-38850"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e178-xa31-h3c4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34981?format=json","vulnerability_id":"VCID-fjy3-bfzh-7beu","summary":"Multiple vulnerabilities have been found in MPlayer and the bundled\n    FFmpeg, the worst of which may lead to the execution of arbitrary code.","references":[{"reference_url":"http://git.mplayer2.org/mplayer2/commit/?id=27b88a09c5319deb62221b8cd0ecc14cd1136e4a","reference_id":"","reference_type":"","scores":[],"url":"http://git.mplayer2.org/mplayer2/commit/?id=27b88a09c5319deb62221b8cd0ecc14cd1136e4a"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3625","reference_id":"","reference_type":"","scores":[{"value":"0.68101","scoring_system":"epss","scoring_elements":"0.98612","published_at":"2026-05-05T12:55:00Z"},{"value":"0.68101","scoring_system":"epss","scoring_elements":"0.98582","published_at":"2026-04-01T12:55:00Z"},{"value":"0.68101","scoring_system":"epss","scoring_elements":"0.98584","published_at":"2026-04-02T12:55:00Z"},{"value":"0.68101","scoring_system":"epss","scoring_elements":"0.98587","published_at":"2026-04-04T12:55:00Z"},{"value":"0.68101","scoring_system":"epss","scoring_elements":"0.98589","published_at":"2026-04-07T12:55:00Z"},{"value":"0.68101","scoring_system":"epss","scoring_elements":"0.98591","published_at":"2026-04-08T12:55:00Z"},{"value":"0.68101","scoring_system":"epss","scoring_elements":"0.98592","published_at":"2026-04-09T12:55:00Z"},{"value":"0.68101","scoring_system":"epss","scoring_elements":"0.98595","published_at":"2026-04-12T12:55:00Z"},{"value":"0.68101","scoring_system":"epss","scoring_elements":"0.98597","published_at":"2026-04-13T12:55:00Z"},{"value":"0.68101","scoring_system":"epss","scoring_elements":"0.98602","published_at":"2026-04-21T12:55:00Z"},{"value":"0.68101","scoring_system":"epss","scoring_elements":"0.98603","published_at":"2026-04-18T12:55:00Z"},{"value":"0.68101","scoring_system":"epss","scoring_elements":"0.98606","published_at":"2026-04-24T12:55:00Z"},{"value":"0.68101","scoring_system":"epss","scoring_elements":"0.98607","published_at":"2026-04-26T12:55:00Z"},{"value":"0.68101","scoring_system":"epss","scoring_elements":"0.98608","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3625"},{"reference_url":"http://secunia.com/advisories/55486","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/55486"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201310-13.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201310-13.xml"},{"reference_url":"https://labs.mwrinfosecurity.com/system/assets/149/original/mwri_mplayer-sami-subtitles_2011-08-12.pdf","reference_id":"","reference_type":"","scores":[],"url":"https://labs.mwrinfosecurity.com/system/assets/149/original/mwri_mplayer-sami-subtitles_2011-08-12.pdf"},{"reference_url":"http://www.openwall.com/lists/oss-security/2011/10/18/12","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2011/10/18/12"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=645987","reference_id":"645987","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=645987"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer2:mplayer2:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer2:mplayer2:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer2:mplayer2:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ricardo_villalba:smplayer:0.6.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ricardo_villalba:smplayer:0.6.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ricardo_villalba:smplayer:0.6.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-3625","reference_id":"CVE-2011-3625","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-3625"},{"reference_url":"https://security.gentoo.org/glsa/201310-13","reference_id":"GLSA-201310-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-13"},{"reference_url":"http://labs.mwrinfosecurity.com/files/Advisories/mwri_mplayer-sami-subtitles_2011-08-12.pdf","reference_id":"OSVDB-74604;CVE-2011-3625","reference_type":"exploit","scores":[],"url":"http://labs.mwrinfosecurity.com/files/Advisories/mwri_mplayer-sami-subtitles_2011-08-12.pdf"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/18954.rb","reference_id":"OSVDB-74604;CVE-2011-3625","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/18954.rb"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035198?format=json","purl":"pkg:deb/debian/mplayer@2:1.0~rc4.dfsg1%2Bsvn34540-1%2Bdeb7u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4jd9-pt54-1bag"},{"vulnerability":"VCID-8uk8-jxh7-k7aa"},{"vulnerability":"VCID-9tg7-9r5m-dkgn"},{"vulnerability":"VCID-9vx1-3zb9-5bf1"},{"vulnerability":"VCID-e178-xa31-h3c4"},{"vulnerability":"VCID-g1k8-4mbb-fyew"},{"vulnerability":"VCID-h9ks-v96k-wkf7"},{"vulnerability":"VCID-m5db-wq6e-gqeu"},{"vulnerability":"VCID-pfcp-7vj5-rqef"},{"vulnerability":"VCID-tff5-wrpr-hbe1"},{"vulnerability":"VCID-vnmz-rcby-n3gs"},{"vulnerability":"VCID-xxgu-jjrs-pkaz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.0~rc4.dfsg1%252Bsvn34540-1%252Bdeb7u1"}],"aliases":["CVE-2011-3625"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fjy3-bfzh-7beu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60430?format=json","vulnerability_id":"VCID-fw24-pxsc-7bek","summary":"Multiple vulnerabilities in MPlayer may lead to the execution of arbitrary\n    code or a Denial of Service.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5616","reference_id":"","reference_type":"","scores":[{"value":"0.25394","scoring_system":"epss","scoring_elements":"0.96238","published_at":"2026-05-05T12:55:00Z"},{"value":"0.25394","scoring_system":"epss","scoring_elements":"0.96173","published_at":"2026-04-01T12:55:00Z"},{"value":"0.25394","scoring_system":"epss","scoring_elements":"0.9618","published_at":"2026-04-02T12:55:00Z"},{"value":"0.25394","scoring_system":"epss","scoring_elements":"0.96188","published_at":"2026-04-04T12:55:00Z"},{"value":"0.25394","scoring_system":"epss","scoring_elements":"0.96191","published_at":"2026-04-07T12:55:00Z"},{"value":"0.25394","scoring_system":"epss","scoring_elements":"0.96201","published_at":"2026-04-08T12:55:00Z"},{"value":"0.25394","scoring_system":"epss","scoring_elements":"0.96204","published_at":"2026-04-09T12:55:00Z"},{"value":"0.25394","scoring_system":"epss","scoring_elements":"0.96209","published_at":"2026-04-11T12:55:00Z"},{"value":"0.25394","scoring_system":"epss","scoring_elements":"0.96208","published_at":"2026-04-12T12:55:00Z"},{"value":"0.25394","scoring_system":"epss","scoring_elements":"0.9621","published_at":"2026-04-13T12:55:00Z"},{"value":"0.25394","scoring_system":"epss","scoring_elements":"0.96218","published_at":"2026-04-16T12:55:00Z"},{"value":"0.25394","scoring_system":"epss","scoring_elements":"0.96223","published_at":"2026-04-21T12:55:00Z"},{"value":"0.25394","scoring_system":"epss","scoring_elements":"0.96225","published_at":"2026-04-24T12:55:00Z"},{"value":"0.25394","scoring_system":"epss","scoring_elements":"0.96226","published_at":"2026-04-26T12:55:00Z"},{"value":"0.25394","scoring_system":"epss","scoring_elements":"0.96227","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5616"},{"reference_url":"http://secunia.com/advisories/33136","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33136"},{"reference_url":"http://secunia.com/advisories/34845","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34845"},{"reference_url":"http://svn.mplayerhq.hu/mplayer/branches/1.0rc2/libmpdemux/demux_vqf.c?r1=24723&r2=28150&pathrev=28150","reference_id":"","reference_type":"","scores":[],"url":"http://svn.mplayerhq.hu/mplayer/branches/1.0rc2/libmpdemux/demux_vqf.c?r1=24723&r2=28150&pathrev=28150"},{"reference_url":"http://svn.mplayerhq.hu/mplayer/branches/1.0rc2/libmpdemux/demux_vqf.c?view=log&pathrev=28150#rev28150","reference_id":"","reference_type":"","scores":[],"url":"http://svn.mplayerhq.hu/mplayer/branches/1.0rc2/libmpdemux/demux_vqf.c?view=log&pathrev=28150#rev28150"},{"reference_url":"http://trapkit.de/advisories/TKADV2008-014.txt","reference_id":"","reference_type":"","scores":[],"url":"http://trapkit.de/advisories/TKADV2008-014.txt"},{"reference_url":"http://www.debian.org/security/2009/dsa-1782","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1782"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:013","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:013"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:014","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:014"},{"reference_url":"http://www.securityfocus.com/archive/1/499214/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/499214/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/32822","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/32822"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=508803","reference_id":"508803","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=508803"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5616","reference_id":"CVE-2008-5616","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5616"},{"reference_url":"https://security.gentoo.org/glsa/200901-07","reference_id":"GLSA-200901-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200901-07"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035197?format=json","purl":"pkg:deb/debian/mplayer@2:1.0~rc3%2B%2Bfinal.dfsg1-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4jd9-pt54-1bag"},{"vulnerability":"VCID-8uk8-jxh7-k7aa"},{"vulnerability":"VCID-9tg7-9r5m-dkgn"},{"vulnerability":"VCID-9vx1-3zb9-5bf1"},{"vulnerability":"VCID-e178-xa31-h3c4"},{"vulnerability":"VCID-fjy3-bfzh-7beu"},{"vulnerability":"VCID-g1k8-4mbb-fyew"},{"vulnerability":"VCID-h9ks-v96k-wkf7"},{"vulnerability":"VCID-m5db-wq6e-gqeu"},{"vulnerability":"VCID-pfcp-7vj5-rqef"},{"vulnerability":"VCID-tff5-wrpr-hbe1"},{"vulnerability":"VCID-vnmz-rcby-n3gs"},{"vulnerability":"VCID-xxgu-jjrs-pkaz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.0~rc3%252B%252Bfinal.dfsg1-1"}],"aliases":["CVE-2008-5616"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fw24-pxsc-7bek"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49475?format=json","vulnerability_id":"VCID-g1k8-4mbb-fyew","summary":"Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38865","reference_id":"","reference_type":"","scores":[{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18492","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18546","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18254","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18337","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1839","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18342","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1829","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18234","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18246","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18273","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18172","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18155","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18119","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1798","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38865"},{"reference_url":"https://security.gentoo.org/glsa/202405-05","reference_id":"GLSA-202405-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-05"},{"reference_url":"https://usn.ubuntu.com/5895-1/","reference_id":"USN-5895-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5895-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995157?format=json","purl":"pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4f83-6dmk-rybu"},{"vulnerability":"VCID-kyv5-fhuz-n7f1"},{"vulnerability":"VCID-z3dv-rb28-kycj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1"}],"aliases":["CVE-2022-38865"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g1k8-4mbb-fyew"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58564?format=json","vulnerability_id":"VCID-gaa2-bekm-6bbt","summary":"Multiple