{"url":"http://public2.vulnerablecode.io/api/packages/1038145?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.10.4-1","type":"deb","namespace":"debian","name":"gst-plugins-good1.0","version":"1.10.4-1","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"1.28.2-4","latest_non_vulnerable_version":"1.28.2-4","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58850?format=json","vulnerability_id":"VCID-1kjc-6zdm-jkf3","summary":"Multiple vulnerabilities have been discovered in gst-plugins-good, the worst of which could lead to denial of service or arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1922.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1922.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1922","reference_id":"","reference_type":"","scores":[{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12955","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12901","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12903","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13003","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13023","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12992","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12887","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12803","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17595","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17495","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17499","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17548","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17662","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17708","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17428","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.1752","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17581","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1922"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2130955","reference_id":"2130955","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2130955"},{"reference_url":"https://security.gentoo.org/glsa/202409-13","reference_id":"GLSA-202409-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2260","reference_id":"RHSA-2023:2260","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2260"},{"reference_url":"https://usn.ubuntu.com/5555-1/","reference_id":"USN-5555-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5555-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995066?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1g9u-gemh-83bw"},{"vulnerability":"VCID-2nz4-ctek-zbfy"},{"vulnerability":"VCID-358j-grsx-27fn"},{"vulnerability":"VCID-3qta-hpkg-hqad"},{"vulnerability":"VCID-4ka2-hbcv-8uh2"},{"vulnerability":"VCID-528p-7av9-1kgv"},{"vulnerability":"VCID-5ry6-b22q-37gy"},{"vulnerability":"VCID-6hjf-zva4-ekcv"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-7q23-vqfb-mfh8"},{"vulnerability":"VCID-92kd-us53-qubg"},{"vulnerability":"VCID-a741-fvg4-h3at"},{"vulnerability":"VCID-bpqa-ngtx-pbes"},{"vulnerability":"VCID-f1qr-vrev-tbdc"},{"vulnerability":"VCID-fp9x-81jx-fbhz"},{"vulnerability":"VCID-h2zj-j6va-v7hs"},{"vulnerability":"VCID-hatr-ngra-qqb6"},{"vulnerability":"VCID-hmn3-mxh5-73fj"},{"vulnerability":"VCID-hxhp-4xdt-fqfp"},{"vulnerability":"VCID-jzft-takg-afb4"},{"vulnerability":"VCID-kfe8-dy9e-ryc5"},{"vulnerability":"VCID-n1x7-a5e5-ckec"},{"vulnerability":"VCID-p46s-buwz-h3by"},{"vulnerability":"VCID-t93h-vv13-4bck"},{"vulnerability":"VCID-uj8y-np9h-8qg6"},{"vulnerability":"VCID-upbh-pvqc-4ubn"},{"vulnerability":"VCID-v4u8-zktd-cfaq"},{"vulnerability":"VCID-wxcy-bnsr-qkdn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2"}],"aliases":["CVE-2022-1922"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1kjc-6zdm-jkf3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36387?format=json","vulnerability_id":"VCID-2nz4-ctek-zbfy","summary":"Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47603.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47603.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47603","reference_id":"","reference_type":"","scores":[{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30149","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30196","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41544","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41536","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41566","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41533","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41519","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41564","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41538","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41463","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41357","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41352","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41274","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41486","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.5433","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54287","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54387","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47603"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47603"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331762","reference_id":"2331762","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331762"},{"reference_url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch","reference_id":"8057.patch","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T20:38:14Z/"}],"url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch"},{"reference_url":"https://securitylab.github.com/advisories/GHSL-2024-251_Gstreamer/","reference_id":"GHSL-2024-251_Gstreamer","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T20:38:14Z/"}],"url":"https://securitylab.github.com/advisories/GHSL-2024-251_Gstreamer/"},{"reference_url":"https://security.gentoo.org/glsa/202506-02","reference_id":"GLSA-202506-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7242","reference_id":"RHSA-2025:7242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7242"},{"reference_url":"https://gstreamer.freedesktop.org/security/sa-2024-0021.html","reference_id":"sa-2024-0021.html","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T20:38:14Z/"}],"url":"https://gstreamer.freedesktop.org/security/sa-2024-0021.html"},{"reference_url":"https://usn.ubuntu.com/7176-1/","reference_id":"USN-7176-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7176-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995067?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1g9u-gemh-83bw"},{"vulnerability":"VCID-4ka2-hbcv-8uh2"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-7q23-vqfb-mfh8"},{"vulnerability":"VCID-upbh-pvqc-4ubn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3"}],"aliases":["CVE-2024-47603"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2nz4-ctek-zbfy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36368?format=json","vulnerability_id":"VCID-358j-grsx-27fn","summary":"Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47539.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47539.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47539","reference_id":"","reference_type":"","scores":[{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3101","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.31058","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42632","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42621","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42655","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42619","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42591","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.4265","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42636","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.4257","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42508","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42509","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42425","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42569","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63368","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63323","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.6342","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47539"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47539","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47539"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331726","reference_id":"2331726","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331726"},{"reference_url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch","reference_id":"8059.patch","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:41:01Z/"}],"url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch"},{"reference_url":"https://securitylab.github.com/advisories/GHSL-2024-195_Gstreamer/","reference_id":"GHSL-2024-195_Gstreamer","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:41:01Z/"}],"url":"https://securitylab.github.com/advisories/GHSL-2024-195_Gstreamer/"},{"reference_url":"https://security.gentoo.org/glsa/202506-02","reference_id":"GLSA-202506-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11119","reference_id":"RHSA-2024:11119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11119"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11121","reference_id":"RHSA-2024:11121","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11121"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11122","reference_id":"RHSA-2024:11122","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11122"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11148","reference_id":"RHSA-2024:11148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11149","reference_id":"RHSA-2024:11149","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11149"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11298","reference_id":"RHSA-2024:11298","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11298"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11299","reference_id":"RHSA-2024:11299","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11299"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11346","reference_id":"RHSA-2024:11346","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11346"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11348","reference_id":"RHSA-2024:11348","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11348"},{"reference_url":"https://gstreamer.freedesktop.org/security/sa-2024-0007.html","reference_id":"sa-2024-0007.html","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:41:01Z/"}],"url":"https://gstreamer.freedesktop.org/security/sa-2024-0007.html"},{"reference_url":"https://usn.ubuntu.com/7176-1/","reference_id":"USN-7176-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7176-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995067?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1g9u-gemh-83bw"},{"vulnerability":"VCID-4ka2-hbcv-8uh2"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-7q23-vqfb-mfh8"},{"vulnerability":"VCID-upbh-pvqc-4ubn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3"}],"aliases":["CVE-2024-47539"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-358j-grsx-27fn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36399?format=json","vulnerability_id":"VCID-3qta-hpkg-hqad","summary":"Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47834.json","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47834.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47834","reference_id":"","reference_type":"","scores":[{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21348","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21403","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30766","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30734","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30769","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30726","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.3068","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30704","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30686","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30653","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30476","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30362","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30281","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30675","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48903","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.4884","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48931","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47834"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47834","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47834"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331749","reference_id":"2331749","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331749"},{"reference_url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch","reference_id":"8057.patch","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:15:13Z/"}],"url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch"},{"reference_url":"https://securitylab.github.com/advisories/GHSL-2024-280_Gstreamer/","reference_id":"GHSL-2024-280_Gstreamer","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:15:13Z/"}],"url":"https://securitylab.github.com/advisories/GHSL-2024-280_Gstreamer/"},{"reference_url":"https://security.gentoo.org/glsa/202506-02","reference_id":"GLSA-202506-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7242","reference_id":"RHSA-2025:7242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7242"},{"reference_url":"https://gstreamer.freedesktop.org/security/sa-2024-0030.html","reference_id":"sa-2024-0030.html","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:15:13Z/"}],"url":"https://gstreamer.freedesktop.org/security/sa-2024-0030.html"},{"reference_url":"https://usn.ubuntu.com/7176-1/","reference_id":"USN-7176-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7176-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995067?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1g9u-gemh-83bw"},{"vulnerability":"VCID-4ka2-hbcv-8uh2"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-7q23-vqfb-mfh8"},{"vulnerability":"VCID-upbh-pvqc-4ubn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3"}],"aliases":["CVE-2024-47834"],"risk_score":2.3,"exploitability":"0.5","weighted_severity":"4.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3qta-hpkg-hqad"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58849?format=json","vulnerability_id":"VCID-521g-8qbp-cfh3","summary":"Multiple vulnerabilities have been discovered in gst-plugins-good, the worst of which could lead to denial of service or arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1921.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1921.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1921","reference_id":"","reference_type":"","scores":[{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13219","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13109","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13203","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13208","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13179","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13079","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12986","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13137","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17767","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17671","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17681","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17722","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17843","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17897","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17599","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17688","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17749","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1921"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2130949","reference_id":"2130949","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2130949"},{"reference_url":"https://security.gentoo.org/glsa/202409-13","reference_id":"GLSA-202409-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2260","reference_id":"RHSA-2023:2260","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2260"},{"reference_url":"https://usn.ubuntu.com/5555-1/","reference_id":"USN-5555-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5555-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995066?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1g9u-gemh-83bw"},{"vulnerability":"VCID-2nz4-ctek-zbfy"},{"vulnerability":"VCID-358j-grsx-27fn"},{"vulnerability":"VCID-3qta-hpkg-hqad"},{"vulnerability":"VCID-4ka2-hbcv-8uh2"},{"vulnerability":"VCID-528p-7av9-1kgv"},{"vulnerability":"VCID-5ry6-b22q-37gy"},{"vulnerability":"VCID-6hjf-zva4-ekcv"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-7q23-vqfb-mfh8"},{"vulnerability":"VCID-92kd-us53-qubg"},{"vulnerability":"VCID-a741-fvg4-h3at"},{"vulnerability":"VCID-bpqa-ngtx-pbes"},{"vulnerability":"VCID-f1qr-vrev-tbdc"},{"vulnerability":"VCID-fp9x-81jx-fbhz"},{"vulnerability":"VCID-h2zj-j6va-v7hs"},{"vulnerability":"VCID-hatr-ngra-qqb6"},{"vulnerability":"VCID-hmn3-mxh5-73fj"},{"vulnerability":"VCID-hxhp-4xdt-fqfp"},{"vulnerability":"VCID-jzft-takg-afb4"},{"vulnerability":"VCID-kfe8-dy9e-ryc5"},{"vulnerability":"VCID-n1x7-a5e5-ckec"},{"vulnerability":"VCID-p46s-buwz-h3by"},{"vulnerability":"VCID-t93h-vv13-4bck"},{"vulnerability":"VCID-uj8y-np9h-8qg6"},{"vulnerability":"VCID-upbh-pvqc-4ubn"},{"vulnerability":"VCID-v4u8-zktd-cfaq"},{"vulnerability":"VCID-wxcy-bnsr-qkdn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2"}],"aliases":["CVE-2022-1921"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-521g-8qbp-cfh3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36372?format=json","vulnerability_id":"VCID-528p-7av9-1kgv","summary":"Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47543.json","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47543.