Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/libvorbisidec@1.0.2%2Bsvn18153-0.2
Typedeb
Namespacedebian
Namelibvorbisidec
Version1.0.2+svn18153-0.2
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.2.1+git20180316-3
Latest_non_vulnerable_version1.2.1+git20180316-3
Affected_by_vulnerabilities
0
url VCID-bxdr-5t7k-rbdn
vulnerability_id VCID-bxdr-5t7k-rbdn
summary The libtremor library has the same flaw as CVE-2018-5146. This library is used by Firefox in place of libvorbis on Android and ARM platforms.*Update: The 52.7.2 source release accidentally did not include this patch (the Mozilla-produced 52.7.2 binaries are fine). Anyone building 52.7.2 on ARM should use revision 5cd5586a2f48424a9031a3fa4c782954a9df9a52 instead of the released source.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5147
reference_id
reference_type
scores
0
value 0.01425
scoring_system epss
scoring_elements 0.8071
published_at 2026-05-05T12:55:00Z
1
value 0.01425
scoring_system epss
scoring_elements 0.80564
published_at 2026-04-01T12:55:00Z
2
value 0.01425
scoring_system epss
scoring_elements 0.80649
published_at 2026-04-18T12:55:00Z
3
value 0.01425
scoring_system epss
scoring_elements 0.80652
published_at 2026-04-21T12:55:00Z
4
value 0.01425
scoring_system epss
scoring_elements 0.80677
published_at 2026-04-24T12:55:00Z
5
value 0.01425
scoring_system epss
scoring_elements 0.8068
published_at 2026-04-26T12:55:00Z
6
value 0.01425
scoring_system epss
scoring_elements 0.80693
published_at 2026-04-29T12:55:00Z
7
value 0.01425
scoring_system epss
scoring_elements 0.80571
published_at 2026-04-02T12:55:00Z
8
value 0.01425
scoring_system epss
scoring_elements 0.80593
published_at 2026-04-04T12:55:00Z
9
value 0.01425
scoring_system epss
scoring_elements 0.80585
published_at 2026-04-07T12:55:00Z
10
value 0.01425
scoring_system epss
scoring_elements 0.80613
published_at 2026-04-08T12:55:00Z
11
value 0.01425
scoring_system epss
scoring_elements 0.80623
published_at 2026-04-09T12:55:00Z
12
value 0.01425
scoring_system epss
scoring_elements 0.80639
published_at 2026-04-11T12:55:00Z
13
value 0.01425
scoring_system epss
scoring_elements 0.80626
published_at 2026-04-12T12:55:00Z
14
value 0.01425
scoring_system epss
scoring_elements 0.80618
published_at 2026-04-13T12:55:00Z
15
value 0.01425
scoring_system epss
scoring_elements 0.80646
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5147
1
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1446365
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1446365
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5146
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5146
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5147
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://lists.debian.org/debian-lts-announce/2018/03/msg00016.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/03/msg00016.html
6
reference_url https://lists.debian.org/debian-lts-announce/2018/03/msg00022.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/03/msg00022.html
7
reference_url https://www.debian.org/security/2018/dsa-4141
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4141
8
reference_url https://www.debian.org/security/2018/dsa-4143
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4143
9
reference_url https://www.mozilla.org/security/advisories/mfsa2018-08/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2018-08/
10
reference_url http://www.securityfocus.com/bid/103432
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/103432
11
reference_url http://www.securitytracker.com/id/1040544
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1040544
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893132
reference_id 893132
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893132
13
reference_url https://security.archlinux.org/AVG-659
reference_id AVG-659
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-659
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-5147
reference_id CVE-2018-5147
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-5147
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2018-08
reference_id mfsa2018-08