vulnerabilities have been discovered in MPlayer, possibly allowing\n    for the remote execution of arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0630","reference_id":"","reference_type":"","scores":[{"value":"0.06989","scoring_system":"epss","scoring_elements":"0.9141","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06989","scoring_system":"epss","scoring_elements":"0.91416","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06989","scoring_system":"epss","scoring_elements":"0.91426","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06989","scoring_system":"epss","scoring_elements":"0.91434","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06989","scoring_system":"epss","scoring_elements":"0.91446","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06989","scoring_system":"epss","scoring_elements":"0.91452","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06989","scoring_system":"epss","scoring_elements":"0.91458","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06989","scoring_system":"epss","scoring_elements":"0.91461","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06989","scoring_system":"epss","scoring_elements":"0.9146","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06989","scoring_system":"epss","scoring_elements":"0.91484","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06989","scoring_system":"epss","scoring_elements":"0.91479","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07422","scoring_system":"epss","scoring_elements":"0.91771","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07422","scoring_system":"epss","scoring_elements":"0.91769","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07422","scoring_system":"epss","scoring_elements":"0.91765","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07422","scoring_system":"epss","scoring_elements":"0.91779","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0630"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0630","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0630"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464532","reference_id":"464532","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464532"},{"reference_url":"https://security.gentoo.org/glsa/200803-16","reference_id":"GLSA-200803-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200803-16"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035196?format=json","purl":"pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1228-m28x-bkbm"},{"vulnerability":"VCID-4jd9-pt54-1bag"},{"vulnerability":"VCID-8uk8-jxh7-k7aa"},{"vulnerability":"VCID-9tg7-9r5m-dkgn"},{"vulnerability":"VCID-9vx1-3zb9-5bf1"},{"vulnerability":"VCID-e178-xa31-h3c4"},{"vulnerability":"VCID-fjy3-bfzh-7beu"},{"vulnerability":"VCID-fw24-pxsc-7bek"},{"vulnerability":"VCID-g1k8-4mbb-fyew"},{"vulnerability":"VCID-gxnr-jbzt-cffq"},{"vulnerability":"VCID-h9ks-v96k-wkf7"},{"vulnerability":"VCID-j7wp-941h-p3fc"},{"vulnerability":"VCID-m5db-wq6e-gqeu"},{"vulnerability":"VCID-pfcp-7vj5-rqef"},{"vulnerability":"VCID-tff5-wrpr-hbe1"},{"vulnerability":"VCID-tteq-u99e-ayg4"},{"vulnerability":"VCID-vnmz-rcby-n3gs"},{"vulnerability":"VCID-xxgu-jjrs-pkaz"},{"vulnerability":"VCID-ybgy-yct3-6fba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-17%252Blenny3.2"}],"aliases":["CVE-2008-0630"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gaa2-bekm-6bbt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60429?format=json","vulnerability_id":"VCID-gxnr-jbzt-cffq","summary":"Multiple vulnerabilities in MPlayer may lead to the execution of arbitrary\n    code or a Denial of Service.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3827","reference_id":"","reference_type":"","scores":[{"value":"0.03588","scoring_system":"epss","scoring_elements":"0.87802","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03588","scoring_system":"epss","scoring_elements":"0.87699","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03588","scoring_system":"epss","scoring_elements":"0.8771","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03588","scoring_system":"epss","scoring_elements":"0.87721","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03588","scoring_system":"epss","scoring_elements":"0.87723","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03588","scoring_system":"epss","scoring_elements":"0.87745","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03588","scoring_system":"epss","scoring_elements":"0.87751","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03588","scoring_system":"epss","scoring_elements":"0.87761","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03588","scoring_system":"epss","scoring_elements":"0.87756","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03588","scoring_system":"epss","scoring_elements":"0.87754","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03588","scoring_system":"epss","scoring_elements":"0.87768","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03588","scoring_system":"epss","scoring_elements":"0.87767","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03588","scoring_system":"epss","scoring_elements":"0.87766","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03588","scoring_system":"epss","scoring_elements":"0.87783","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03588","scoring_system":"epss","scoring_elements":"0.8779","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03588","scoring_system":"epss","scoring_elements":"0.87787","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3827"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3827","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3827"},{"reference_url":"http://secunia.com/advisories/32045","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32045"},{"reference_url":"http://secunia.com/advisories/32153","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32153"},{"reference_url":"http://securityreason.com/securityalert/4326","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/securityalert/4326"},{"reference_url":"http://svn.mplayerhq.hu/mplayer/trunk/libmpdemux/demux_real.c?r1=27314&r2=27675","reference_id":"","reference_type":"","scores":[],"url":"http://svn.mplayerhq.hu/mplayer/trunk/libmpdemux/demux_real.c?r1=27314&r2=27675"},{"reference_url":"http://www.debian.org/security/2008/dsa-1644","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1644"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:219","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:219"},{"reference_url":"http://www.ocert.org/advisories/ocert-2008-013.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.ocert.org/advisories/ocert-2008-013.html"},{"reference_url":"http://www.securityfocus.com/archive/1/496806/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/496806/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/31473","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/31473"},{"reference_url":"http://www.securitytracker.com/id?1020952","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020952"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2703","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2703"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=500683","reference_id":"500683","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=500683"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_rc1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_rc1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_rc1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3827","reference_id":"CVE-2008-3827","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3827"},{"reference_url":"https://security.gentoo.org/glsa/200901-07","reference_id":"GLSA-200901-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200901-07"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035197?format=json","purl":"pkg:deb/debian/mplayer@2:1.0~rc3%2B%2Bfinal.dfsg1-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4jd9-pt54-1bag"},{"vulnerability":"VCID-8uk8-jxh7-k7aa"},{"vulnerability":"VCID-9tg7-9r5m-dkgn"},{"vulnerability":"VCID-9vx1-3zb9-5bf1"},{"vulnerability":"VCID-e178-xa31-h3c4"},{"vulnerability":"VCID-fjy3-bfzh-7beu"},{"vulnerability":"VCID-g1k8-4mbb-fyew"},{"vulnerability":"VCID-h9ks-v96k-wkf7"},{"vulnerability":"VCID-m5db-wq6e-gqeu"},{"vulnerability":"VCID-pfcp-7vj5-rqef"},{"vulnerability":"VCID-tff5-wrpr-hbe1"},{"vulnerability":"VCID-vnmz-rcby-n3gs"},{"vulnerability":"VCID-xxgu-jjrs-pkaz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.0~rc3%252B%252Bfinal.dfsg1-1"}],"aliases":["CVE-2008-3827"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gxnr-jbzt-cffq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/55943?format=json","vulnerability_id":"VCID-h9ks-v96k-wkf7","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6933","reference_id":"","reference_type":"","scores":[{"value":"0.03355","scoring_system":"epss","scoring_elements":"0.87278","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03355","scoring_system":"epss","scoring_elements":"0.87288","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03355","scoring_system":"epss","scoring_elements":"0.87304","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03355","scoring_system":"epss","scoring_elements":"0.87303","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03355","scoring_system":"epss","scoring_elements