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47543","reference_id":"","reference_type":"","scores":[{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24637","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24674","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32793","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32829","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32852","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.3281","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32528","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32445","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32643","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32835","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34776","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34704","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34748","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.3478","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43382","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43476","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43458","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47543"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331723","reference_id":"2331723","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331723"},{"reference_url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch","reference_id":"8059.patch","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:29:43Z/"}],"url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch"},{"reference_url":"https://securitylab.github.com/advisories/GHSL-2024-236_Gstreamer/","reference_id":"GHSL-2024-236_Gstreamer","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:29:43Z/"}],"url":"https://securitylab.github.com/advisories/GHSL-2024-236_Gstreamer/"},{"reference_url":"https://security.gentoo.org/glsa/202506-02","reference_id":"GLSA-202506-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7242","reference_id":"RHSA-2025:7242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7242"},{"reference_url":"https://gstreamer.freedesktop.org/security/sa-2024-0009.html","reference_id":"sa-2024-0009.html","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:29:43Z/"}],"url":"https://gstreamer.freedesktop.org/security/sa-2024-0009.html"},{"reference_url":"https://usn.ubuntu.com/7176-1/","reference_id":"USN-7176-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7176-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995067?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1g9u-gemh-83bw"},{"vulnerability":"VCID-4ka2-hbcv-8uh2"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-7q23-vqfb-mfh8"},{"vulnerability":"VCID-upbh-pvqc-4ubn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3"}],"aliases":["CVE-2024-47543"],"risk_score":2.3,"exploitability":"0.5","weighted_severity":"4.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-528p-7av9-1kgv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36376?format=json","vulnerability_id":"VCID-5ry6-b22q-37gy","summary":"Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47596.json","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47596.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47596","reference_id":"","reference_type":"","scores":[{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23224","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23268","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32873","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32844","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32874","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32835","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.3281","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32852","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32829","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32793","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32643","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32528","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32445","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32796","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43458","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43382","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43476","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47596"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47596","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47596"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331747","reference_id":"2331747","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331747"},{"reference_url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch","reference_id":"8059.patch","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-13T17:41:58Z/"}],"url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch"},{"reference_url":"https://securitylab.github.com/advisories/GHSL-2024-244_Gstreamer/","reference_id":"GHSL-2024-244_Gstreamer","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-13T17:41:58Z/"}],"url":"https://securitylab.github.com/advisories/GHSL-2024-244_Gstreamer/"},{"reference_url":"https://security.gentoo.org/glsa/202506-02","reference_id":"GLSA-202506-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7242","reference_id":"RHSA-2025:7242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7242"},{"reference_url":"https://gstreamer.freedesktop.org/security/sa-2024-0015.html","reference_id":"sa-2024-0015.html","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-13T17:41:58Z/"}],"url":"https://gstreamer.freedesktop.org/security/sa-2024-0015.html"},{"reference_url":"https://usn.ubuntu.com/7176-1/","reference_id":"USN-7176-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7176-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995067?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1g9u-gemh-83bw"},{"vulnerability":"VCID-4ka2-hbcv-8uh2"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-7q23-vqfb-mfh8"},{"vulnerability":"VCID-upbh-pvqc-4ubn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3"}],"aliases":["CVE-2024-47596"],"risk_score":2.3,"exploitability":"0.5","weighted_severity":"4.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5ry6-b22q-37gy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58853?format=json","vulnerability_id":"VCID-6aaz-buqb-zfcm","summary":"Multiple vulnerabilities have been discovered in gst-plugins-good, the worst of which could lead to denial of service or arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1924.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1924.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1924","reference_id":"","reference_type":"","scores":[{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12955","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12901","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12903","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13003","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13023","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12992","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12887","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12803","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17595","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17495","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17499","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17548","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17662","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17708","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17428","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.1752","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17581","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2131003","reference_id":"2131003","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2131003"},{"reference_url":"https://security.gentoo.org/glsa/202409-13","reference_id":"GLSA-202409-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2260","reference_id":"RHSA-2023:2260","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2260"},{"reference_url":"https://usn.ubuntu.com/5555-1/","reference_id":"USN-5555-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5555-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995066?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1g9u-gemh-83bw"},{"vulnerability":"VCID-2nz4-ctek-zbfy"},{"vulnerability":"VCID-358j-grsx-27fn"},{"vulnerability":"VCID-3qta-hpkg-hqad"},{"vulnerability":"VCID-4ka2-hbcv-8uh2"},{"vulnerability":"VCID-528p-7av9-1kgv"},{"vulnerability":"VCID-5ry6-b22q-37gy"},{"vulnerability":"VCID-6hjf-zva4-ekcv"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-7q23-vqfb-mfh8"},{"vulnerability":"VCID-92kd-us53-qubg"},{"vulnerability":"VCID-a741-fvg4-h3at"},{"vulnerability":"VCID-bpqa-ngtx-pbes"},{"vulnerability":"VCID-f1qr-vrev-tbdc"},{"vulnerability":"VCID-fp9x-81jx-fbhz"},{"vulnerability":"VCID-h2zj-j6va-v7hs"},{"vulnerability":"VCID-hatr-ngra-qqb6"},{"vulnerability":"VCID-hmn3-mxh5-73fj"},{"vulnerability":"VCID-hxhp-4xdt-fqfp"},{"vulnerability":"VCID-jzft-takg-afb4"},{"vulnerability":"VCID-kfe8-dy9e-ryc5"},{"vulnerability":"VCID-n1x7-a5e5-ckec"},{"vulnerability":"VCID-p46s-buwz-h3by"},{"vulnerability":"VCID-t93h-vv13-4bck"},{"vulnerability":"VCID-uj8y-np9h-8qg6"},{"vulnerability":"VCID-upbh-pvqc-4ubn"},{"vulnerability":"VCID-v4u8-zktd-cfaq"},{"vulnerability":"VCID-wxcy-bnsr-qkdn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2"}],"aliases":["CVE-2022-1924"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6aaz-buqb-zfcm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36366?format=json","vulnerability_id":"VCID-6hjf-zva4-ekcv","summary":"Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47537.json","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47537.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47537","reference_id":"","reference_type":"","scores":[{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3101","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.31058","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42632","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42621","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42655","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42619","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42591","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.4265","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42636","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.4257","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42508","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42509","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42425","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42569","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63368","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63323","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.6342","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47537"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47537","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47537"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331722","reference_id":"2331722","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331722"},{"reference_url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch","reference_id":"8059.patch","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T19:15:39Z/"}],"url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch"},{"reference_url":"https://securitylab.github.com/advisories/GHSL-2024-094_Gstreamer/","reference_id":"GHSL-2024-094_Gstreamer","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T19:15:39Z/"}],"url":"https://securitylab.github.com/advisories/GHSL-2024-094_Gstreamer/"},{"reference_url":"https://security.gentoo.org/glsa/202506-02","reference_id":"GLSA-202506-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11119","reference_id":"RHSA-2024:11119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11119"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11121","reference_id":"RHSA-2024:11121","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11121"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11122","reference_id":"RHSA-2024:11122","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11122"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11148","reference_id":"RHSA-2024:11148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11149","reference_id":"RHSA-2024:11149","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11149"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11298","reference_id":"RHSA-2024:11298","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11298"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11299","reference_id":"RHSA-2024:11299","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11299"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11344","reference_id":"RHSA-2024:11344","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11344"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11346","reference_id":"RHSA-2024:11346","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11346"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11348","reference_id":"RHSA-2024:11348","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11348"},{"reference_url":"https://gstreamer.freedesktop.org/security/sa-2024-0005.html","reference_id":"sa-2024-0005.html","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T19:15:39Z/"}],"url":"https://gstreamer.freedesktop.org/security/sa-2024-0005.html"},{"reference_url":"https://usn.ubuntu.com/7176-1/","reference_id":"USN-7176-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7176-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995067?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1g9u-gemh-83bw"},{"vulnerability":"VCID-4ka2-hbcv-8uh2"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-7q23-vqfb-mfh8"},{"vulnerability":"VCID-upbh-pvqc-4ubn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3"}],"aliases":["CVE-2024-47537"],"risk_score":3.8,"exploitability":"0.5","weighted_severity":"7.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6hjf-zva4-ekcv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68427?format=json","vulnerability_id":"VCID-6rvw-7p62-rbdf","summary":"gstreamer1-plugins-good: GStreamer MP4 Parser Heap Overflow","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47183.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47183.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-47183","reference_id":"","reference_type":"","scores":[{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04027","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04068","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04046","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0406","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04066","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04085","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04223","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04199","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04169","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04178","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04306","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05898","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05888","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05852","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06503","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06695","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06631","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-47183"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47183","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47183"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2387141","reference_id":"2387141","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2387141"},{"reference_url":"https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md","reference_id":"ATREDIS-2025-0003.md","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-11T19:44:07Z/"}],"url":"https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md"},{"reference_url":"https://gstreamer.freedesktop.org/security/","reference_id":"security","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-11T19:44:07Z/"}],"url":"https://gstreamer.freedesktop.org/security/"},{"reference_url":"https://usn.ubuntu.com/7717-1/","reference_id":"USN-7717-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7717-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995067?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1g9u-gemh-83bw"},{"vulnerability":"VCID-4ka2-hbcv-8uh2"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-7q23-vqfb-mfh8"},{"vulnerability":"VCID-upbh-pvqc-4ubn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3"},{"url":"http://public2.vulnerablecode.io/api/packages/995068?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.26.2-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1g9u-gemh-83bw"},{"vulnerability":"VCID-4ka2-hbcv-8uh2"},{"vulnerability":"VCID-7q23-vqfb-mfh8"},{"vulnerability":"VCID-upbh-pvqc-4ubn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1"}],"aliases":["CVE-2025-47183"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6rvw-7p62-rbdf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35467?format=json","vulnerability_id":"VCID-771b-5s45-hbhd","summary":"Multiple vulnerabilities have been found in GStreamer and its plugins, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3497.