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2018-08
fixed_packages
0
url pkg:deb/debian/libvorbisidec@1.0.2%2Bsvn18153-1~deb8u2
purl pkg:deb/debian/libvorbisidec@1.0.2%2Bsvn18153-1~deb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bxdr-5t7k-rbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.0.2%252Bsvn18153-1~deb8u2
1
url pkg:deb/debian/libvorbisidec@1.0.2%2Bsvn18153-1%2Bdeb9u1
purl pkg:deb/debian/libvorbisidec@1.0.2%2Bsvn18153-1%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bxdr-5t7k-rbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.0.2%252Bsvn18153-1%252Bdeb9u1
2
url pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-3
purl pkg:deb/debian/libvorbisidec@1.2.1%2Bgit20180316-3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.2.1%252Bgit20180316-3
aliases CVE-2018-5147
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bxdr-5t7k-rbdn
Fixing_vulnerabilities
0
url VCID-12w2-ffkf-7bfv
vulnerability_id VCID-12w2-ffkf-7bfv
summary vorbis: insufficient validation of Huffman tree causing memory corruption in _make_decode_tree()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2009.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2009.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-2009
reference_id
reference_type
scores
0
value 0.0434
scoring_system epss
scoring_elements 0.88877
published_at 2026-04-01T12:55:00Z
1
value 0.0434
scoring_system epss
scoring_elements 0.88885
published_at 2026-04-02T12:55:00Z
2
value 0.0434
scoring_system epss
scoring_elements 0.889
published_at 2026-04-04T12:55:00Z
3
value 0.0434
scoring_system epss
scoring_elements 0.88903
published_at 2026-04-07T12:55:00Z
4
value 0.0434
scoring_system epss
scoring_elements 0.88921
published_at 2026-04-08T12:55:00Z
5
value 0.0434
scoring_system epss
scoring_elements 0.88927
published_at 2026-04-09T12:55:00Z
6
value 0.0434
scoring_system epss
scoring_elements 0.88938
published_at 2026-04-11T12:55:00Z
7
value 0.0434
scoring_system epss
scoring_elements 0.88933
published_at 2026-04-12T12:55:00Z
8
value 0.0434
scoring_system epss
scoring_elements 0.88932
published_at 2026-04-13T12:55:00Z
9
value 0.0434
scoring_system epss
scoring_elements 0.88946
published_at 2026-04-16T12:55:00Z
10
value 0.0434
scoring_system epss
scoring_elements 0.88944
published_at 2026-04-18T12:55:00Z
11
value 0.0434
scoring_system epss
scoring_elements 0.8894
published_at 2026-04-21T12:55:00Z
12
value 0.0434
scoring_system epss
scoring_elements 0.88957
published_at 2026-04-24T12:55:00Z
13
value 0.0434
scoring_system epss
scoring_elements 0.88965
published_at 2026-04-26T12:55:00Z
14
value 0.0434
scoring_system epss
scoring_elements 0.88966
published_at 2026-04-29T12:55:00Z
15
value 0.0434
scoring_system epss
scoring_elements 0.88973
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-2009
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2009
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=444443
reference_id 444443
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=444443
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=482039
reference_id 482039
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=482039
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669196
reference_id 669196
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669196
6
reference_url https://access.redhat.com/errata/RHSA-2008:0271
reference_id RHSA-2008:0271
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0271
7
reference_url https://usn.ubuntu.com/861-1/
reference_id USN-861-1
reference_type
scores
url https://usn.ubuntu.com/861-1/
fixed_packages
0
url pkg:deb/debian/libvorbisidec@1.0.2%2Bsvn18153-0.2
purl pkg:deb/debian/libvorbisidec@1.0.2%2Bsvn18153-0.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bxdr-5t7k-rbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.0.2%252Bsvn18153-0.2
aliases CVE-2008-2009
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-12w2-ffkf-7bfv
1
url VCID-55cd-r9yc-nfan
vulnerability_id VCID-55cd-r9yc-nfan
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3379.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3379.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3379