":"0.87322","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03355","scoring_system":"epss","scoring_elements":"0.87329","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03355","scoring_system":"epss","scoring_elements":"0.87342","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03355","scoring_system":"epss","scoring_elements":"0.87336","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03355","scoring_system":"epss","scoring_elements":"0.87332","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03355","scoring_system":"epss","scoring_elements":"0.87346","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03355","scoring_system":"epss","scoring_elements":"0.8735","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03355","scoring_system":"epss","scoring_elements":"0.87344","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03355","scoring_system":"epss","scoring_elements":"0.87361","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03355","scoring_system":"epss","scoring_elements":"0.87368","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03355","scoring_system":"epss","scoring_elements":"0.87369","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03355","scoring_system":"epss","scoring_elements":"0.87385","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6933","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6933"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035198?format=json","purl":"pkg:deb/debian/mplayer@2:1.0~rc4.dfsg1%2Bsvn34540-1%2Bdeb7u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4jd9-pt54-1bag"},{"vulnerability":"VCID-8uk8-jxh7-k7aa"},{"vulnerability":"VCID-9tg7-9r5m-dkgn"},{"vulnerability":"VCID-9vx1-3zb9-5bf1"},{"vulnerability":"VCID-e178-xa31-h3c4"},{"vulnerability":"VCID-g1k8-4mbb-fyew"},{"vulnerability":"VCID-h9ks-v96k-wkf7"},{"vulnerability":"VCID-m5db-wq6e-gqeu"},{"vulnerability":"VCID-pfcp-7vj5-rqef"},{"vulnerability":"VCID-tff5-wrpr-hbe1"},{"vulnerability":"VCID-vnmz-rcby-n3gs"},{"vulnerability":"VCID-xxgu-jjrs-pkaz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.0~rc4.dfsg1%252Bsvn34540-1%252Bdeb7u1"},{"url":"http://public2.vulnerablecode.io/api/packages/1049111?format=json","purl":"pkg:deb/debian/mplayer@2:1.3.0-6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4jd9-pt54-1bag"},{"vulnerability":"VCID-8uk8-jxh7-k7aa"},{"vulnerability":"VCID-9tg7-9r5m-dkgn"},{"vulnerability":"VCID-9vx1-3zb9-5bf1"},{"vulnerability":"VCID-e178-xa31-h3c4"},{"vulnerability":"VCID-g1k8-4mbb-fyew"},{"vulnerability":"VCID-m5db-wq6e-gqeu"},{"vulnerability":"VCID-pfcp-7vj5-rqef"},{"vulnerability":"VCID-tff5-wrpr-hbe1"},{"vulnerability":"VCID-vnmz-rcby-n3gs"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.3.0-6"}],"aliases":["CVE-2013-6933"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h9ks-v96k-wkf7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58562?format=json","vulnerability_id":"VCID-hujx-y363-e3cg","summary":"Multiple vulnerabilities have been discovered in MPlayer, possibly allowing\n    for the remote execution of arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0485","reference_id":"","reference_type":"","scores":[{"value":"0.16295","scoring_system":"epss","scoring_elements":"0.94796","published_at":"2026-04-01T12:55:00Z"},{"value":"0.16295","scoring_system":"epss","scoring_elements":"0.94806","published_at":"2026-04-02T12:55:00Z"},{"value":"0.16295","scoring_system":"epss","scoring_elements":"0.94809","published_at":"2026-04-04T12:55:00Z"},{"value":"0.16295","scoring_system":"epss","scoring_elements":"0.94811","published_at":"2026-04-07T12:55:00Z"},{"value":"0.16295","scoring_system":"epss","scoring_elements":"0.94821","published_at":"2026-04-08T12:55:00Z"},{"value":"0.16295","scoring_system":"epss","scoring_elements":"0.94825","published_at":"2026-04-09T12:55:00Z"},{"value":"0.16295","scoring_system":"epss","scoring_elements":"0.94829","published_at":"2026-04-11T12:55:00Z"},{"value":"0.16295","scoring_system":"epss","scoring_elements":"0.94832","published_at":"2026-04-12T12:55:00Z"},{"value":"0.16295","scoring_system":"epss","scoring_elements":"0.94834","published_at":"2026-04-13T12:55:00Z"},{"value":"0.16295","scoring_system":"epss","scoring_elements":"0.9484","published_at":"2026-04-16T12:55:00Z"},{"value":"0.16295","scoring_system":"epss","scoring_elements":"0.94844","published_at":"2026-04-18T12:55:00Z"},{"value":"0.16295","scoring_system":"epss","scoring_elements":"0.94847","published_at":"2026-04-21T12:55:00Z"},{"value":"0.16295","scoring_system":"epss","scoring_elements":"0.94849","published_at":"2026-04-26T12:55:00Z"},{"value":"0.16295","scoring_system":"epss","scoring_elements":"0.9485","published_at":"2026-04-29T12:55:00Z"},{"value":"0.16295","scoring_system":"epss","scoring_elements":"0.94857","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0485"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0485","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0485"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464060","reference_id":"464060","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464060"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/31076.py","reference_id":"CVE-2008-0485;OSVDB-42201","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/31076.py"},{"reference_url":"https://www.securityfocus.com/bid/27499/info","reference_id":"CVE-2008-0485;OSVDB-42201","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/27499/info"},{"reference_url":"https://security.gentoo.org/glsa/200803-16","reference_id":"GLSA-200803-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200803-16"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035196?format=json","purl":"pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1228-m28x-bkbm"},{"vulnerability":"VCID-4jd9-pt54-1bag"},{"vulnerability":"VCID-8uk8-jxh7-k7aa"},{"vulnerability":"VCID-9tg7-9r5m-dkgn"},{"vulnerability":"VCID-9vx1-3zb9-5bf1"},{"vulnerability":"VCID-e178-xa31-h3c4"},{"vulnerability":"VCID-fjy3-bfzh-7beu"},{"vulnerability":"VCID-fw24-pxsc-7bek"},{"vulnerability":"VCID-g1k8-4mbb-fyew"},{"vulnerability":"VCID-gxnr-jbzt-cffq"},{"vulnerability":"VCID-h9ks-v96k-wkf7"},{"vulnerability":"VCID-j7wp-941h-p3fc"},{"vulnerability":"VCID-m5db-wq6e-gqeu"},{"vulnerability":"VCID-pfcp-7vj5-rqef"},{"vulnerability":"VCID-tff5-wrpr-hbe1"},{"vulnerability":"VCID-tteq-u99e-ayg4"},{"vulnerability":"VCID-vnmz-rcby-n3gs"},{"vulnerability":"VCID-xxgu-jjrs-pkaz"},{"vulnerability":"VCID-ybgy-yct3-6fba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-17%252Blenny3.2"}],"aliases":["CVE-2008-0485"],"risk_score":0.2,"exploitability":"2.0","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hujx-y363-e3cg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46257?format=json","vulnerability_id":"VCID-j7wp-941h-p3fc","summary":"Multiple vulnerabilities in xine-lib might result in the remote execution\n    of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5244","reference_id":"","reference_type":"","scores":[{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62945","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62825","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62883","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62913","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62876","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62927","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62943","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62962","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.6295","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62928","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62968","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62976","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62955","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62975","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.6299","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5244"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5244","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5244"},{"reference_url":"http://securitytracker.com/id?1020703","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1020703"},{"reference_url":"http://sourceforge.net/project/shownotes.php?release_id=619869","reference_id":"","reference_type":"","scores":[],"url":"http://sourceforge.net/project/shownotes.php?release_id=619869"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=407010","reference_id":"407010","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=407010"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1.1.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5244","reference_id":"CVE-2008-5244","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5244"},{"reference_url":"https://security.gentoo.org/glsa/201006-04","reference_id":"GLSA-201006-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201006-04"},{"reference_url":"https://usn.ubuntu.com/710-1/","reference_id":"USN-710-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/710-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035197?format=json","purl":"pkg:deb/debian/mplayer@2:1.0~rc3%2B%2Bfinal.dfsg1-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4jd9-pt54-1bag"},{"vulnerability":"VCID-8uk8-jxh7-k7aa"},{"vulnerability":"VCID-9tg7-9r5m-dkgn"},{"vulnerability":"VCID-9vx1-3zb9-5bf1"},{"vulnerability":"VCID-e178-xa31-h3c4"},{"vulnerability":"VCID-fjy3-bfzh-7beu"},{"vulnerability":"VCID-g1k8-4mbb-fyew"},{"vulnerability":"VCID-h9ks-v96k-wkf7"},{"vulnerability":"VCID-m5db-wq6e-gqeu"},{"vulnerability":"VCID-pfcp-7vj5-rqef"},{"vulnerability":"VCID-tff5-wrpr-hbe1"},{"vulnerability":"VCID-vnmz-rcby-n3gs"},{"vulnerability":"VCID-xxgu-jjrs-pkaz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.0~rc3%252B%252Bfinal.dfsg1-1"}],"aliases":["CVE-2008-5244"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j7wp-941h-p3fc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49467?format=json","vulnerability_id":"VCID-m5db-wq6e-gqeu","summary":"Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38855","reference_id":"","reference_type":"","scores":[{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19364","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19415","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19132","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19212","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19264","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.1927","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19224","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19169","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.1913","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19139","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19147","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19039","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19028","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18984","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18863","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38855"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38855","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38855"},{"reference_url":"https://security.gentoo.org/glsa/202405-05","reference_id":"GLSA-202405-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-05"},{"reference_url":"https://usn.ubuntu.com/5895-1/","reference_id":"USN-5895-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5895-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995157?format=json","purl":"pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4f83-6dmk-rybu"},{"vulnerability":"VCID-kyv5-fhuz-n7f1"},{"vulnerability":"VCID-z3dv-rb28-kycj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1"}],"aliases":["CVE-2022-38855"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m5db-wq6e-gqeu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47797?format=json","vulnerability_id":"VCID-pbr8-afjj-pbdq","summary":"Two