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3497.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3497","reference_id":"","reference_type":"","scores":[{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38999","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39186","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39207","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39127","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39181","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39198","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39209","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39172","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39153","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39206","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39177","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39089","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38879","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38857","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38774","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38648","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38722","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38735","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3497"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3497","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3497"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3498","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3498"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1945339","reference_id":"1945339","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1945339"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986910","reference_id":"986910","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986910"},{"reference_url":"https://security.gentoo.org/glsa/202208-31","reference_id":"GLSA-202208-31","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-31"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7618","reference_id":"RHSA-2022:7618","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7618"},{"reference_url":"https://usn.ubuntu.com/4928-1/","reference_id":"USN-4928-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4928-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1038146?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.14.4-1%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1kjc-6zdm-jkf3"},{"vulnerability":"VCID-2nz4-ctek-zbfy"},{"vulnerability":"VCID-358j-grsx-27fn"},{"vulnerability":"VCID-3qta-hpkg-hqad"},{"vulnerability":"VCID-521g-8qbp-cfh3"},{"vulnerability":"VCID-528p-7av9-1kgv"},{"vulnerability":"VCID-5ry6-b22q-37gy"},{"vulnerability":"VCID-6aaz-buqb-zfcm"},{"vulnerability":"VCID-6hjf-zva4-ekcv"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-771b-5s45-hbhd"},{"vulnerability":"VCID-7nn4-cj6x-uff8"},{"vulnerability":"VCID-92kd-us53-qubg"},{"vulnerability":"VCID-a741-fvg4-h3at"},{"vulnerability":"VCID-bpqa-ngtx-pbes"},{"vulnerability":"VCID-exgv-kz5w-w3bq"},{"vulnerability":"VCID-f1qr-vrev-tbdc"},{"vulnerability":"VCID-fp9x-81jx-fbhz"},{"vulnerability":"VCID-h2zj-j6va-v7hs"},{"vulnerability":"VCID-hatr-ngra-qqb6"},{"vulnerability":"VCID-hmn3-mxh5-73fj"},{"vulnerability":"VCID-hxhp-4xdt-fqfp"},{"vulnerability":"VCID-jzft-takg-afb4"},{"vulnerability":"VCID-kfe8-dy9e-ryc5"},{"vulnerability":"VCID-m2g4-ecf6-sufy"},{"vulnerability":"VCID-n1x7-a5e5-ckec"},{"vulnerability":"VCID-p46s-buwz-h3by"},{"vulnerability":"VCID-t93h-vv13-4bck"},{"vulnerability":"VCID-tf3v-37zu-pkaf"},{"vulnerability":"VCID-uj8y-np9h-8qg6"},{"vulnerability":"VCID-v4u8-zktd-cfaq"},{"vulnerability":"VCID-wxcy-bnsr-qkdn"},{"vulnerability":"VCID-zup8-xngn-7bh7"},{"vulnerability":"VCID-zz2u-cmgw-k3c1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.14.4-1%252Bdeb10u1"},{"url":"http://public2.vulnerablecode.io/api/packages/995066?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1g9u-gemh-83bw"},{"vulnerability":"VCID-2nz4-ctek-zbfy"},{"vulnerability":"VCID-358j-grsx-27fn"},{"vulnerability":"VCID-3qta-hpkg-hqad"},{"vulnerability":"VCID-4ka2-hbcv-8uh2"},{"vulnerability":"VCID-528p-7av9-1kgv"},{"vulnerability":"VCID-5ry6-b22q-37gy"},{"vulnerability":"VCID-6hjf-zva4-ekcv"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-7q23-vqfb-mfh8"},{"vulnerability":"VCID-92kd-us53-qubg"},{"vulnerability":"VCID-a741-fvg4-h3at"},{"vulnerability":"VCID-bpqa-ngtx-pbes"},{"vulnerability":"VCID-f1qr-vrev-tbdc"},{"vulnerability":"VCID-fp9x-81jx-fbhz"},{"vulnerability":"VCID-h2zj-j6va-v7hs"},{"vulnerability":"VCID-hatr-ngra-qqb6"},{"vulnerability":"VCID-hmn3-mxh5-73fj"},{"vulnerability":"VCID-hxhp-4xdt-fqfp"},{"vulnerability":"VCID-jzft-takg-afb4"},{"vulnerability":"VCID-kfe8-dy9e-ryc5"},{"vulnerability":"VCID-n1x7-a5e5-ckec"},{"vulnerability":"VCID-p46s-buwz-h3by"},{"vulnerability":"VCID-t93h-vv13-4bck"},{"vulnerability":"VCID-uj8y-np9h-8qg6"},{"vulnerability":"VCID-upbh-pvqc-4ubn"},{"vulnerability":"VCID-v4u8-zktd-cfaq"},{"vulnerability":"VCID-wxcy-bnsr-qkdn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2"}],"aliases":["CVE-2021-3497"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-771b-5s45-hbhd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35471?format=json","vulnerability_id":"VCID-7nn4-cj6x-uff8","summary":"Multiple vulnerabilities have been found in GStreamer and its plugins, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3498.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3498.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3498","reference_id":"","reference_type":"","scores":[{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46817","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46855","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46872","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.4682","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46875","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46874","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46897","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.4687","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46877","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46933","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46929","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46878","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46862","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46873","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46823","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46732","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46796","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46815","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3498"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3497","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3497"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3498","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3498"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1945342","reference_id":"1945342","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1945342"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986911","reference_id":"986911","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986911"},{"reference_url":"https://security.gentoo.org/glsa/202208-31","reference_id":"GLSA-202208-31","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-31"},{"reference_url":"https://usn.ubuntu.com/4928-1/","reference_id":"USN-4928-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4928-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1038146?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.14.4-1%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1kjc-6zdm-jkf3"},{"vulnerability":"VCID-2nz4-ctek-zbfy"},{"vulnerability":"VCID-358j-grsx-27fn"},{"vulnerability":"VCID-3qta-hpkg-hqad"},{"vulnerability":"VCID-521g-8qbp-cfh3"},{"vulnerability":"VCID-528p-7av9-1kgv"},{"vulnerability":"VCID-5ry6-b22q-37gy"},{"vulnerability":"VCID-6aaz-buqb-zfcm"},{"vulnerability":"VCID-6hjf-zva4-ekcv"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-771b-5s45-hbhd"},{"vulnerability":"VCID-7nn4-cj6x-uff8"},{"vulnerability":"VCID-92kd-us53-qubg"},{"vulnerability":"VCID-a741-fvg4-h3at"},{"vulnerability":"VCID-bpqa-ngtx-pbes"},{"vulnerability":"VCID-exgv-kz5w-w3bq"},{"vulnerability":"VCID-f1qr-vrev-tbdc"},{"vulnerability":"VCID-fp9x-81jx-fbhz"},{"vulnerability":"VCID-h2zj-j6va-v7hs"},{"vulnerability":"VCID-hatr-ngra-qqb6"},{"vulnerability":"VCID-hmn3-mxh5-73fj"},{"vulnerability":"VCID-hxhp-4xdt-fqfp"},{"vulnerability":"VCID-jzft-takg-afb4"},{"vulnerability":"VCID-kfe8-dy9e-ryc5"},{"vulnerability":"VCID-m2g4-ecf6-sufy"},{"vulnerability":"VCID-n1x7-a5e5-ckec"},{"vulnerability":"VCID-p46s-buwz-h3by"},{"vulnerability":"VCID-t93h-vv13-4bck"},{"vulnerability":"VCID-tf3v-37zu-pkaf"},{"vulnerability":"VCID-uj8y-np9h-8qg6"},{"vulnerability":"VCID-v4u8-zktd-cfaq"},{"vulnerability":"VCID-wxcy-bnsr-qkdn"},{"vulnerability":"VCID-zup8-xngn-7bh7"},{"vulnerability":"VCID-zz2u-cmgw-k3c1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.14.4-1%252Bdeb10u1"},{"url":"http://public2.vulnerablecode.io/api/packages/995066?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1g9u-gemh-83bw"},{"vulnerability":"VCID-2nz4-ctek-zbfy"},{"vulnerability":"VCID-358j-grsx-27fn"},{"vulnerability":"VCID-3qta-hpkg-hqad"},{"vulnerability":"VCID-4ka2-hbcv-8uh2"},{"vulnerability":"VCID-528p-7av9-1kgv"},{"vulnerability":"VCID-5ry6-b22q-37gy"},{"vulnerability":"VCID-6hjf-zva4-ekcv"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-7q23-vqfb-mfh8"},{"vulnerability":"VCID-92kd-us53-qubg"},{"vulnerability":"VCID-a741-fvg4-h3at"},{"vulnerability":"VCID-bpqa-ngtx-pbes"},{"vulnerability":"VCID-f1qr-vrev-tbdc"},{"vulnerability":"VCID-fp9x-81jx-fbhz"},{"vulnerability":"VCID-h2zj-j6va-v7hs"},{"vulnerability":"VCID-hatr-ngra-qqb6"},{"vulnerability":"VCID-hmn3-mxh5-73fj"},{"vulnerability":"VCID-hxhp-4xdt-fqfp"},{"vulnerability":"VCID-jzft-takg-afb4"},{"vulnerability":"VCID-kfe8-dy9e-ryc5"},{"vulnerability":"VCID-n1x7-a5e5-ckec"},{"vulnerability":"VCID-p46s-buwz-h3by"},{"vulnerability":"VCID-t93h-vv13-4bck"},{"vulnerability":"VCID-uj8y-np9h-8qg6"},{"vulnerability":"VCID-upbh-pvqc-4ubn"},{"vulnerability":"VCID-v4u8-zktd-cfaq"},{"vulnerability":"VCID-wxcy-bnsr-qkdn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2"}],"aliases":["CVE-2021-3498"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7nn4-cj6x-uff8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36378?format=json","vulnerability_id":"VCID-92kd-us53-qubg","summary":"Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47598.json","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47598.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47598","reference_id":"","reference_type":"","scores":[{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19956","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20013","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29239","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29135","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29199","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29245","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29147","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29174","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29151","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29102","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.28981","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.2887","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.28798","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00236","scoring_system":"epss","scoring_elements":"0.4644","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00236","scoring_system":"epss","scoring_elements":"0.4642","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00236","scoring_system":"epss","scoring_elements":"0.46354","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47598","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47598"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331761","reference_id":"2331761","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331761"},{"reference_url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch","reference_id":"8059.patch","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:40:02Z/"}],"url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch"},{"reference_url":"https://securitylab.github.com/advisories/GHSL-2024-246_Gstreamer/","reference_id":"GHSL-2024-246_Gstreamer","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:40:02Z/"}],"url":"https://securitylab.github.com/advisories/GHSL-2024-246_Gstreamer/"},{"reference_url":"https://security.gentoo.org/glsa/202506-02","reference_id":"GLSA-202506-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7242","reference_id":"RHSA-2025:7242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7242"},{"reference_url":"https://gstreamer.freedesktop.org/security/sa-2024-0006.html","reference_id":"sa-2024-0006.html","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:40:02Z/"}],"url":"https://gstreamer.freedesktop.org/security/sa-2024-0006.html"},{"reference_url":"https://usn.ubuntu.com/7176-1/","reference_id":"USN-7176-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7176-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995067?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1g9u-gemh-83bw"},{"vulnerability":"VCID-4ka2-hbcv-8uh2"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-7q23-vqfb-mfh8"},{"vulnerability":"VCID-upbh-pvqc-4ubn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3"}],"aliases":["CVE-2024-47598"],"risk_score":2.3,"exploitability":"0.5","weighted_severity":"4.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-92kd-us53-qubg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36394?format=json","vulnerability_id":"VCID-a741-fvg4-h3at","summary":"Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47775.json","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47775.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47775","reference_id":"","reference_type":"","scores":[{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20224","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20283","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29518","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29478","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29522","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29477","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29425","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29445","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29418","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29372","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29255","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29143","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29076","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29415","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.4697","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.46907","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.46989","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47775"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331744","reference_id":"2331744","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331744"},{"reference_url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8042.patch","reference_id":"8042.patch","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:06:26Z/"}],"url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8042.patch"},{"reference_url":"https://securitylab.github.com/advisories/GHSL-2024-261_Gstreamer/","reference_id":"GHSL-2024-261_Gstreamer","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:06:26Z/"}],"url":"https://securitylab.github.com/advisories/GHSL-2024-261_Gstreamer/"},{"reference_url":"https://security.gentoo.org/glsa/202506-02","reference_id":"GLSA-202506-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7242","reference_id":"RHSA-2025:7242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7242"},{"reference_url":"https://gstreamer.freedesktop.org/security/sa-2024-0027.html","reference_id":"sa-2024-0027.html","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:06:26Z/"}],"url":"https://gstreamer.freedesktop.org/security/sa-2024-0027.html"},{"reference_url":"https://usn.ubuntu.com/7176-1/","reference_id":"USN-7176-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7176-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995067?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1g9u-gemh-83bw"},{"vulnerability":"VCID-4ka2-hbcv-8uh2"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-7q23-vqfb-mfh8"},{"vulnerability":"VCID-upbh-pvqc-4ubn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3"}],"aliases":["CVE-2024-47775"],"risk_score":2.3,"exploitability":"0.5","weighted_severity":"4.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a741-fvg4-h3at"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68428?format=json","vulnerability_id":"VCID-bpqa-ngtx-pbes","summary":"gstreamer1-plugins-good: GStreamer MP4 Parser Heap Overflow","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47219.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47219.