reference_id
reference_type
scores
0
value 0.04866
scoring_system epss
scoring_elements 0.89592
published_at 2026-05-05T12:55:00Z
1
value 0.04866
scoring_system epss
scoring_elements 0.89515
published_at 2026-04-01T12:55:00Z
2
value 0.04866
scoring_system epss
scoring_elements 0.89519
published_at 2026-04-02T12:55:00Z
3
value 0.04866
scoring_system epss
scoring_elements 0.89532
published_at 2026-04-07T12:55:00Z
4
value 0.04866
scoring_system epss
scoring_elements 0.89548
published_at 2026-04-08T12:55:00Z
5
value 0.04866
scoring_system epss
scoring_elements 0.89553
published_at 2026-04-09T12:55:00Z
6
value 0.04866
scoring_system epss
scoring_elements 0.8956
published_at 2026-04-11T12:55:00Z
7
value 0.04866
scoring_system epss
scoring_elements 0.89559
published_at 2026-04-12T12:55:00Z
8
value 0.04866
scoring_system epss
scoring_elements 0.89554
published_at 2026-04-13T12:55:00Z
9
value 0.04866
scoring_system epss
scoring_elements 0.89567
published_at 2026-04-16T12:55:00Z
10
value 0.04866
scoring_system epss
scoring_elements 0.89569
published_at 2026-04-18T12:55:00Z
11
value 0.04866
scoring_system epss
scoring_elements 0.89565
published_at 2026-04-21T12:55:00Z
12
value 0.04866
scoring_system epss
scoring_elements 0.8958
published_at 2026-04-24T12:55:00Z
13
value 0.04866
scoring_system epss
scoring_elements 0.89584
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3379
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=531765
reference_id 531765
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=531765
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669196
reference_id 669196
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669196
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3379
reference_id CVE-2009-3379
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3379
5
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-63
reference_id mfsa2009-63
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-63
7
reference_url https://access.redhat.com/errata/RHSA-2009:1561
reference_id RHSA-2009:1561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1561
8
reference_url https://usn.ubuntu.com/861-1/
reference_id USN-861-1
reference_type
scores
url https://usn.ubuntu.com/861-1/
fixed_packages
0
url pkg:deb/debian/libvorbisidec@1.0.2%2Bsvn18153-0.2
purl pkg:deb/debian/libvorbisidec@1.0.2%2Bsvn18153-0.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bxdr-5t7k-rbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.0.2%252Bsvn18153-0.2
aliases CVE-2009-3379
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-55cd-r9yc-nfan
2
url VCID-c3vm-d9f5-2kcj
vulnerability_id VCID-c3vm-d9f5-2kcj
summary
Multiple vulnerabilities in libvorbis might lead to the execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1419.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1419.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1419
reference_id
reference_type
scores
0
value 0.13143
scoring_system epss
scoring_elements 0.94079
published_at 2026-04-01T12:55:00Z
1
value 0.13143
scoring_system epss
scoring_elements 0.94089
published_at 2026-04-02T12:55:00Z
2
value 0.13143
scoring_system epss
scoring_elements 0.94099
published_at 2026-04-04T12:55:00Z
3
value 0.13143
scoring_system epss
scoring_elements 0.94103
published_at 2026-04-07T12:55:00Z
4
value 0.13143
scoring_system epss
scoring_elements 0.94112
published_at 2026-04-08T12:55:00Z
5
value 0.13143
scoring_system epss
scoring_elements 0.94116
published_at 2026-04-09T12:55:00Z
6
value 0.13143
scoring_system epss
scoring_elements 0.94121
published_at 2026-04-13T12:55:00Z
7
value 0.13143
scoring_system epss
scoring_elements 0.94137
published_at 2026-04-16T12:55:00Z
8
value 0.13143
scoring_system epss
scoring_elements 0.94142
published_at 2026-04-21T12:55:00Z
9
value 0.13143
scoring_system epss
scoring_elements 0.94145
published_at 2026-04-29T12:55:00Z
10
value 0.13143
scoring_system epss
scoring_elements 0.9415
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1419
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1419
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=440700