vulnerabilities have been discovered in MPlayer, each one could lead to\n    the execution of arbitrary code.","references":[{"reference_url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414072","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414072"},{"reference_url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414072%3Bmsg=12%3Bfilename=DS_VideoDecoder.c---SVN--22205.patch%3Batt=1","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414072%3Bmsg=12%3Bfilename=DS_VideoDecoder.c---SVN--22205.patch%3Batt=1"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-1387","reference_id":"","reference_type":"","scores":[{"value":"0.05109","scoring_system":"epss","scoring_elements":"0.89877","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05109","scoring_system":"epss","scoring_elements":"0.898","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05109","scoring_system":"epss","scoring_elements":"0.89803","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05109","scoring_system":"epss","scoring_elements":"0.89817","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05109","scoring_system":"epss","scoring_elements":"0.89821","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05109","scoring_system":"epss","scoring_elements":"0.89839","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05109","scoring_system":"epss","scoring_elements":"0.89845","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05109","scoring_system":"epss","scoring_elements":"0.89851","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05109","scoring_system":"epss","scoring_elements":"0.89849","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05109","scoring_system":"epss","scoring_elements":"0.89842","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05109","scoring_system":"epss","scoring_elements":"0.89856","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05109","scoring_system":"epss","scoring_elements":"0.89857","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05109","scoring_system":"epss","scoring_elements":"0.8985","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05109","scoring_system":"epss","scoring_elements":"0.89865","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05109","scoring_system":"epss","scoring_elements":"0.89863","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-1387"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1387","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1387"},{"reference_url":"http://secunia.com/advisories/24443","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24443"},{"reference_url":"http://secunia.com/advisories/24444","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24444"},{"reference_url":"http://secunia.com/advisories/24462","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24462"},{"reference_url":"http://secunia.com/advisories/25462","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25462"},{"reference_url":"http://secunia.com/advisories/29601","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/29601"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200705-21.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200705-21.xml"},{"reference_url":"http://www.debian.org/security/2008/dsa-1536","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1536"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:061","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:061"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:062","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:062"},{"reference_url":"http://www.securityfocus.com/bid/22933","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/22933"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414075","reference_id":"414075","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414075"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-1387","reference_id":"CVE-2007-1387","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:M/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-1387"},{"reference_url":"https://security.gentoo.org/glsa/200705-21","reference_id":"GLSA-200705-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200705-21"},{"reference_url":"https://usn.ubuntu.com/435-1/","reference_id":"USN-435-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/435-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035196?format=json","purl":"pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1228-m28x-bkbm"},{"vulnerability":"VCID-4jd9-pt54-1bag"},{"vulnerability":"VCID-8uk8-jxh7-k7aa"},{"vulnerability":"VCID-9tg7-9r5m-dkgn"},{"vulnerability":"VCID-9vx1-3zb9-5bf1"},{"vulnerability":"VCID-e178-xa31-h3c4"},{"vulnerability":"VCID-fjy3-bfzh-7beu"},{"vulnerability":"VCID-fw24-pxsc-7bek"},{"vulnerability":"VCID-g1k8-4mbb-fyew"},{"vulnerability":"VCID-gxnr-jbzt-cffq"},{"vulnerability":"VCID-h9ks-v96k-wkf7"},{"vulnerability":"VCID-j7wp-941h-p3fc"},{"vulnerability":"VCID-m5db-wq6e-gqeu"},{"vulnerability":"VCID-pfcp-7vj5-rqef"},{"vulnerability":"VCID-tff5-wrpr-hbe1"},{"vulnerability":"VCID-tteq-u99e-ayg4"},{"vulnerability":"VCID-vnmz-rcby-n3gs"},{"vulnerability":"VCID-xxgu-jjrs-pkaz"},{"vulnerability":"VCID-ybgy-yct3-6fba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-17%252Blenny3.2"}],"aliases":["CVE-2007-1387"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pbr8-afjj-pbdq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31750?format=json","vulnerability_id":"VCID-pbz2-w6vz-cqhx","summary":"An integer overflow vulnerability in MPlayer may allow for the execution of\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1558","reference_id":"","reference_type":"","scores":[{"value":"0.21937","scoring_system":"epss","scoring_elements":"0.95731","published_at":"2026-04-01T12:55:00Z"},{"value":"0.21937","scoring_system":"epss","scoring_elements":"0.9574","published_at":"2026-04-02T12:55:00Z"},{"value":"0.21937","scoring_system":"epss","scoring_elements":"0.95748","published_at":"2026-04-04T12:55:00Z"},{"value":"0.21937","scoring_system":"epss","scoring_elements":"0.95751","published_at":"2026-04-07T12:55:00Z"},{"value":"0.21937","scoring_system":"epss","scoring_elements":"0.95759","published_at":"2026-04-08T12:55:00Z"},{"value":"0.21937","scoring_system":"epss","scoring_elements":"0.95763","published_at":"2026-04-09T12:55:00Z"},{"value":"0.21937","scoring_system":"epss","scoring_elements":"0.95766","published_at":"2026-04-12T12:55:00Z"},{"value":"0.21937","scoring_system":"epss","scoring_elements":"0.95767","published_at":"2026-04-13T12:55:00Z"},{"value":"0.21937","scoring_system":"epss","scoring_elements":"0.95777","published_at":"2026-04-16T12:55:00Z"},{"value":"0.21937","scoring_system":"epss","scoring_elements":"0.95781","published_at":"2026-04-18T12:55:00Z"},{"value":"0.21937","scoring_system":"epss","scoring_elements":"0.95783","published_at":"2026-04-29T12:55:00Z"},{"value":"0.21937","scoring_system":"epss","scoring_elements":"0.95785","published_at":"2026-04-26T12:55:00Z"},{"value":"0.21937","scoring_system":"epss","scoring_elements":"0.95796","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1558"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1558","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1558"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=473056","reference_id":"473056","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=473056"},{"reference_url":"https://security.gentoo.org/glsa/200805-22","reference_id":"GLSA-200805-22","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200805-22"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/5307.pl","reference_id":"OSVDB-43740;CVE-2008-1558","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/5307.pl"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035196?format=json","purl":"pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1228-m28x-bkbm"},{"vulnerability":"VCID-4jd9-pt54-1bag"},{"vulnerability":"VCID-8uk8-jxh7-k7aa"},{"vulnerability":"VCID-9tg7-9r5m-dkgn"},{"vulnerability":"VCID-9vx1-3zb9-5bf1"},{"vulnerability":"VCID-e178-xa31-h3c4"},{"vulnerability":"VCID-fjy3-bfzh-7beu"},{"vulnerability":"VCID-fw24-pxsc-7bek"},{"vulnerability":"VCID-g1k8-4mbb-fyew"},{"vulnerability":"VCID-gxnr-jbzt-cffq"},{"vulnerability":"VCID-h9ks-v96k-wkf7"},{"vulnerability":"VCID-j7wp-941h-p3fc"},{"vulnerability":"VCID-m5db-wq6e-gqeu"},{"vulnerability":"VCID-pfcp-7vj5-rqef"},{"vulnerability":"VCID-tff5-wrpr-hbe1"},{"vulnerability":"VCID-tteq-u99e-ayg4"},{"vulnerability":"VCID-vnmz-rcby-n3gs"},{"vulnerability":"VCID-xxgu-jjrs-pkaz"},{"vulnerability":"VCID-ybgy-yct3-6fba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-17%252Blenny3.2"}],"aliases":["CVE-2008-1558"],"risk_score":0.4,"exploitability":"2.0","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pbz2-w6vz-cqhx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49474?format=json","vulnerability_id":"VCID-pfcp-7vj5-rqef","summary":"Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38864","reference_id":"","reference_type":"","scores":[{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19364","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19415","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19132","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19212","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19264","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.1927","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19224","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19169","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.1913","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19139","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19147","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19039","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19028","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18984","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18863","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38864"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021013","reference_id":"1021013","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021013"},{"reference_url":"https://security.gentoo.org/glsa/202405-05","reference_id":"GLSA-202405-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-05"},{"reference_url":"https://usn.ubuntu.com/5895-1/","reference_id":"USN-5895-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5895-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995157?format=json","purl":"pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4f83-6dmk-rybu"},{"vulnerability":"VCID-kyv5-fhuz-n7f1"},{"vulnerability":"VCID-z3dv-rb28-kycj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1"}],"aliases":["CVE-2022-38864"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pfcp-7vj5-rqef"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/91766?format=json","vulnerability_id":"VCID-pxrz-2835-dfhm","summary":"Heap-based