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-47219","reference_id":"","reference_type":"","scores":[{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26095","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26031","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26135","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25901","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25969","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.2602","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27982","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27874","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27917","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27935","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27924","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33254","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33356","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33336","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35572","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35502","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35594","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-47219"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47219","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47219"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2387142","reference_id":"2387142","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2387142"},{"reference_url":"https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md","reference_id":"ATREDIS-2025-0003.md","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-08-08T15:54:29Z/"}],"url":"https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md"},{"reference_url":"https://gstreamer.freedesktop.org/security/","reference_id":"security","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-08-08T15:54:29Z/"}],"url":"https://gstreamer.freedesktop.org/security/"},{"reference_url":"https://usn.ubuntu.com/7717-1/","reference_id":"USN-7717-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7717-1/"},{"reference_url":"https://usn.ubuntu.com/7837-1/","reference_id":"USN-7837-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7837-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995067?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1g9u-gemh-83bw"},{"vulnerability":"VCID-4ka2-hbcv-8uh2"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-7q23-vqfb-mfh8"},{"vulnerability":"VCID-upbh-pvqc-4ubn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3"}],"aliases":["CVE-2025-47219"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bpqa-ngtx-pbes"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58848?format=json","vulnerability_id":"VCID-exgv-kz5w-w3bq","summary":"Multiple vulnerabilities have been discovered in gst-plugins-good, the worst of which could lead to denial of service or arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1920.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1920.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1920","reference_id":"","reference_type":"","scores":[{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21961","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.2212","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22169","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21952","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22033","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22088","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22104","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22062","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22003","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22001","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21995","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21949","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21808","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21797","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21784","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21694","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21765","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21842","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1920"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2130935","reference_id":"2130935","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2130935"},{"reference_url":"https://security.gentoo.org/glsa/202409-13","reference_id":"GLSA-202409-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2260","reference_id":"RHSA-2023:2260","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2260"},{"reference_url":"https://usn.ubuntu.com/5555-1/","reference_id":"USN-5555-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5555-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995066?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1g9u-gemh-83bw"},{"vulnerability":"VCID-2nz4-ctek-zbfy"},{"vulnerability":"VCID-358j-grsx-27fn"},{"vulnerability":"VCID-3qta-hpkg-hqad"},{"vulnerability":"VCID-4ka2-hbcv-8uh2"},{"vulnerability":"VCID-528p-7av9-1kgv"},{"vulnerability":"VCID-5ry6-b22q-37gy"},{"vulnerability":"VCID-6hjf-zva4-ekcv"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-7q23-vqfb-mfh8"},{"vulnerability":"VCID-92kd-us53-qubg"},{"vulnerability":"VCID-a741-fvg4-h3at"},{"vulnerability":"VCID-bpqa-ngtx-pbes"},{"vulnerability":"VCID-f1qr-vrev-tbdc"},{"vulnerability":"VCID-fp9x-81jx-fbhz"},{"vulnerability":"VCID-h2zj-j6va-v7hs"},{"vulnerability":"VCID-hatr-ngra-qqb6"},{"vulnerability":"VCID-hmn3-mxh5-73fj"},{"vulnerability":"VCID-hxhp-4xdt-fqfp"},{"vulnerability":"VCID-jzft-takg-afb4"},{"vulnerability":"VCID-kfe8-dy9e-ryc5"},{"vulnerability":"VCID-n1x7-a5e5-ckec"},{"vulnerability":"VCID-p46s-buwz-h3by"},{"vulnerability":"VCID-t93h-vv13-4bck"},{"vulnerability":"VCID-uj8y-np9h-8qg6"},{"vulnerability":"VCID-upbh-pvqc-4ubn"},{"vulnerability":"VCID-v4u8-zktd-cfaq"},{"vulnerability":"VCID-wxcy-bnsr-qkdn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2"}],"aliases":["CVE-2022-1920"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-exgv-kz5w-w3bq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36384?format=json","vulnerability_id":"VCID-f1qr-vrev-tbdc","summary":"Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47601.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47601.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47601","reference_id":"","reference_type":"","scores":[{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28716","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28764","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39668","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39654","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39677","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39642","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39625","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39676","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39647","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39563","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39383","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39368","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39286","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39599","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52143","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52093","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52186","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47601"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331752","reference_id":"2331752","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331752"},{"reference_url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch","reference_id":"8057.patch","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:25:58Z/"}],"url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch"},{"reference_url":"https://securitylab.github.com/advisories/GHSL-2024-249_Gstreamer/","reference_id":"GHSL-2024-249_Gstreamer","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:25:58Z/"}],"url":"https://securitylab.github.com/advisories/GHSL-2024-249_Gstreamer/"},{"reference_url":"https://security.gentoo.org/glsa/202506-02","reference_id":"GLSA-202506-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7242","reference_id":"RHSA-2025:7242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7242"},{"reference_url":"https://gstreamer.freedesktop.org/security/sa-2024-0020.html","reference_id":"sa-2024-0020.html","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:25:58Z/"}],"url":"https://gstreamer.freedesktop.org/security/sa-2024-0020.html"},{"reference_url":"https://usn.ubuntu.com/7176-1/","reference_id":"USN-7176-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7176-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995067?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1g9u-gemh-83bw"},{"vulnerability":"VCID-4ka2-hbcv-8uh2"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-7q23-vqfb-mfh8"},{"vulnerability":"VCID-upbh-pvqc-4ubn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3"}],"aliases":["CVE-2024-47601"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f1qr-vrev-tbdc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36396?format=json","vulnerability_id":"VCID-fp9x-81jx-fbhz","summary":"Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47776.json","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47776.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47776","reference_id":"","reference_type":"","scores":[{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20224","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20283","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29518","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29478","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29522","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29477","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29425","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29445","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29418","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29372","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29255","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29143","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29076","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29415","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.4697","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.46907","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.46989","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47776"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331750","reference_id":"2331750","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331750"},{"reference_url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8042.patch","reference_id":"8042.patch","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:06:46Z/"}],"url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8042.patch"},{"reference_url":"https://securitylab.github.com/advisories/GHSL-2024-260_Gstreamer/","reference_id":"GHSL-2024-260_Gstreamer","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:06:46Z/"}],"url":"https://securitylab.github.com/advisories/GHSL-2024-260_Gstreamer/"},{"reference_url":"https://security.gentoo.org/glsa/202506-02","reference_id":"GLSA-202506-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7242","reference_id":"RHSA-2025:7242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7242"},{"reference_url":"https://gstreamer.freedesktop.org/security/sa-2024-0027.html","reference_id":"sa-2024-0027.html","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:06:46Z/"}],"url":"https://gstreamer.freedesktop.org/security/sa-2024-0027.html"},{"reference_url":"https://usn.ubuntu.com/7176-1/","reference_id":"USN-7176-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7176-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995067?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1g9u-gemh-83bw"},{"vulnerability":"VCID-4ka2-hbcv-8uh2"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-7q23-vqfb-mfh8"},{"vulnerability":"VCID-upbh-pvqc-4ubn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3"}],"aliases":["CVE-2024-47776"],"risk_score":2.3,"exploitability":"0.5","weighted_severity":"4.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fp9x-81jx-fbhz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36390?format=json","vulnerability_id":"VCID-h2zj-j6va-v7hs","summary":"Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47613.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47613.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47613","reference_id":"","reference_type":"","scores":[{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23318","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23339","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23301","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23245","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.2326","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23254","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23235","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23042","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23035","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23032","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23366","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23407","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23195","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28206","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28285","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28262","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47613"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331753","reference_id":"2331753","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331753"},{"reference_url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8041.patch","reference_id":"8041.patch","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:17:34Z/"}],"url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8041.patch"},{"reference_url":"https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/","reference_id":"GHSL-2024-115_GHSL-2024-118_Gstreamer","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:17:34Z/"}],"url":"https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/"},{"reference_url":"https://security.gentoo.org/glsa/202506-02","reference_id":"GLSA-202506-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11119","reference_id":"RHSA-2024:11119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11119"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11121","reference_id":"RHSA-2024:11121","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11121"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11122","reference_id":"RHSA-2024:11122","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11122"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11148","reference_id":"RHSA-2024:11148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11149","reference_id":"RHSA-2024:11149","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11149"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11298","reference_id":"RHSA-2024:11298","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11298"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11299","reference_id":"RHSA-2024:11299","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11299"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11344","reference_id":"RHSA-2024:11344","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11344"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11346","reference_id":"RHSA-2024:11346","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11346"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11348","reference_id":"RHSA-2024:11348","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11348"},{"reference_url":"https://gstreamer.freedesktop.org/security/sa-2024-0025.html","reference_id":"sa-2024-0025.html","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:17:34Z/"}],"url":"https://gstreamer.freedesktop.org/security/sa-2024-0025.html"},{"reference_url":"https://usn.ubuntu.com/7176-1/","reference_id":"USN-7176-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7176-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995067?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1g9u-gemh-83bw"},{"vulnerability":"VCID-4ka2-hbcv-8uh2"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-7q23-vqfb-mfh8"},{"vulnerability":"VCID-upbh-pvqc-4ubn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3"}],"aliases":["CVE-2024-47613"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h2zj-j6va-v7hs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36393?format=json","vulnerability_id":"VCID-hatr-ngra-qqb6","summary":"Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47774.json","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47774.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47774","reference_id":"","reference_type":"","scores":[{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17737","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17784","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26623","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26506","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26574","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26628","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26583","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26526","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26533","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26467","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26406","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.264","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26344","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.42976","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.42957","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.4288","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47774"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47774","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47774"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/github/securitylab-vulnerabilities/issues/1826","reference_id":"1826","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:15:00Z/"}],"url":"https://github.com/github/securitylab-vulnerabilities/issues/1826"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331739","reference_id":"2331739","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331739"},{"reference_url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8043.patch","reference_id":"8043.patch","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:15:00Z/"}],"url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8043.patch"},{"reference_url":"https://securitylab.github.com/advisories/GHSL-2024-262_Gstreamer/","reference_id":"GHSL-2024-262_Gstreamer","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:15:00Z/"}],"url":"https://securitylab.github.com/advisories/GHSL-2024-262_Gstreamer/"},{"reference_url":"https://security.gentoo.org/glsa/202506-02","reference_id":"GLSA-202506-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7242","reference_id":"RHSA-2025:7242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7242"},{"reference_url":"https://usn.ubuntu.com/7176-1/","reference_id":"USN-7176-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7176-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995067?