reference_id 440700
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=440700
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=482518
reference_id 482518
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=482518
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669196
reference_id 669196
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669196
6
reference_url https://security.gentoo.org/glsa/200806-09
reference_id GLSA-200806-09
reference_type
scores
url https://security.gentoo.org/glsa/200806-09
7
reference_url https://access.redhat.com/errata/RHSA-2008:0270
reference_id RHSA-2008:0270
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0270
8
reference_url https://access.redhat.com/errata/RHSA-2008:0271
reference_id RHSA-2008:0271
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0271
9
reference_url https://usn.ubuntu.com/682-1/
reference_id USN-682-1
reference_type
scores
url https://usn.ubuntu.com/682-1/
fixed_packages
0
url pkg:deb/debian/libvorbisidec@1.0.2%2Bsvn18153-0.2
purl pkg:deb/debian/libvorbisidec@1.0.2%2Bsvn18153-0.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bxdr-5t7k-rbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.0.2%252Bsvn18153-0.2
aliases CVE-2008-1419
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c3vm-d9f5-2kcj
3
url VCID-gajm-zb2s-ukgz
vulnerability_id VCID-gajm-zb2s-ukgz
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0444.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0444.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0444
reference_id
reference_type
scores
0
value 0.08566
scoring_system epss
scoring_elements 0.9243
published_at 2026-05-05T12:55:00Z
1
value 0.08566
scoring_system epss
scoring_elements 0.92368
published_at 2026-04-01T12:55:00Z
2
value 0.08566
scoring_system epss
scoring_elements 0.92375
published_at 2026-04-02T12:55:00Z
3
value 0.08566
scoring_system epss
scoring_elements 0.92382
published_at 2026-04-04T12:55:00Z
4
value 0.08566
scoring_system epss
scoring_elements 0.92386
published_at 2026-04-07T12:55:00Z
5
value 0.08566
scoring_system epss
scoring_elements 0.92398
published_at 2026-04-08T12:55:00Z
6
value 0.08566
scoring_system epss
scoring_elements 0.92402
published_at 2026-04-09T12:55:00Z
7
value 0.08566
scoring_system epss
scoring_elements 0.92408
published_at 2026-04-11T12:55:00Z
8
value 0.08566
scoring_system epss
scoring_elements 0.92411
published_at 2026-04-12T12:55:00Z
9
value 0.08566
scoring_system epss
scoring_elements 0.92409
published_at 2026-04-13T12:55:00Z
10
value 0.08566
scoring_system epss
scoring_elements 0.9242
published_at 2026-04-16T12:55:00Z
11
value 0.08566
scoring_system epss
scoring_elements 0.92419
published_at 2026-04-29T12:55:00Z
12
value 0.08566
scoring_system epss
scoring_elements 0.92421
published_at 2026-04-21T12:55:00Z
13
value 0.08566
scoring_system epss
scoring_elements 0.92425
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0444
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=664197
reference_id 664197
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=664197
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669196
reference_id 669196
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669196
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=786026
reference_id 786026
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=786026
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0444
reference_id CVE-2012-0444
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0444
6
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-07
reference_id mfsa2012-07
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-07
8
reference_url https://access.redhat.com/errata/RHSA-2012:0079
reference_id RHSA-2012:0079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0079
9
reference_url https://access.redhat.com/errata/RHSA-2012:0136
reference_id RHSA-2012:0136
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0136
10
reference_url https://usn.ubuntu.com/1350-1/
reference_id USN-1350-1
reference_type
scores
url https://usn.ubuntu.com/1350-1/
11
reference_url https://usn.ubuntu.com/1353-1/
reference_id USN-1353-1