buffer overflow in libmpdemux/aviheader.c in MPlayer 1.0rc1 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a .avi file with certain large \"indx truck size\" and nEntriesInuse values, and a certain wLongsPerEntry value.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4938","reference_id":"","reference_type":"","scores":[{"value":"0.09968","scoring_system":"epss","scoring_elements":"0.93011","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09968","scoring_system":"epss","scoring_elements":"0.9302","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09968","scoring_system":"epss","scoring_elements":"0.93024","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09968","scoring_system":"epss","scoring_elements":"0.93023","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09968","scoring_system":"epss","scoring_elements":"0.93031","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09968","scoring_system":"epss","scoring_elements":"0.93036","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09968","scoring_system":"epss","scoring_elements":"0.93041","published_at":"2026-04-11T12:55:00Z"},{"value":"0.09968","scoring_system":"epss","scoring_elements":"0.93038","published_at":"2026-04-12T12:55:00Z"},{"value":"0.09968","scoring_system":"epss","scoring_elements":"0.9304","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09968","scoring_system":"epss","scoring_elements":"0.9305","published_at":"2026-04-16T12:55:00Z"},{"value":"0.09968","scoring_system":"epss","scoring_elements":"0.93053","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09968","scoring_system":"epss","scoring_elements":"0.9306","published_at":"2026-04-21T12:55:00Z"},{"value":"0.09968","scoring_system":"epss","scoring_elements":"0.93067","published_at":"2026-05-05T12:55:00Z"},{"value":"0.09968","scoring_system":"epss","scoring_elements":"0.93062","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4938"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4938","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4938"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=443478","reference_id":"443478","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=443478"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/30578.txt","reference_id":"CVE-2007-4938;OSVDB-45940","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/30578.txt"},{"reference_url":"https://www.securityfocus.com/bid/25648/info","reference_id":"CVE-2007-4938;OSVDB-45940","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/25648/info"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035196?format=json","purl":"pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1228-m28x-bkbm"},{"vulnerability":"VCID-4jd9-pt54-1bag"},{"vulnerability":"VCID-8uk8-jxh7-k7aa"},{"vulnerability":"VCID-9tg7-9r5m-dkgn"},{"vulnerability":"VCID-9vx1-3zb9-5bf1"},{"vulnerability":"VCID-e178-xa31-h3c4"},{"vulnerability":"VCID-fjy3-bfzh-7beu"},{"vulnerability":"VCID-fw24-pxsc-7bek"},{"vulnerability":"VCID-g1k8-4mbb-fyew"},{"vulnerability":"VCID-gxnr-jbzt-cffq"},{"vulnerability":"VCID-h9ks-v96k-wkf7"},{"vulnerability":"VCID-j7wp-941h-p3fc"},{"vulnerability":"VCID-m5db-wq6e-gqeu"},{"vulnerability":"VCID-pfcp-7vj5-rqef"},{"vulnerability":"VCID-tff5-wrpr-hbe1"},{"vulnerability":"VCID-tteq-u99e-ayg4"},{"vulnerability":"VCID-vnmz-rcby-n3gs"},{"vulnerability":"VCID-xxgu-jjrs-pkaz"},{"vulnerability":"VCID-ybgy-yct3-6fba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-17%252Blenny3.2"}],"aliases":["CVE-2007-4938"],"risk_score":0.2,"exploitability":"2.0","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pxrz-2835-dfhm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31094?format=json","vulnerability_id":"VCID-q7u2-mhac-r7fp","summary":"xine-lib is vulnerable to multiple buffer overflows when processing FLAC\n    and ASF streams.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0486.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0486.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0486","reference_id":"","reference_type":"","scores":[{"value":"0.0457","scoring_system":"epss","scoring_elements":"0.89158","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0457","scoring_system":"epss","scoring_elements":"0.89165","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0457","scoring_system":"epss","scoring_elements":"0.8918","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0457","scoring_system":"epss","scoring_elements":"0.89182","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0457","scoring_system":"epss","scoring_elements":"0.892","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0457","scoring_system":"epss","scoring_elements":"0.89205","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0457","scoring_system":"epss","scoring_elements":"0.89215","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0457","scoring_system":"epss","scoring_elements":"0.89211","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0457","scoring_system":"epss","scoring_elements":"0.89209","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0457","scoring_system":"epss","scoring_elements":"0.89221","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0457","scoring_system":"epss","scoring_elements":"0.89217","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04864","scoring_system":"epss","scoring_elements":"0.89577","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04864","scoring_system":"epss","scoring_elements":"0.89581","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04864","scoring_system":"epss","scoring_elements":"0.89588","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0486"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0486","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0486"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=431541","reference_id":"431541","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=431541"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464060","reference_id":"464060","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464060"},{"reference_url":"https://security.gentoo.org/glsa/200802-12","reference_id":"GLSA-200802-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200802-12"},{"reference_url":"https://security.gentoo.org/glsa/200803-16","reference_id":"GLSA-200803-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200803-16"},{"reference_url":"https://usn.ubuntu.com/635-1/","reference_id":"USN-635-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/635-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035196?format=json","purl":"pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1228-m28x-bkbm"},{"vulnerability":"VCID-4jd9-pt54-1bag"},{"vulnerability":"VCID-8uk8-jxh7-k7aa"},{"vulnerability":"VCID-9tg7-9r5m-dkgn"},{"vulnerability":"VCID-9vx1-3zb9-5bf1"},{"vulnerability":"VCID-e178-xa31-h3c4"},{"vulnerability":"VCID-fjy3-bfzh-7beu"},{"vulnerability":"VCID-fw24-pxsc-7bek"},{"vulnerability":"VCID-g1k8-4mbb-fyew"},{"vulnerability":"VCID-gxnr-jbzt-cffq"},{"vulnerability":"VCID-h9ks-v96k-wkf7"},{"vulnerability":"VCID-j7wp-941h-p3fc"},{"vulnerability":"VCID-m5db-wq6e-gqeu"},{"vulnerability":"VCID-pfcp-7vj5-rqef"},{"vulnerability":"VCID-tff5-wrpr-hbe1"},{"vulnerability":"VCID-tteq-u99e-ayg4"},{"vulnerability":"VCID-vnmz-rcby-n3gs"},{"vulnerability":"VCID-xxgu-jjrs-pkaz"},{"vulnerability":"VCID-ybgy-yct3-6fba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-17%252Blenny3.2"}],"aliases":["CVE-2008-0486"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q7u2-mhac-r7fp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40177?format=json","vulnerability_id":"VCID-r4rz-8ey9-fqb4","summary":"Multiple vulnerabilities in FFmpeg may lead to the remote execution of\n    arbitrary code or a Denial of Service.","references":[{"reference_url":"http://archives.neohapsis.com/archives/fulldisclosure/2008-09/0103.html","reference_id":"","reference_type":"","scores":[],"url":"http://archives.neohapsis.com/archives/fulldisclosure/2008-09/0103.html"},{"reference_url":"http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2008-August/016011.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2008-August/016011.html"},{"reference_url":"http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2008-August/016012.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2008-August/016012.