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1g9u-gemh-83bw"},{"vulnerability":"VCID-4ka2-hbcv-8uh2"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-7q23-vqfb-mfh8"},{"vulnerability":"VCID-upbh-pvqc-4ubn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3"}],"aliases":["CVE-2024-47774"],"risk_score":2.3,"exploitability":"0.5","weighted_severity":"4.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hatr-ngra-qqb6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36385?format=json","vulnerability_id":"VCID-hmn3-mxh5-73fj","summary":"Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47602.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47602.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47602","reference_id":"","reference_type":"","scores":[{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23224","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23268","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32873","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32844","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32874","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32835","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.3281","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32852","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32829","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32793","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32643","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32528","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32445","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32796","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43458","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43382","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43476","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47602"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331759","reference_id":"2331759","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331759"},{"reference_url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch","reference_id":"8057.patch","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:24:18Z/"}],"url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch"},{"reference_url":"https://securitylab.github.com/advisories/GHSL-2024-250_Gstreamer/","reference_id":"GHSL-2024-250_Gstreamer","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:24:18Z/"}],"url":"https://securitylab.github.com/advisories/GHSL-2024-250_Gstreamer/"},{"reference_url":"https://security.gentoo.org/glsa/202506-02","reference_id":"GLSA-202506-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7242","reference_id":"RHSA-2025:7242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7242"},{"reference_url":"https://gstreamer.freedesktop.org/security/sa-2024-0019.html","reference_id":"sa-2024-0019.html","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:24:18Z/"}],"url":"https://gstreamer.freedesktop.org/security/sa-2024-0019.html"},{"reference_url":"https://usn.ubuntu.com/7176-1/","reference_id":"USN-7176-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7176-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995067?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1g9u-gemh-83bw"},{"vulnerability":"VCID-4ka2-hbcv-8uh2"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-7q23-vqfb-mfh8"},{"vulnerability":"VCID-upbh-pvqc-4ubn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3"}],"aliases":["CVE-2024-47602"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hmn3-mxh5-73fj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36388?format=json","vulnerability_id":"VCID-hxhp-4xdt-fqfp","summary":"Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47606.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47606.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47606","reference_id":"","reference_type":"","scores":[{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41556","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41584","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56399","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56343","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56394","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56409","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56385","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56367","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.564","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56369","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56291","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56311","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.5629","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00724","scoring_system":"epss","scoring_elements":"0.72675","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00724","scoring_system":"epss","scoring_elements":"0.72651","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00724","scoring_system":"epss","scoring_elements":"0.7262","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47606"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331760","reference_id":"2331760","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331760"},{"reference_url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8032.patch","reference_id":"8032.patch","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-12-11T20:43:34Z/"}],"url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8032.patch"},{"reference_url":"https://securitylab.github.com/advisories/GHSL-2024-166_Gstreamer/","reference_id":"GHSL-2024-166_Gstreamer","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-12-11T20:43:34Z/"}],"url":"https://securitylab.github.com/advisories/GHSL-2024-166_Gstreamer/"},{"reference_url":"https://security.gentoo.org/glsa/202506-02","reference_id":"GLSA-202506-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11119","reference_id":"RHSA-2024:11119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11119"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11121","reference_id":"RHSA-2024:11121","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11121"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11122","reference_id":"RHSA-2024:11122","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11122"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11148","reference_id":"RHSA-2024:11148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11149","reference_id":"RHSA-2024:11149","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11149"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11298","reference_id":"RHSA-2024:11298","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11298"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11299","reference_id":"RHSA-2024:11299","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11299"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11344","reference_id":"RHSA-2024:11344","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11344"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11346","reference_id":"RHSA-2024:11346","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11346"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11348","reference_id":"RHSA-2024:11348","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11348"},{"reference_url":"https://gstreamer.freedesktop.org/security/sa-2024-0014.html","reference_id":"sa-2024-0014.html","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-12-11T20:43:34Z/"}],"url":"https://gstreamer.freedesktop.org/security/sa-2024-0014.html"},{"reference_url":"https://usn.ubuntu.com/7174-1/","reference_id":"USN-7174-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7174-1/"},{"reference_url":"https://usn.ubuntu.com/7176-1/","reference_id":"USN-7176-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7176-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995067?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1g9u-gemh-83bw"},{"vulnerability":"VCID-4ka2-hbcv-8uh2"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-7q23-vqfb-mfh8"},{"vulnerability":"VCID-upbh-pvqc-4ubn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3"}],"aliases":["CVE-2024-47606"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hxhp-4xdt-fqfp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36380?format=json","vulnerability_id":"VCID-jzft-takg-afb4","summary":"Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47599.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47599.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47599","reference_id":"","reference_type":"","scores":[{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.2194","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22092","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22046","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21905","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21894","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21882","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21789","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21862","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22212","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.2226","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22043","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22124","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22178","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22198","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22158","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22098","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47599"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331748","reference_id":"2331748","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331748"},{"reference_url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8040.patch","reference_id":"8040.patch","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:37:52Z/"}],"url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8040.patch"},{"reference_url":"https://securitylab.github.com/advisories/GHSL-2024-247_Gstreamer/","reference_id":"GHSL-2024-247_Gstreamer","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:37:52Z/"}],"url":"https://securitylab.github.com/advisories/GHSL-2024-247_Gstreamer/"},{"reference_url":"https://security.gentoo.org/glsa/202506-02","reference_id":"GLSA-202506-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7242","reference_id":"RHSA-2025:7242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7242"},{"reference_url":"https://gstreamer.freedesktop.org/security/sa-2024-0016.html","reference_id":"sa-2024-0016.html","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:37:52Z/"}],"url":"https://gstreamer.freedesktop.org/security/sa-2024-0016.html"},{"reference_url":"https://usn.ubuntu.com/7176-1/","reference_id":"USN-7176-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7176-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995067?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1g9u-gemh-83bw"},{"vulnerability":"VCID-4ka2-hbcv-8uh2"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-7q23-vqfb-mfh8"},{"vulnerability":"VCID-upbh-pvqc-4ubn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3"}],"aliases":["CVE-2024-47599"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jzft-takg-afb4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36398?format=json","vulnerability_id":"VCID-kfe8-dy9e-ryc5","summary":"Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47778.json","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47778.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47778","reference_id":"","reference_type":"","scores":[{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24622","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24659","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34751","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.3468","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34723","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34755","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34716","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34691","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34726","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34711","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50065","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5007","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50024","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50078","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.6215","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62199","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62257","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47778","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47778"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331743","reference_id":"2331743","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331743"},{"reference_url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8042.patch","reference_id":"8042.patch","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:12:16Z/"}],"url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8042.patch"},{"reference_url":"https://securitylab.github.com/advisories/GHSL-2024-258_Gstreamer/","reference_id":"GHSL-2024-258_Gstreamer","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:12:16Z/"}],"url":"https://securitylab.github.com/advisories/GHSL-2024-258_Gstreamer/"},{"reference_url":"https://security.gentoo.org/glsa/202506-02","reference_id":"GLSA-202506-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7242","reference_id":"RHSA-2025:7242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7242"},{"reference_url":"https://gstreamer.freedesktop.org/security/sa-2024-0027.html","reference_id":"sa-2024-0027.html","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:12:16Z/"}],"url":"https://gstreamer.freedesktop.org/security/sa-2024-0027.html"},{"reference_url":"https://usn.ubuntu.com/7176-1/","reference_id":"USN-7176-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7176-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995067?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1g9u-gemh-83bw"},{"vulnerability":"VCID-4ka2-hbcv-8uh2"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-7q23-vqfb-mfh8"},{"vulnerability":"VCID-upbh-pvqc-4ubn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3"}],"aliases":["CVE-2024-47778"],"risk_score":2.3,"exploitability":"0.5","weighted_severity":"4.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kfe8-dy9e-ryc5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58852?format=json","vulnerability_id":"VCID-m2g4-ecf6-sufy","summary":"Multiple vulnerabilities have been discovered in gst-plugins-good, the worst of which could lead to denial of service or arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1923.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1923.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1923","reference_id":"","reference_type":"","scores":[{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13044","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13137","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13191","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12989","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13068","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13118","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13088","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.1305","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12999","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12901","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12903","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13003","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13023","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12992","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12887","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12803","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12955","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1923"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2130959","reference_id":"2130959","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2130959"},{"reference_url":"https://security.gentoo.org/glsa/202409-13","reference_id":"GLSA-202409-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2260","reference_id":"RHSA-2023:2260","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2260"},{"reference_url":"https://usn.ubuntu.com/5555-1/","reference_id":"USN-5555-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5555-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995066?