reference_type
scores
url https://usn.ubuntu.com/1353-1/
12
reference_url https://usn.ubuntu.com/1355-1/
reference_id USN-1355-1
reference_type
scores
url https://usn.ubuntu.com/1355-1/
13
reference_url https://usn.ubuntu.com/1369-1/
reference_id USN-1369-1
reference_type
scores
url https://usn.ubuntu.com/1369-1/
14
reference_url https://usn.ubuntu.com/1370-1/
reference_id USN-1370-1
reference_type
scores
url https://usn.ubuntu.com/1370-1/
fixed_packages
0
url pkg:deb/debian/libvorbisidec@1.0.2%2Bsvn18153-0.2
purl pkg:deb/debian/libvorbisidec@1.0.2%2Bsvn18153-0.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bxdr-5t7k-rbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.0.2%252Bsvn18153-0.2
aliases CVE-2012-0444
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gajm-zb2s-ukgz
4
url VCID-mddv-hvgp-u3aa
vulnerability_id VCID-mddv-hvgp-u3aa
summary
Multiple vulnerabilities in libvorbis might lead to the execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1423.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1423.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1423
reference_id
reference_type
scores
0
value 0.10744
scoring_system epss
scoring_elements 0.93303
published_at 2026-04-01T12:55:00Z
1
value 0.10744
scoring_system epss
scoring_elements 0.93312
published_at 2026-04-02T12:55:00Z
2
value 0.10744
scoring_system epss
scoring_elements 0.93317
published_at 2026-04-04T12:55:00Z
3
value 0.10744
scoring_system epss
scoring_elements 0.93316
published_at 2026-04-07T12:55:00Z
4
value 0.10744
scoring_system epss
scoring_elements 0.93324
published_at 2026-04-08T12:55:00Z
5
value 0.10744
scoring_system epss
scoring_elements 0.93329
published_at 2026-04-09T12:55:00Z
6
value 0.10744
scoring_system epss
scoring_elements 0.93333
published_at 2026-04-13T12:55:00Z
7
value 0.10744
scoring_system epss
scoring_elements 0.93332
published_at 2026-04-12T12:55:00Z
8
value 0.10744
scoring_system epss
scoring_elements 0.9335
published_at 2026-04-16T12:55:00Z
9
value 0.10744
scoring_system epss
scoring_elements 0.93355
published_at 2026-04-18T12:55:00Z
10
value 0.10744
scoring_system epss
scoring_elements 0.93362
published_at 2026-04-21T12:55:00Z
11
value 0.10744
scoring_system epss
scoring_elements 0.93367
published_at 2026-04-24T12:55:00Z
12
value 0.10744
scoring_system epss
scoring_elements 0.93363
published_at 2026-04-26T12:55:00Z
13
value 0.10744
scoring_system epss
scoring_elements 0.9336
published_at 2026-04-29T12:55:00Z
14
value 0.10744
scoring_system epss
scoring_elements 0.93368
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1423
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1423
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1423
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=440709
reference_id 440709
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=440709
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=482518
reference_id 482518
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=482518
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669196
reference_id 669196
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669196
6
reference_url https://security.gentoo.org/glsa/200806-09
reference_id GLSA-200806-09
reference_type
scores
url https://security.gentoo.org/glsa/200806-09
7
reference_url https://access.redhat.com/errata/RHSA-2008:0270
reference_id RHSA-2008:0270
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0270
8
reference_url https://access.redhat.com/errata/RHSA-2008:0271
reference_id RHSA-2008:0271
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0271
9
reference_url https://usn.ubuntu.com/682-1/
reference_id USN-682-1
reference_type
scores
url https://usn.ubuntu.com/682-1/
fixed_packages
0
url pkg:deb/debian/libvorbisidec@1.0.2%2Bsvn18153-0.2
purl pkg:deb/debian/libvorbisidec@1.0.2%2Bsvn18153-0.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bxdr-5t7k-rbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.0.2%252Bsvn18153-0.2
aliases CVE-2008-1423
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mddv-hvgp-u3aa
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbisidec@1.0.2%252Bsvn18153-0.2