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-4866","reference_id":"","reference_type":"","scores":[{"value":"0.05735","scoring_system":"epss","scoring_elements":"0.90477","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05735","scoring_system":"epss","scoring_elements":"0.90404","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05735","scoring_system":"epss","scoring_elements":"0.90408","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05735","scoring_system":"epss","scoring_elements":"0.9042","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05735","scoring_system":"epss","scoring_elements":"0.90424","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05735","scoring_system":"epss","scoring_elements":"0.90438","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05735","scoring_system":"epss","scoring_elements":"0.90444","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05735","scoring_system":"epss","scoring_elements":"0.90452","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05735","scoring_system":"epss","scoring_elements":"0.9046","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05735","scoring_system":"epss","scoring_elements":"0.90459","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05735","scoring_system":"epss","scoring_elements":"0.90457","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05735","scoring_system":"epss","scoring_elements":"0.9047","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05735","scoring_system":"epss","scoring_elements":"0.90469","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05735","scoring_system":"epss","scoring_elements":"0.90465","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-4866"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4866","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4866"},{"reference_url":"http://secunia.com/advisories/34296","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34296"},{"reference_url":"http://secunia.com/advisories/34385","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34385"},{"reference_url":"http://secunia.com/advisories/34845","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34845"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200903-33.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200903-33.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/46322","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/46322"},{"reference_url":"http://www.debian.org/security/2009/dsa-1782","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1782"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:013","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:013"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:015","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:015"},{"reference_url":"http://www.openwall.com/lists/oss-security/2008/10/29/6","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2008/10/29/6"},{"reference_url":"http://www.securityfocus.com/bid/33308","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/33308"},{"reference_url":"http://www.ubuntu.com/usn/USN-734-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-734-1"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-4866","reference_id":"CVE-2008-4866","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-4866"},{"reference_url":"https://security.gentoo.org/glsa/200903-33","reference_id":"GLSA-200903-33","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200903-33"},{"reference_url":"https://usn.ubuntu.com/734-1/","reference_id":"USN-734-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/734-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035196?format=json","purl":"pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1228-m28x-bkbm"},{"vulnerability":"VCID-4jd9-pt54-1bag"},{"vulnerability":"VCID-8uk8-jxh7-k7aa"},{"vulnerability":"VCID-9tg7-9r5m-dkgn"},{"vulnerability":"VCID-9vx1-3zb9-5bf1"},{"vulnerability":"VCID-e178-xa31-h3c4"},{"vulnerability":"VCID-fjy3-bfzh-7beu"},{"vulnerability":"VCID-fw24-pxsc-7bek"},{"vulnerability":"VCID-g1k8-4mbb-fyew"},{"vulnerability":"VCID-gxnr-jbzt-cffq"},{"vulnerability":"VCID-h9ks-v96k-wkf7"},{"vulnerability":"VCID-j7wp-941h-p3fc"},{"vulnerability":"VCID-m5db-wq6e-gqeu"},{"vulnerability":"VCID-pfcp-7vj5-rqef"},{"vulnerability":"VCID-tff5-wrpr-hbe1"},{"vulnerability":"VCID-tteq-u99e-ayg4"},{"vulnerability":"VCID-vnmz-rcby-n3gs"},{"vulnerability":"VCID-xxgu-jjrs-pkaz"},{"vulnerability":"VCID-ybgy-yct3-6fba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-17%252Blenny3.2"}],"aliases":["CVE-2008-4866"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r4rz-8ey9-fqb4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40217?format=json","vulnerability_id":"VCID-sgm1-d98g-nff9","summary":"Multiple vulnerabilities in FFmpeg may lead to the remote execution of\n    arbitrary code or a Denial of Service.","references":[{"reference_url":"http://git.ffmpeg.org/?p=ffmpeg%3Ba=commitdiff%3Bh=72e715fb798f2cb79fd24a6d2eaeafb7c6eeda17","reference_id":"","reference_type":"","scores":[],"url":"http://git.ffmpeg.org/?p=ffmpeg%3Ba=commitdiff%3Bh=72e715fb798f2cb79fd24a6d2eaeafb7c6eeda17"},{"reference_url":"http://osvdb.org/51643","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/51643"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0385","reference_id":"","reference_type":"","scores":[{"value":"0.11552","scoring_system":"epss","scoring_elements":"0.93669","published_at":"2026-05-05T12:55:00Z"},{"value":"0.11552","scoring_system":"epss","scoring_elements":"0.93594","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11552","scoring_system":"epss","scoring_elements":"0.93603","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11552","scoring_system":"epss","scoring_elements":"0.93612","published_at":"2026-04-04T12:55:00Z"},{"value":"0.11552","scoring_system":"epss","scoring_elements":"0.93614","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11552","scoring_system":"epss","scoring_elements":"0.93623","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11552","scoring_system":"epss","scoring_elements":"0.93625","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11552","scoring_system":"epss","scoring_elements":"0.9363","published_at":"2026-04-12T12:55:00Z"},{"value":"0.11552","scoring_system":"epss","scoring_elements":"0.93631","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11552","scoring_system":"epss","scoring_elements":"0.93649","published_at":"2026-04-16T12:55:00Z"},{"value":"0.11552","scoring_system":"epss","scoring_elements":"0.93656","published_at":"2026-04-18T12:55:00Z"},{"value":"0.11552","scoring_system":"epss","scoring_elements":"0.9366","published_at":"2026-04-21T12:55:00Z"},{"value":"0.11552","scoring_system":"epss","scoring_elements":"0.93665","published_at":"2026-04-24T12:55:00Z"},{"value":"0.11552","scoring_system":"epss","scoring_elements":"0.93663","published_at":"2026-04-26T12:55:00Z"},{"value":"0.11552","scoring_system":"epss","scoring_elements":"0.93661","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0385"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0385","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0385"},{"reference_url":"http://secunia.com/advisories/33711","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33711"},{"reference_url":"http://secunia.com/advisories/34296","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34296"},{"reference_url":"http://secunia.com/advisories/34385","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34385"},{"reference_url":"http://secunia.com/advisories/34712","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34712"},{"reference_url":"http://secunia.com/advisories/34845","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34845"},{"reference_url":"http://secunia.com/advisories/34905","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34905"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200903-33.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200903-33.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/48330","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/48330"},{"reference_url":"http://svn.mplayerhq.hu/ffmpeg/trunk/libavformat/4xm.c?r1=16838&r2=16846&pathrev=16846","reference_id":"","reference_type":"","scores":[],"url":"http://svn.mplayerhq.hu/ffmpeg/trunk/libavformat/4xm.c?r1=16838&r2=16846&pathrev=16846"},{"reference_url":"http://svn.mplayerhq.hu/ffmpeg?view=rev&revision=16846","reference_id":"","reference_type":"","scores":[],"url":"http://svn.mplayerhq.hu/ffmpeg?view=rev&revision=16846"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00210.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00210.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00215.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00215.html"},{"reference_url":"http://www.debian.org/security/2009/dsa-1781","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1781"},{"reference_url":"http://www.debian.org/security/2009/dsa-1782","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1782"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:297","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:297"},{"reference_url":"http://www.securityfocus.com/archive/1/500514/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/500514/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/33502","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/33502"},{"reference_url":"http://www.trapkit.de/advisories/TKADV2009-004.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.trapkit.de/advisories/TKADV2009-004.txt"},{"reference_url":"http://www.ubuntu.com/usn/USN-734-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-734-1"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0277","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0277"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524805","reference_id":"524805","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524805"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0385","reference_id":"CVE-2009-0385","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0385"},{"reference_url":"https://security.gentoo.org/glsa/200903-33","reference_id":"GLSA-200903-33","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200903-33"},{"reference_url":"https://usn.ubuntu.com/734-1/","reference_id":"USN-734-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/734-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035196?format=json","purl":"pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1228-m28x-bkbm"},{"vulnerability":"VCID-4jd9-pt54-1bag"},{"vulnerability":"VCID-8uk8-jxh7-k7aa"},{"vulnerability":"VCID-9tg7-9r5m-dkgn"},{"vulnerability":"VCID-9vx1-3zb9-5bf1"},{"vulnerability":"VCID-e178-xa31-h3c4"},{"vulnerability":"VCID-fjy3-bfzh-7beu"},{"vulnerability":"VCID-fw24-pxsc-7bek"},{"vulnerability":"VCID-g1k8-4mbb-fyew"},{"vulnerability":"VCID-gxnr-jbzt-cffq"},{"vulnerability":"VCID-h9ks-v96k-wkf7"},{"vulnerability":"VCID-j7wp-941h-p3fc"},{"vulnerability":"VCID-m5db-wq6e-gqeu"},{"vulnerability":"VCID-pfcp-7vj5-rqef"},{"vulnerability":"VCID-tff5-wrpr-hbe1"},{"vulnerability":"VCID-tteq-u99e-ayg4"},{"vulnerability":"VCID-vnmz-rcby-n3gs"},{"vulnerability":"VCID-xxgu-jjrs-pkaz"},{"vulnerability":"VCID-ybgy-yct3-6fba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-17%252Blenny3.2"}],"aliases":["CVE-2009-0385"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sgm1-d98g-nff9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