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1g9u-gemh-83bw"},{"vulnerability":"VCID-2nz4-ctek-zbfy"},{"vulnerability":"VCID-358j-grsx-27fn"},{"vulnerability":"VCID-3qta-hpkg-hqad"},{"vulnerability":"VCID-4ka2-hbcv-8uh2"},{"vulnerability":"VCID-528p-7av9-1kgv"},{"vulnerability":"VCID-5ry6-b22q-37gy"},{"vulnerability":"VCID-6hjf-zva4-ekcv"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-7q23-vqfb-mfh8"},{"vulnerability":"VCID-92kd-us53-qubg"},{"vulnerability":"VCID-a741-fvg4-h3at"},{"vulnerability":"VCID-bpqa-ngtx-pbes"},{"vulnerability":"VCID-f1qr-vrev-tbdc"},{"vulnerability":"VCID-fp9x-81jx-fbhz"},{"vulnerability":"VCID-h2zj-j6va-v7hs"},{"vulnerability":"VCID-hatr-ngra-qqb6"},{"vulnerability":"VCID-hmn3-mxh5-73fj"},{"vulnerability":"VCID-hxhp-4xdt-fqfp"},{"vulnerability":"VCID-jzft-takg-afb4"},{"vulnerability":"VCID-kfe8-dy9e-ryc5"},{"vulnerability":"VCID-n1x7-a5e5-ckec"},{"vulnerability":"VCID-p46s-buwz-h3by"},{"vulnerability":"VCID-t93h-vv13-4bck"},{"vulnerability":"VCID-uj8y-np9h-8qg6"},{"vulnerability":"VCID-upbh-pvqc-4ubn"},{"vulnerability":"VCID-v4u8-zktd-cfaq"},{"vulnerability":"VCID-wxcy-bnsr-qkdn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2"}],"aliases":["CVE-2022-1923"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m2g4-ecf6-sufy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36374?format=json","vulnerability_id":"VCID-n1x7-a5e5-ckec","summary":"Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47545.json","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47545.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47545","reference_id":"","reference_type":"","scores":[{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32652","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32688","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42755","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42533","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42705","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42722","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42767","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42615","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42692","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.45029","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44976","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.45028","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.45051","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55589","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55693","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55636","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47545"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47545","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47545"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331763","reference_id":"2331763","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331763"},{"reference_url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch","reference_id":"8059.patch","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-13T17:44:03Z/"}],"url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch"},{"reference_url":"https://securitylab.github.com/advisories/GHSL-2024-242_Gstreamer/","reference_id":"GHSL-2024-242_Gstreamer","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-13T17:44:03Z/"}],"url":"https://securitylab.github.com/advisories/GHSL-2024-242_Gstreamer/"},{"reference_url":"https://security.gentoo.org/glsa/202506-02","reference_id":"GLSA-202506-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7242","reference_id":"RHSA-2025:7242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7242"},{"reference_url":"https://gstreamer.freedesktop.org/security/sa-2024-0010.html","reference_id":"sa-2024-0010.html","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-13T17:44:03Z/"}],"url":"https://gstreamer.freedesktop.org/security/sa-2024-0010.html"},{"reference_url":"https://usn.ubuntu.com/7176-1/","reference_id":"USN-7176-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7176-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995067?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1g9u-gemh-83bw"},{"vulnerability":"VCID-4ka2-hbcv-8uh2"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-7q23-vqfb-mfh8"},{"vulnerability":"VCID-upbh-pvqc-4ubn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3"}],"aliases":["CVE-2024-47545"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n1x7-a5e5-ckec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36369?format=json","vulnerability_id":"VCID-p46s-buwz-h3by","summary":"Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47540.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47540.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47540","reference_id":"","reference_type":"","scores":[{"value":"0.00418","scoring_system":"epss","scoring_elements":"0.61752","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00418","scoring_system":"epss","scoring_elements":"0.61782","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72322","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.7231","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72345","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72328","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72315","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72357","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72366","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72354","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72397","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72406","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72403","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72272","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01306","scoring_system":"epss","scoring_elements":"0.79887","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01306","scoring_system":"epss","scoring_elements":"0.79863","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01306","scoring_system":"epss","scoring_elements":"0.79903","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47540"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47540","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47540"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331719","reference_id":"2331719","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331719"},{"reference_url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch","reference_id":"8057.patch","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:34:42Z/"}],"url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch"},{"reference_url":"https://securitylab.github.com/advisories/GHSL-2024-197_GStreamer/","reference_id":"GHSL-2024-197_GStreamer","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:34:42Z/"}],"url":"https://securitylab.github.com/advisories/GHSL-2024-197_GStreamer/"},{"reference_url":"https://security.gentoo.org/glsa/202506-02","reference_id":"GLSA-202506-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11119","reference_id":"RHSA-2024:11119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11119"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11121","reference_id":"RHSA-2024:11121","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11121"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11122","reference_id":"RHSA-2024:11122","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11122"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11148","reference_id":"RHSA-2024:11148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11149","reference_id":"RHSA-2024:11149","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11149"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11298","reference_id":"RHSA-2024:11298","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11298"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11299","reference_id":"RHSA-2024:11299","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11299"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11344","reference_id":"RHSA-2024:11344","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11344"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11346","reference_id":"RHSA-2024:11346","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11346"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11348","reference_id":"RHSA-2024:11348","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11348"},{"reference_url":"https://gstreamer.freedesktop.org/security/sa-2024-0017.html","reference_id":"sa-2024-0017.html","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:34:42Z/"}],"url":"https://gstreamer.freedesktop.org/security/sa-2024-0017.html"},{"reference_url":"https://usn.ubuntu.com/7176-1/","reference_id":"USN-7176-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7176-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995067?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1g9u-gemh-83bw"},{"vulnerability":"VCID-4ka2-hbcv-8uh2"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-7q23-vqfb-mfh8"},{"vulnerability":"VCID-upbh-pvqc-4ubn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3"}],"aliases":["CVE-2024-47540"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p46s-buwz-h3by"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36397?format=json","vulnerability_id":"VCID-t93h-vv13-4bck","summary":"Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47777.json","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47777.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47777","reference_id":"","reference_type":"","scores":[{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21348","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21403","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30766","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30734","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30769","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30726","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.3068","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30704","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30686","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30653","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30476","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30362","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30281","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30675","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48903","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.4884","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48931","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47777"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47777","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47777"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331741","reference_id":"2331741","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331741"},{"reference_url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8042.patch","reference_id":"8042.patch","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:07:19Z/"}],"url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8042.patch"},{"reference_url":"https://securitylab.github.com/advisories/GHSL-2024-259_Gstreamer/","reference_id":"GHSL-2024-259_Gstreamer","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:07:19Z/"}],"url":"https://securitylab.github.com/advisories/GHSL-2024-259_Gstreamer/"},{"reference_url":"https://security.gentoo.org/glsa/202506-02","reference_id":"GLSA-202506-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7242","reference_id":"RHSA-2025:7242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7242"},{"reference_url":"https://gstreamer.freedesktop.org/security/sa-2024-0027.html","reference_id":"sa-2024-0027.html","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:07:19Z/"}],"url":"https://gstreamer.freedesktop.org/security/sa-2024-0027.html"},{"reference_url":"https://usn.ubuntu.com/7176-1/","reference_id":"USN-7176-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7176-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995067?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1g9u-gemh-83bw"},{"vulnerability":"VCID-4ka2-hbcv-8uh2"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-7q23-vqfb-mfh8"},{"vulnerability":"VCID-upbh-pvqc-4ubn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3"}],"aliases":["CVE-2024-47777"],"risk_score":2.3,"exploitability":"0.5","weighted_severity":"4.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t93h-vv13-4bck"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58854?format=json","vulnerability_id":"VCID-tf3v-37zu-pkaf","summary":"Multiple vulnerabilities have been discovered in gst-plugins-good, the worst of which could lead to denial of service or arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1925.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1925.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1925","reference_id":"","reference_type":"","scores":[{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13771","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13865","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13922","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13724","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13806","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13857","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13825","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13789","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13741","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13649","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13646","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13718","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.1373","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13699","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13606","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.1351","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13665","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.1375","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2131007","reference_id":"2131007","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2131007"},{"reference_url":"https://security.gentoo.org/glsa/202409-13","reference_id":"GLSA-202409-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2260","reference_id":"RHSA-2023:2260","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2260"},{"reference_url":"https://usn.ubuntu.com/5555-1/","reference_id":"USN-5555-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5555-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995066?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1g9u-gemh-83bw"},{"vulnerability":"VCID-2nz4-ctek-zbfy"},{"vulnerability":"VCID-358j-grsx-27fn"},{"vulnerability":"VCID-3qta-hpkg-hqad"},{"vulnerability":"VCID-4ka2-hbcv-8uh2"},{"vulnerability":"VCID-528p-7av9-1kgv"},{"vulnerability":"VCID-5ry6-b22q-37gy"},{"vulnerability":"VCID-6hjf-zva4-ekcv"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-7q23-vqfb-mfh8"},{"vulnerability":"VCID-92kd-us53-qubg"},{"vulnerability":"VCID-a741-fvg4-h3at"},{"vulnerability":"VCID-bpqa-ngtx-pbes"},{"vulnerability":"VCID-f1qr-vrev-tbdc"},{"vulnerability":"VCID-fp9x-81jx-fbhz"},{"vulnerability":"VCID-h2zj-j6va-v7hs"},{"vulnerability":"VCID-hatr-ngra-qqb6"},{"vulnerability":"VCID-hmn3-mxh5-73fj"},{"vulnerability":"VCID-hxhp-4xdt-fqfp"},{"vulnerability":"VCID-jzft-takg-afb4"},{"vulnerability":"VCID-kfe8-dy9e-ryc5"},{"vulnerability":"VCID-n1x7-a5e5-ckec"},{"vulnerability":"VCID-p46s-buwz-h3by"},{"vulnerability":"VCID-t93h-vv13-4bck"},{"vulnerability":"VCID-uj8y-np9h-8qg6"},{"vulnerability":"VCID-upbh-pvqc-4ubn"},{"vulnerability":"VCID-v4u8-zktd-cfaq"},{"vulnerability":"VCID-wxcy-bnsr-qkdn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2"}],"aliases":["CVE-2022-1925"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tf3v-37zu-pkaf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36375?format=json","vulnerability_id":"VCID-uj8y-np9h-8qg6","summary":"Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47546.json","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47546.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47546","reference_id":"","reference_type":"","scores":[{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30166","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30213","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39563","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39647","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39676","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39625","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39368","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39286","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39383","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39642","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41569","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.4151","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.4156","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.4159","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52093","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52186","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52143","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47546"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331756","reference_id":"2331756","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331756"},{"reference_url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch","reference_id":"8059.patch","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-13T17:42:31Z/"}],"url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch"},{"reference_url":"https://securitylab.github.com/advisories/GHSL-2024-243_Gstreamer/","reference_id":"GHSL-2024-243_Gstreamer","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-13T17:42:31Z/"}],"url":"https://securitylab.github.com/advisories/GHSL-2024-243_Gstreamer/"},{"reference_url":"https://security.gentoo.org/glsa/202506-02","reference_id":"GLSA-202506-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7242","reference_id":"RHSA-2025:7242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7242"},{"reference_url":"https://gstreamer.freedesktop.org/security/sa-2024-0013.html","reference_id":"sa-2024-0013.html","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-13T17:42:31Z/"}],"url":"https://gstreamer.freedesktop.org/security/sa-2024-0013.html"},{"reference_url":"https://usn.ubuntu.com/7176-1/","reference_id":"USN-7176-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7176-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995067?