49470?format=json","vulnerability_id":"VCID-tff5-wrpr-hbe1","summary":"Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38860","reference_id":"","reference_type":"","scores":[{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18492","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18546","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18254","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18337","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1839","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18342","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1829","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18234","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18246","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18273","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18172","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18155","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18119","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1798","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38860"},{"reference_url":"https://security.gentoo.org/glsa/202405-05","reference_id":"GLSA-202405-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-05"},{"reference_url":"https://usn.ubuntu.com/5895-1/","reference_id":"USN-5895-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5895-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995157?format=json","purl":"pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4f83-6dmk-rybu"},{"vulnerability":"VCID-kyv5-fhuz-n7f1"},{"vulnerability":"VCID-z3dv-rb28-kycj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1"}],"aliases":["CVE-2022-38860"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tff5-wrpr-hbe1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34978?format=json","vulnerability_id":"VCID-tteq-u99e-ayg4","summary":"Multiple vulnerabilities have been found in MPlayer and the bundled\n    FFmpeg, the worst of which may lead to the execution of arbitrary code.","references":[{"reference_url":"http://sam.zoy.org/blog/2007-01-16-exposing-file-parsing-vulnerabilities","reference_id":"","reference_type":"","scores":[],"url":"http://sam.zoy.org/blog/2007-01-16-exposing-file-parsing-vulnerabilities"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6718","reference_id":"","reference_type":"","scores":[{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63348","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63242","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63301","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63328","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63294","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63345","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63363","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.6338","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63327","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63361","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63369","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63347","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63366","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63379","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63377","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6718"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6718","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6718"},{"reference_url":"http://www.openwall.com/lists/oss-security/2008/10/07/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2008/10/07/1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=407010","reference_id":"407010","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=407010"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-6718","reference_id":"CVE-2007-6718","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-6718"},{"reference_url":"https://security.gentoo.org/glsa/201310-13","reference_id":"GLSA-201310-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-13"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035197?format=json","purl":"pkg:deb/debian/mplayer@2:1.0~rc3%2B%2Bfinal.dfsg1-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4jd9-pt54-1bag"},{"vulnerability":"VCID-8uk8-jxh7-k7aa"},{"vulnerability":"VCID-9tg7-9r5m-dkgn"},{"vulnerability":"VCID-9vx1-3zb9-5bf1"},{"vulnerability":"VCID-e178-xa31-h3c4"},{"vulnerability":"VCID-fjy3-bfzh-7beu"},{"vulnerability":"VCID-g1k8-4mbb-fyew"},{"vulnerability":"VCID-h9ks-v96k-wkf7"},{"vulnerability":"VCID-m5db-wq6e-gqeu"},{"vulnerability":"VCID-pfcp-7vj5-rqef"},{"vulnerability":"VCID-tff5-wrpr-hbe1"},{"vulnerability":"VCID-vnmz-rcby-n3gs"},{"vulnerability":"VCID-xxgu-jjrs-pkaz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.0~rc3%252B%252Bfinal.dfsg1-1"}],"aliases":["CVE-2007-6718"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tteq-u99e-ayg4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49469?format=json","vulnerability_id":"VCID-vnmz-rcby-n3gs","summary":"Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38858","reference_id":"","reference_type":"","scores":[{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19364","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19415","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19132","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19212","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19264","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.1927","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19224","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19169","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.1913","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19139","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19147","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19039","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19028","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18984","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18863","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38858"},{"reference_url":"https://security.gentoo.org/glsa/202405-05","reference_id":"GLSA-202405-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-05"},{"reference_url":"https://usn.ubuntu.com/5895-1/","reference_id":"USN-5895-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5895-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995157?format=json","purl":"pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4f83-6dmk-rybu"},{"vulnerability":"VCID-kyv5-fhuz-n7f1"},{"vulnerability":"VCID-z3dv-rb28-kycj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1"}],"aliases":["CVE-2022-38858"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vnmz-rcby-n3gs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47796?format=json","vulnerability_id":"VCID-xfdf-djbw-3yht","summary":"Two vulnerabilities have been discovered in MPlayer, each one could lead to\n    the execution of arbitrary code.","references":[{"reference_url":"http://lists.grok.org.uk/pipermail/full-disclosure/2007-March/052738.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.grok.org.uk/pipermail/full-disclosure/2007-March/052738.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-1246","reference_id":"","reference_type":"","scores":[{"value":"0.09304","scoring_system":"epss","scoring_elements":"0.92774","published_at":"2026-05-05T12:55:00Z"},{"value":"0.09304","scoring_system":"epss","scoring_elements":"0.92718","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09304","scoring_system":"epss","scoring_elements":"0.92725","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09304","scoring_system":"epss","scoring_elements":"0.9273","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09304","scoring_system":"epss","scoring_elements":"0.92728","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09304","scoring_system":"epss","scoring_elements":"0.92738","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09304","scoring_system":"epss","scoring_elements":"0.92742","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09304","scoring_system":"epss","scoring_elements":"0.92748","published_at":"2026-04-11T12:55:00Z"},{"value":"0.09304","scoring_system":"epss","scoring_elements":"0.92746","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09304","scoring_system":"epss","scoring_elements":"0.92758","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09304","scoring_system":"epss","scoring_elements":"0.92762","published_at":"2026-04-21T12:55:00Z"},{"value":"0.09304","scoring_system":"epss","scoring_elements":"0.92769","published_at":"2026-04-26T12:55:00Z"},{"value":"0.09304","scoring_system":"epss","scoring_elements":"0.92764","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-1246"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1246","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1246"},{"reference_url":"http://secunia.com/advisories/24443","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24443"},{"reference_url":"http://secunia.com/advisories/24444","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24444"},{"reference_url":"http://secunia.com/advisories/24446","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24446"},{"reference_url":"http://secunia.com/advisories/24448","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24448"},{"reference_url":"http://secunia.com/advisories/24462","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24462"},{"reference_url":"http://secunia.com/advisories/24866","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24866"},{"reference_url":"http://secunia.com/advisories/24897","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24897"},{"reference_url":"http://secunia.com/advisories/24995","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24995"},{"reference_url":"http://secunia.com/advisories/25462","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25462"},{"reference_url":"http://secunia.com/advisories/29601","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/29601"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200704-09.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200704-09.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200705-21.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200705-21.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/32747","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/32747"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.449141","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.449141"},{"reference_url":"http://svn.mplayerhq.hu/mplayer/trunk/loader/dmo/DMO_VideoDecoder.c","reference_id":"","reference_type":"","scores":[],"url":"http://svn.mplayerhq.hu/mplayer/trunk/loader/dmo/DMO_VideoDecoder.c"},{"reference_url":"http://svn.mplayerhq.hu/mplayer/trunk/loader/dmo/DMO_VideoDecoder.c?r1=22019&r2=22204","reference_id":"","reference_type":"","scores":[],"url":"http://svn.mplayerhq.hu/mplayer/trunk/loader/dmo/DMO_VideoDecoder.c?r1=22019&r2=22204"},{"reference_url":"http://www.debian.org/security/2008/dsa-1536","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1536"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:055","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:055"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:057","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:057"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_007_suse.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_007_suse.html"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_5_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_5_sr.html"},{"reference_url":"http://www.securityfocus.com/archive/1/466691/30/6900/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/466691/30/6900/threaded"},{"reference_url":"http://www.securityfocus.com/bid/22771","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/22771"},{"reference_url":"http://www.ubuntu.com/usn/usn-433-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-433-1"},{"reference_url":"http://www.vupen.com/english/advisories/2007/0794","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/0794"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414075","reference_id":"414075","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414075"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-1246","reference_id":"CVE-2007-1246","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-1246"},{"reference_url":"https://security.gentoo.org/glsa/200704-09","reference_id":"GLSA-200704-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200704-09"},{"reference_url":"https://security.gentoo.org/glsa/200705-21","reference_id":"GLSA-200705-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200705-21"},{"reference_url":"https://usn.ubuntu.com/433-1/","reference_id":"USN-433-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/433-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035196?format=json","purl":"pkg:deb/debian/mplayer@1.0~rc2-17%2Blenny3.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1228-m28x-bkbm"},{"vulnerability":"VCID-4jd9-pt54-1bag"},{"vulnerability":"VCID-8uk8-jxh7-k7aa"},{"vulnerability":"VCID-9tg7-9r5m-dkgn"},{"vulnerability":"VCID-9vx1-3zb9-5bf1"},{"vulnerability":"VCID-e178-xa31-h3c4"},{"vulnerability":"VCID-fjy3-bfzh-7beu"},{"vulnerability":"VCID-fw24-pxsc-7bek"},{"vulnerability":"VCID-g1k8-4mbb-fyew"},{"vulnerability":"VCID-gxnr-jbzt-cffq"},{"vulnerability":"VCID-h9ks-v96k-wkf7"},{"vulnerability":"VCID-j7wp-941h-p3fc"},{"vulnerability":"VCID-m5db-wq6e-gqeu"},{"vulnerability":"VCID-pfcp-7vj5-rqef"},{"vulnerability":"VCID-tff5-wrpr-hbe1"},{"vulnerability":"VCID-tteq-u99e-ayg4"},{"vulnerability":"VCID-vnmz-rcby-n3gs"},{"vulnerability":"VCID-xxgu-jjrs-pkaz"},{"vulnerability":"VCID-ybgy-yct3-6fba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-17%252Blenny3.2"}],"aliases":["CVE-2007-1246"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xfdf-djbw-3yht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92899?format=json","vulnerability_id":"VCID-xxgu-jjrs-pkaz","summary":"Integer overflow in the demuxer function in libmpdemux/demux_gif.c in Mplayer allows remote attackers to cause a denial of service (crash) via large dimensions in a gif file.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4352","reference_id":"","reference_type":"","scores":[{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42241","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42316","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42345","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42286","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42334","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42342","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42365","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42328","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.423","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.4235","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42326","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42253","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42185","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.4218","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42098","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.41956","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4352"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4352","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4352"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823723","reference_id":"823723","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823723"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049111?format=json","purl":"pkg:deb/debian/mplayer@2:1.3.0-6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4jd9-pt54-1bag"},{"vulnerability":"VCID-8uk8-jxh7-k7aa"},{"vulnerability":"VCID-9tg7-9r5m-dkgn"},{"vulnerability":"VCID-9vx1-3zb9-5bf1"},{"vulnerability":"VCID-e178-xa31-h3c4"},{"vulnerability":"VCID-g1k8-4mbb-fyew"},{"vulnerability":"VCID-m5db-wq6e-gqeu"},{"vulnerability":"VCID-pfcp-7vj5-rqef"},{"vulnerability":"VCID-tff5-wrpr-hbe1"},{"vulnerability":"VCID-vnmz-rcby-n3gs"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.3.0-6"}],"aliases":["CVE-2016-4352"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xxgu-jjrs-pkaz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34980?format=json","vulnerability_id":"VCID-ybgy-yct3-6fba","summary":"Multiple vulnerabilities have been found in MPlayer and the bundled\n    FFmpeg, the worst of which may lead to the execution of arbitrary code.","references":[{"reference_url":"http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=dc74600c97eb834c08674676e209afa842053aca","reference_id":"","reference_type":"","scores":[],"url":"http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=dc74600c97eb834c08674676e209afa842053aca"},{"reference_url":"http://openwall.com/lists/oss-security/2010/06/04/4","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2010/06/04/4"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2062","reference_id":"","reference_type":"","scores":[{"value":"0.02991","scoring_system":"epss","scoring_elements":"0.86607","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02991","scoring_system":"epss","scoring_elements":"0.86483","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02991","scoring_system":"epss","scoring_elements":"0.86493","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02991","scoring_system":"epss","scoring_elements":"0.86512","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02991","scoring_system":"epss","scoring_elements":"0.86511","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02991","scoring_system":"epss","scoring_elements":"0.86531","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02991","scoring_system":"epss","scoring_elements":"0.86541","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02991","scoring_system":"epss","scoring_elements":"0.86556","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02991","scoring_system":"epss","scoring_elements":"0.86552","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02991","scoring_system":"epss","scoring_elements":"0.86547","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02991","scoring_system":"epss","scoring_elements":"0.86561","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02991","scoring_system":"epss","scoring_elements":"0.86567","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02991","scoring_system":"epss","scoring_elements":"0.8656","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02991","scoring_system":"epss","scoring_elements":"0.86578","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02991","scoring_system":"epss","scoring_elements":"0.86587","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02991","scoring_system":"epss","scoring_elements":"0.86586","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2062"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2062","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2062"},{"reference_url":"https://dzcore.wordpress.com/2009/07/27/dzc-2009-001-the-movie-player-and-vlc-media-player-real-data-transport-parsing-integer-underflow/","reference_id":"","reference_type":"","scores":[],"url":"https://dzcore.wordpress.com/2009/07/27/dzc-2009-001-the-movie-player-and-vlc-media-player-real-data-transport-parsing-integer-underflow/"},{"reference_url":"http://seclists.org/fulldisclosure/2009/Jul/418","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2009/Jul/418"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=581245","reference_id":"581245","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=581245"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1337:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:videolan:vlc_media_player:0.8.1337:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1337:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2062","reference_id":"CVE-2010-2062","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2062"},{"reference_url":"https://security.gentoo.org/glsa/201310-13","reference_id":"GLSA-201310-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-13"},{"reference_url":"https://security.gentoo.org/glsa/201411-01","reference_id":"GLSA-201411-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201411-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035197?format=json","purl":"pkg:deb/debian/mplayer@2:1.0~rc3%2B%2Bfinal.dfsg1-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4jd9-pt54-1bag"},{"vulnerability":"VCID-8uk8-jxh7-k7aa"},{"vulnerability":"VCID-9tg7-9r5m-dkgn"},{"vulnerability":"VCID-9vx1-3zb9-5bf1"},{"vulnerability":"VCID-e178-xa31-h3c4"},{"vulnerability":"VCID-fjy3-bfzh-7beu"},{"vulnerability":"VCID-g1k8-4mbb-fyew"},{"vulnerability":"VCID-h9ks-v96k-wkf7"},{"vulnerability":"VCID-m5db-wq6e-gqeu"},{"vulnerability":"VCID-pfcp-7vj5-rqef"},{"vulnerability":"VCID-tff5-wrpr-hbe1"},{"vulnerability":"VCID-vnmz-rcby-n3gs"},{"vulnerability":"VCID-xxgu-jjrs-pkaz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.0~rc3%252B%252Bfinal.dfsg1-1"}],"aliases":["CVE-2010-2062"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ybgy-yct3-6fba"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc1-12etch"}