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1g9u-gemh-83bw"},{"vulnerability":"VCID-4ka2-hbcv-8uh2"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-7q23-vqfb-mfh8"},{"vulnerability":"VCID-upbh-pvqc-4ubn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3"}],"aliases":["CVE-2024-47546"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uj8y-np9h-8qg6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36377?format=json","vulnerability_id":"VCID-v4u8-zktd-cfaq","summary":"Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47597.json","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47597.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47597","reference_id":"","reference_type":"","scores":[{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23502","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23539","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31578","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.3161","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31632","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31598","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31274","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31194","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.314","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31634","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.33216","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.3314","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.33183","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.33219","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00269","scoring_system":"epss","scoring_elements":"0.50225","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00269","scoring_system":"epss","scoring_elements":"0.5031","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00269","scoring_system":"epss","scoring_elements":"0.50278","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47597"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331755","reference_id":"2331755","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331755"},{"reference_url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch","reference_id":"8059.patch","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:50:51Z/"}],"url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch"},{"reference_url":"https://securitylab.github.com/advisories/GHSL-2024-245_Gstreamer/","reference_id":"GHSL-2024-245_Gstreamer","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:50:51Z/"}],"url":"https://securitylab.github.com/advisories/GHSL-2024-245_Gstreamer/"},{"reference_url":"https://security.gentoo.org/glsa/202506-02","reference_id":"GLSA-202506-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7242","reference_id":"RHSA-2025:7242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7242"},{"reference_url":"https://gstreamer.freedesktop.org/security/sa-2024-0012.html","reference_id":"sa-2024-0012.html","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:50:51Z/"}],"url":"https://gstreamer.freedesktop.org/security/sa-2024-0012.html"},{"reference_url":"https://usn.ubuntu.com/7176-1/","reference_id":"USN-7176-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7176-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995067?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1g9u-gemh-83bw"},{"vulnerability":"VCID-4ka2-hbcv-8uh2"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-7q23-vqfb-mfh8"},{"vulnerability":"VCID-upbh-pvqc-4ubn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3"}],"aliases":["CVE-2024-47597"],"risk_score":2.3,"exploitability":"0.5","weighted_severity":"4.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v4u8-zktd-cfaq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36373?format=json","vulnerability_id":"VCID-wxcy-bnsr-qkdn","summary":"Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47544.json","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47544.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47544","reference_id":"","reference_type":"","scores":[{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28716","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28764","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39668","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39654","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39677","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39642","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39625","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39676","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39647","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39563","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39383","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39368","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39286","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39599","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52143","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52093","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52186","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47544"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47544","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47544"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331751","reference_id":"2331751","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331751"},{"reference_url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch","reference_id":"8059.patch","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T16:37:30Z/"}],"url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch"},{"reference_url":"https://securitylab.github.com/advisories/GHSL-2024-238_Gstreamer/","reference_id":"GHSL-2024-238_Gstreamer","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T16:37:30Z/"}],"url":"https://securitylab.github.com/advisories/GHSL-2024-238_Gstreamer/"},{"reference_url":"https://security.gentoo.org/glsa/202506-02","reference_id":"GLSA-202506-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7242","reference_id":"RHSA-2025:7242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7242"},{"reference_url":"https://gstreamer.freedesktop.org/security/sa-2024-0011.html","reference_id":"sa-2024-0011.html","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T16:37:30Z/"}],"url":"https://gstreamer.freedesktop.org/security/sa-2024-0011.html"},{"reference_url":"https://usn.ubuntu.com/7176-1/","reference_id":"USN-7176-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7176-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995067?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1g9u-gemh-83bw"},{"vulnerability":"VCID-4ka2-hbcv-8uh2"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-7q23-vqfb-mfh8"},{"vulnerability":"VCID-upbh-pvqc-4ubn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3"}],"aliases":["CVE-2024-47544"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wxcy-bnsr-qkdn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78300?format=json","vulnerability_id":"VCID-zup8-xngn-7bh7","summary":"gstreamer-plugins-good: integer overflow leading to heap overwrite in FLAC image tag handling","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37327.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37327.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37327","reference_id":"","reference_type":"","scores":[{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90016","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90124","published_at":"2026-05-09T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90069","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90087","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90085","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90097","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90112","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90028","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90033","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90048","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90053","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90063","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90061","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90055","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90072","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37327"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37327","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37327"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2254539","reference_id":"2254539","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2254539"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2303","reference_id":"RHSA-2024:2303","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2303"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3089","reference_id":"RHSA-2024:3089","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3089"},{"reference_url":"https://gstreamer.freedesktop.org/security/sa-2023-0001.html","reference_id":"sa-2023-0001.html","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-05T18:28:13Z/"}],"url":"https://gstreamer.freedesktop.org/security/sa-2023-0001.html"},{"reference_url":"https://usn.ubuntu.com/6268-1/","reference_id":"USN-6268-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6268-1/"},{"reference_url":"https://usn.ubuntu.com/6269-1/","reference_id":"USN-6269-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6269-1/"},{"reference_url":"https://usn.ubuntu.com/7807-1/","reference_id":"USN-7807-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7807-1/"},{"reference_url":"https://www.zerodayinitiative.com/advisories/ZDI-23-903/","reference_id":"ZDI-23-903","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-05T18:28:13Z/"}],"url":"https://www.zerodayinitiative.com/advisories/ZDI-23-903/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995066?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1g9u-gemh-83bw"},{"vulnerability":"VCID-2nz4-ctek-zbfy"},{"vulnerability":"VCID-358j-grsx-27fn"},{"vulnerability":"VCID-3qta-hpkg-hqad"},{"vulnerability":"VCID-4ka2-hbcv-8uh2"},{"vulnerability":"VCID-528p-7av9-1kgv"},{"vulnerability":"VCID-5ry6-b22q-37gy"},{"vulnerability":"VCID-6hjf-zva4-ekcv"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-7q23-vqfb-mfh8"},{"vulnerability":"VCID-92kd-us53-qubg"},{"vulnerability":"VCID-a741-fvg4-h3at"},{"vulnerability":"VCID-bpqa-ngtx-pbes"},{"vulnerability":"VCID-f1qr-vrev-tbdc"},{"vulnerability":"VCID-fp9x-81jx-fbhz"},{"vulnerability":"VCID-h2zj-j6va-v7hs"},{"vulnerability":"VCID-hatr-ngra-qqb6"},{"vulnerability":"VCID-hmn3-mxh5-73fj"},{"vulnerability":"VCID-hxhp-4xdt-fqfp"},{"vulnerability":"VCID-jzft-takg-afb4"},{"vulnerability":"VCID-kfe8-dy9e-ryc5"},{"vulnerability":"VCID-n1x7-a5e5-ckec"},{"vulnerability":"VCID-p46s-buwz-h3by"},{"vulnerability":"VCID-t93h-vv13-4bck"},{"vulnerability":"VCID-uj8y-np9h-8qg6"},{"vulnerability":"VCID-upbh-pvqc-4ubn"},{"vulnerability":"VCID-v4u8-zktd-cfaq"},{"vulnerability":"VCID-wxcy-bnsr-qkdn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2"}],"aliases":["CVE-2023-37327"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zup8-xngn-7bh7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58855?format=json","vulnerability_id":"VCID-zz2u-cmgw-k3c1","summary":"Multiple vulnerabilities have been discovered in gst-plugins-good, the worst of which could lead to denial of service or arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2122.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2122.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2122","reference_id":"","reference_type":"","scores":[{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14298","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14176","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14173","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14244","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14271","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14246","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14181","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14058","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14212","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18961","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19151","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19203","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18919","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18999","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19053","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19059","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19013","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2122"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2131018","reference_id":"2131018","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2131018"},{"reference_url":"https://security.gentoo.org/glsa/202409-13","reference_id":"GLSA-202409-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2260","reference_id":"RHSA-2023:2260","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2260"},{"reference_url":"https://usn.ubuntu.com/5555-1/","reference_id":"USN-5555-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5555-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995066?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1g9u-gemh-83bw"},{"vulnerability":"VCID-2nz4-ctek-zbfy"},{"vulnerability":"VCID-358j-grsx-27fn"},{"vulnerability":"VCID-3qta-hpkg-hqad"},{"vulnerability":"VCID-4ka2-hbcv-8uh2"},{"vulnerability":"VCID-528p-7av9-1kgv"},{"vulnerability":"VCID-5ry6-b22q-37gy"},{"vulnerability":"VCID-6hjf-zva4-ekcv"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-7q23-vqfb-mfh8"},{"vulnerability":"VCID-92kd-us53-qubg"},{"vulnerability":"VCID-a741-fvg4-h3at"},{"vulnerability":"VCID-bpqa-ngtx-pbes"},{"vulnerability":"VCID-f1qr-vrev-tbdc"},{"vulnerability":"VCID-fp9x-81jx-fbhz"},{"vulnerability":"VCID-h2zj-j6va-v7hs"},{"vulnerability":"VCID-hatr-ngra-qqb6"},{"vulnerability":"VCID-hmn3-mxh5-73fj"},{"vulnerability":"VCID-hxhp-4xdt-fqfp"},{"vulnerability":"VCID-jzft-takg-afb4"},{"vulnerability":"VCID-kfe8-dy9e-ryc5"},{"vulnerability":"VCID-n1x7-a5e5-ckec"},{"vulnerability":"VCID-p46s-buwz-h3by"},{"vulnerability":"VCID-t93h-vv13-4bck"},{"vulnerability":"VCID-uj8y-np9h-8qg6"},{"vulnerability":"VCID-upbh-pvqc-4ubn"},{"vulnerability":"VCID-v4u8-zktd-cfaq"},{"vulnerability":"VCID-wxcy-bnsr-qkdn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2"}],"aliases":["CVE-2022-2122"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zz2u-cmgw-k3c1"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60089?format=json","vulnerability_id":"VCID-1z2g-dxzn-27d2","summary":"Multiple vulnerabilities have been found in various GStreamer\n    plug-ins, the worst of which could lead to the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5845.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5845.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5845","reference_id":"","reference_type":"","scores":[{"value":"0.03108","scoring_system":"epss","scoring_elements":"0.86758","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03108","scoring_system":"epss","scoring_elements":"0.8692","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03108","scoring_system":"epss","scoring_elements":"0.86884","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03108","scoring_system":"epss","scoring_elements":"0.86903","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03108","scoring_system":"epss","scoring_elements":"0.86769","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03108","scoring_system":"epss","scoring_elements":"0.86787","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03108","scoring_system":"epss","scoring_elements":"0.86785","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03108","scoring_system":"epss","scoring_elements":"0.86805","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03108","scoring_system":"epss","scoring_elements":"0.86813","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03108","scoring_system":"epss","scoring_elements":"0.86827","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03108","scoring_system":"epss","scoring_elements":"0.86823","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03108","scoring_system":"epss","scoring_elements":"0.86819","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03108","scoring_system":"epss","scoring_elements":"0.86835","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03108","scoring_system":"epss","scoring_elements":"0.86839","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03108","scoring_system":"epss","scoring_elements":"0.86838","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03108","scoring_system":"epss","scoring_elements":"0.86855","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03108","scoring_system":"epss","scoring_elements":"0.86861","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10199","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10199"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5840","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5840"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5841","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5841"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5845"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1419582","reference_id":"1419582","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1419582"},{"reference_url":"https://security.archlinux.org/ASA-201702-3","reference_id":"ASA-201702-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201702-3"},{"reference_url":"https://security.archlinux.org/AVG-163","reference_id":"AVG-163","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-163"},{"reference_url":"https://security.gentoo.org/glsa/201705-10","reference_id":"GLSA-201705-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201705-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2060","reference_id":"RHSA-2017:2060","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2060"},{"reference_url":"https://usn.ubuntu.com/3245-1/","reference_id":"USN-3245-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3245-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1036085?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.4.4-2%2Bdeb8u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1kjc-6zdm-jkf3"},{"vulnerability":"VCID-1z2g-dxzn-27d2"},{"vulnerability":"VCID-2nz4-ctek-zbfy"},{"vulnerability":"VCID-358j-grsx-27fn"},{"vulnerability":"VCID-3qta-hpkg-hqad"},{"vulnerability":"VCID-521g-8qbp-cfh3"},{"vulnerability":"VCID-528p-7av9-1kgv"},{"vulnerability":"VCID-5ry6-b22q-37gy"},{"vulnerability":"VCID-5vfg-uj1z-zudn"},{"vulnerability":"VCID-6aaz-buqb-zfcm"},{"vulnerability":"VCID-6hjf-zva4-ekcv"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-771b-5s45-hbhd"},{"vulnerability":"VCID-7nn4-cj6x-uff8"},{"vulnerability":"VCID-92kd-us53-qubg"},{"vulnerability":"VCID-a741-fvg4-h3at"},{"vulnerability":"VCID-bk2h-q83z-43cn"},{"vulnerability":"VCID-bpqa-ngtx-pbes"},{"vulnerability":"VCID-byg3-424m-w3gs"},{"vulnerability":"VCID-cnza-7ar1-f7eh"},{"vulnerability":"VCID-exgv-kz5w-w3bq"},{"vulnerability":"VCID-f1k9-rdv3-nqen"},{"vulnerability":"VCID-f1qr-vrev-tbdc"},{"vulnerability":"VCID-fp9x-81jx-fbhz"},{"vulnerability":"VCID-h2zj-j6va-v7hs"},{"vulnerability":"VCID-hatr-ngra-qqb6"},{"vulnerability":"VCID-hgch-q86h-4qcn"},{"vulnerability":"VCID-hmn3-mxh5-73fj"},{"vulnerability":"VCID-hxhp-4xdt-fqfp"},{"vulnerability":"VCID-j1w1-4xvp-7bh8"},{"vulnerability":"VCID-jzft-takg-afb4"},{"vulnerability":"VCID-k1t8-1fq9-m3gg"},{"vulnerability":"VCID-kfe8-dy9e-ryc5"},{"vulnerability":"VCID-m2g4-ecf6-sufy"},{"vulnerability":"VCID-mcdu-z138-vkgv"},{"vulnerability":"VCID-n1tt-vu7b-skew"},{"vulnerability":"VCID-n1x7-a5e5-ckec"},{"vulnerability":"VCID-p46s-buwz-h3by"},{"vulnerability":"VCID-t93h-vv13-4bck"},{"vulnerability":"VCID-tf3v-37zu-pkaf"},{"vulnerability":"VCID-uj8y-np9h-8qg6"},{"vulnerability":"VCID-v4u8-zktd-cfaq"},{"vulnerability":"VCID-wxcy-bnsr-qkdn"},{"vulnerability":"VCID-zup8-xngn-7bh7"},{"vulnerability":"VCID-zz2u-cmgw-k3c1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.4.4-2%252Bdeb8u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1038145?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.10.4-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1kjc-6zdm-jkf3"},{"vulnerability":"VCID-2nz4-ctek-zbfy"},{"vulnerability":"VCID-358j-grsx-27fn"},{"vulnerability":"VCID-3qta-hpkg-hqad"},{"vulnerability":"VCID-521g-8qbp-cfh3"},{"vulnerability":"VCID-528p-7av9-1kgv"},{"vulnerability":"VCID-5ry6-b22q-37gy"},{"vulnerability":"VCID-6aaz-buqb-zfcm"},{"vulnerability":"VCID-6hjf-zva4-ekcv"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-771b-5s45-hbhd"},{"vulnerability":"VCID-7nn4-cj6x-uff8"},{"vulnerability":"VCID-92kd-us53-qubg"},{"vulnerability":"VCID-a741-fvg4-h3at"},{"vulnerability":"VCID-bpqa-ngtx-pbes"},{"vulnerability":"VCID-exgv-kz5w-w3bq"},{"vulnerability":"VCID-f1qr-vrev-tbdc"},{"vulnerability":"VCID-fp9x-81jx-fbhz"},{"vulnerability":"VCID-h2zj-j6va-v7hs"},{"vulnerability":"VCID-hatr-ngra-qqb6"},{"vulnerability":"VCID-hmn3-mxh5-73fj"},{"vulnerability":"VCID-hxhp-4xdt-fqfp"},{"vulnerability":"VCID-jzft-takg-afb4"},{"vulnerability":"VCID-kfe8-dy9e-ryc5"},{"vulnerability":"VCID-m2g4-ecf6-sufy"},{"vulnerability":"VCID-n1x7-a5e5-ckec"},{"vulnerability":"VCID-p46s-buwz-h3by"},{"vulnerability":"VCID-t93h-vv13-4bck"},{"vulnerability":"VCID-tf3v-37zu-pkaf"},{"vulnerability":"VCID-uj8y-np9h-8qg6"},{"vulnerability":"VCID-v4u8-zktd-cfaq"},{"vulnerability":"VCID-wxcy-bnsr-qkdn"},{"vulnerability":"VCID-zup8-xngn-7bh7"},{"vulnerability":"VCID-zz2u-cmgw-k3c1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.10.4-1"}],"aliases":["CVE-2017-5845"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1z2g-dxzn-27d2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60063?format=json","vulnerability_id":"VCID-5vfg-uj1z-zudn","summary":"Multiple vulnerabilities have been found in various GStreamer\n    plug-ins, the worst of which could lead to the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10199.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10199.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10199","reference_id":"","reference_type":"","scores":[{"value":"0.03126","scoring_system":"epss","scoring_elements":"0.86792","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03126","scoring_system":"epss","scoring_elements":"0.86954","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03126","scoring_system":"epss","scoring_elements":"0.86918","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03126","scoring_system":"epss","scoring_elements":"0.86936","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03126","scoring_system":"epss","scoring_elements":"0.86803","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03126","scoring_system":"epss","scoring_elements":"0.86822","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03126","scoring_system":"epss","scoring_elements":"0.86815","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03126","scoring_system":"epss","scoring_elements":"0.86835","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03126","scoring_system":"epss","scoring_elements":"0.86844","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03126","scoring_system":"epss","scoring_elements":"0.86857","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03126","scoring_system":"epss","scoring_elements":"0.86852","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03126","scoring_system":"epss","scoring_elements":"0.86848","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03126","scoring_system":"epss","scoring_elements":"0.86865","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03126","scoring_system":"epss","scoring_elements":"0.8687","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03126","scoring_system":"epss","scoring_elements":"0.86871","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03126","scoring_system":"epss","scoring_elements":"0.86887","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03126","scoring_system":"epss","scoring_elements":"0.86894","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03126","scoring_system":"epss","scoring_elements":"0.86896","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10199"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10199","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10199"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5840","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5840"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5841","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5841"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5845"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1419580","reference_id":"1419580","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1419580"},{"reference_url":"https://security.archlinux.org/ASA-201702-3","reference_id":"ASA-201702-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201702-3"},{"reference_url":"https://security.archlinux.org/AVG-163","reference_id":"AVG-163","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-163"},{"reference_url":"https://security.gentoo.org/glsa/201705-10","reference_id":"GLSA-201705-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201705-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2060","reference_id":"RHSA-2017:2060","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2060"},{"reference_url":"https://usn.ubuntu.com/3245-1/","reference_id":"USN-3245-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3245-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1036085?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.4.4-2%2Bdeb8u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1kjc-6zdm-jkf3"},{"vulnerability":"VCID-1z2g-dxzn-27d2"},{"vulnerability":"VCID-2nz4-ctek-zbfy"},{"vulnerability":"VCID-358j-grsx-27fn"},{"vulnerability":"VCID-3qta-hpkg-hqad"},{"vulnerability":"VCID-521g-8qbp-cfh3"},{"vulnerability":"VCID-528p-7av9-1kgv"},{"vulnerability":"VCID-5ry6-b22q-37gy"},{"vulnerability":"VCID-5vfg-uj1z-zudn"},{"vulnerability":"VCID-6aaz-buqb-zfcm"},{"vulnerability":"VCID-6hjf-zva4-ekcv"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-771b-5s45-hbhd"},{"vulnerability":"VCID-7nn4-cj6x-uff8"},{"vulnerability":"VCID-92kd-us53-qubg"},{"vulnerability":"VCID-a741-fvg4-h3at"},{"vulnerability":"VCID-bk2h-q83z-43cn"},{"vulnerability":"VCID-bpqa-ngtx-pbes"},{"vulnerability":"VCID-byg3-424m-w3gs"},{"vulnerability":"VCID-cnza-7ar1-f7eh"},{"vulnerability":"VCID-exgv-kz5w-w3bq"},{"vulnerability":"VCID-f1k9-rdv3-nqen"},{"vulnerability":"VCID-f1qr-vrev-tbdc"},{"vulnerability":"VCID-fp9x-81jx-fbhz"},{"vulnerability":"VCID-h2zj-j6va-v7hs"},{"vulnerability":"VCID-hatr-ngra-qqb6"},{"vulnerability":"VCID-hgch-q86h-4qcn"},{"vulnerability":"VCID-hmn3-mxh5-73fj"},{"vulnerability":"VCID-hxhp-4xdt-fqfp"},{"vulnerability":"VCID-j1w1-4xvp-7bh8"},{"vulnerability":"VCID-jzft-takg-afb4"},{"vulnerability":"VCID-k1t8-1fq9-m3gg"},{"vulnerability":"VCID-kfe8-dy9e-ryc5"},{"vulnerability":"VCID-m2g4-ecf6-sufy"},{"vulnerability":"VCID-mcdu-z138-vkgv"},{"vulnerability":"VCID-n1tt-vu7b-skew"},{"vulnerability":"VCID-n1x7-a5e5-ckec"},{"vulnerability":"VCID-p46s-buwz-h3by"},{"vulnerability":"VCID-t93h-vv13-4bck"},{"vulnerability":"VCID-tf3v-37zu-pkaf"},{"vulnerability":"VCID-uj8y-np9h-8qg6"},{"vulnerability":"VCID-v4u8-zktd-cfaq"},{"vulnerability":"VCID-wxcy-bnsr-qkdn"},{"vulnerability":"VCID-zup8-xngn-7bh7"},{"vulnerability":"VCID-zz2u-cmgw-k3c1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.4.4-2%252Bdeb8u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1038145?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.10.4-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1kjc-6zdm-jkf3"},{"vulnerability":"VCID-2nz4-ctek-zbfy"},{"vulnerability":"VCID-358j-grsx-27fn"},{"vulnerability":"VCID-3qta-hpkg-hqad"},{"vulnerability":"VCID-521g-8qbp-cfh3"},{"vulnerability":"VCID-528p-7av9-1kgv"},{"vulnerability":"VCID-5ry6-b22q-37gy"},{"vulnerability":"VCID-6aaz-buqb-zfcm"},{"vulnerability":"VCID-6hjf-zva4-ekcv"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-771b-5s45-hbhd"},{"vulnerability":"VCID-7nn4-cj6x-uff8"},{"vulnerability":"VCID-92kd-us53-qubg"},{"vulnerability":"VCID-a741-fvg4-h3at"},{"vulnerability":"VCID-bpqa-ngtx-pbes"},{"vulnerability":"VCID-exgv-kz5w-w3bq"},{"vulnerability":"VCID-f1qr-vrev-tbdc"},{"vulnerability":"VCID-fp9x-81jx-fbhz"},{"vulnerability":"VCID-h2zj-j6va-v7hs"},{"vulnerability":"VCID-hatr-ngra-qqb6"},{"vulnerability":"VCID-hmn3-mxh5-73fj"},{"vulnerability":"VCID-hxhp-4xdt-fqfp"},{"vulnerability":"VCID-jzft-takg-afb4"},{"vulnerability":"VCID-kfe8-dy9e-ryc5"},{"vulnerability":"VCID-m2g4-ecf6-sufy"},{"vulnerability":"VCID-n1x7-a5e5-ckec"},{"vulnerability":"VCID-p46s-buwz-h3by"},{"vulnerability":"VCID-t93h-vv13-4bck"},{"vulnerability":"VCID-tf3v-37zu-pkaf"},{"vulnerability":"VCID-uj8y-np9h-8qg6"},{"vulnerability":"VCID-v4u8-zktd-cfaq"},{"vulnerability":"VCID-wxcy-bnsr-qkdn"},{"vulnerability":"VCID-zup8-xngn-7bh7"},{"vulnerability":"VCID-zz2u-cmgw-k3c1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.10.4-1"}],"aliases":["CVE-2016-10199"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5vfg-uj1z-zudn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60062?format=json","vulnerability_id":"VCID-bk2h-q83z-43cn","summary":"Multiple vulnerabilities have been found in various GStreamer\n    plug-ins, the worst of which could lead to the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10198.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10198.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10198","reference_id":"","reference_type":"","scores":[{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73208","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73267","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73287","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.7326","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73303","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73311","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73338","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73351","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73218","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73239","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73212","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73248","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73262","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01673","scoring_system":"epss","scoring_elements":"0.82252","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01673","scoring_system":"epss","scoring_elements":"0.82275","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01673","scoring_system":"epss","scoring_elements":"0.82216","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01673","scoring_system":"epss","scoring_elements":"0.82231","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10199","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10199"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5840","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5840"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5841","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5841"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5845"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1419558","reference_id":"1419558","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1419558"},{"reference_url":"https://security.archlinux.org/ASA-201702-3","reference_id":"ASA-201702-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201702-3"},{"reference_url":"https://security.archlinux.org/AVG-163","reference_id":"AVG-163","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-163"},{"reference_url":"https://security.gentoo.org/glsa/201705-10","reference_id":"GLSA-201705-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201705-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2060","reference_id":"RHSA-2017:2060","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2060"},{"reference_url":"https://usn.ubuntu.com/3245-1/","reference_id":"USN-3245-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3245-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1036085?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.4.4-2%2Bdeb8u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1kjc-6zdm-jkf3"},{"vulnerability":"VCID-1z2g-dxzn-27d2"},{"vulnerability":"VCID-2nz4-ctek-zbfy"},{"vulnerability":"VCID-358j-grsx-27fn"},{"vulnerability":"VCID-3qta-hpkg-hqad"},{"vulnerability":"VCID-521g-8qbp-cfh3"},{"vulnerability":"VCID-528p-7av9-1kgv"},{"vulnerability":"VCID-5ry6-b22q-37gy"},{"vulnerability":"VCID-5vfg-uj1z-zudn"},{"vulnerability":"VCID-6aaz-buqb-zfcm"},{"vulnerability":"VCID-6hjf-zva4-ekcv"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-771b-5s45-hbhd"},{"vulnerability":"VCID-7nn4-cj6x-uff8"},{"vulnerability":"VCID-92kd-us53-qubg"},{"vulnerability":"VCID-a741-fvg4-h3at"},{"vulnerability":"VCID-bk2h-q83z-43cn"},{"vulnerability":"VCID-bpqa-ngtx-pbes"},{"vulnerability":"VCID-byg3-424m-w3gs"},{"vulnerability":"VCID-cnza-7ar1-f7eh"},{"vulnerability":"VCID-exgv-kz5w-w3bq"},{"vulnerability":"VCID-f1k9-rdv3-nqen"},{"vulnerability":"VCID-f1qr-vrev-tbdc"},{"vulnerability":"VCID-fp9x-81jx-fbhz"},{"vulnerability":"VCID-h2zj-j6va-v7hs"},{"vulnerability":"VCID-hatr-ngra-qqb6"},{"vulnerability":"VCID-hgch-q86h-4qcn"},{"vulnerability":"VCID-hmn3-mxh5-73fj"},{"vulnerability":"VCID-hxhp-4xdt-fqfp"},{"vulnerability":"VCID-j1w1-4xvp-7bh8"},{"vulnerability":"VCID-jzft-takg-afb4"},{"vulnerability":"VCID-k1t8-1fq9-m3gg"},{"vulnerability":"VCID-kfe8-dy9e-ryc5"},{"vulnerability":"VCID-m2g4-ecf6-sufy"},{"vulnerability":"VCID-mcdu-z138-vkgv"},{"vulnerability":"VCID-n1tt-vu7b-skew"},{"vulnerability":"VCID-n1x7-a5e5-ckec"},{"vulnerability":"VCID-p46s-buwz-h3by"},{"vulnerability":"VCID-t93h-vv13-4bck"},{"vulnerability":"VCID-tf3v-37zu-pkaf"},{"vulnerability":"VCID-uj8y-np9h-8qg6"},{"vulnerability":"VCID-v4u8-zktd-cfaq"},{"vulnerability":"VCID-wxcy-bnsr-qkdn"},{"vulnerability":"VCID-zup8-xngn-7bh7"},{"vulnerability":"VCID-zz2u-cmgw-k3c1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.4.4-2%252Bdeb8u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1038145?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.10.4-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1kjc-6zdm-jkf3"},{"vulnerability":"VCID-2nz4-ctek-zbfy"},{"vulnerability":"VCID-358j-grsx-27fn"},{"vulnerability":"VCID-3qta-hpkg-hqad"},{"vulnerability":"VCID-521g-8qbp-cfh3"},{"vulnerability":"VCID-528p-7av9-1kgv"},{"vulnerability":"VCID-5ry6-b22q-37gy"},{"vulnerability":"VCID-6aaz-buqb-zfcm"},{"vulnerability":"VCID-6hjf-zva4-ekcv"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-771b-5s45-hbhd"},{"vulnerability":"VCID-7nn4-cj6x-uff8"},{"vulnerability":"VCID-92kd-us53-qubg"},{"vulnerability":"VCID-a741-fvg4-h3at"},{"vulnerability":"VCID-bpqa-ngtx-pbes"},{"vulnerability":"VCID-exgv-kz5w-w3bq"},{"vulnerability":"VCID-f1qr-vrev-tbdc"},{"vulnerability":"VCID-fp9x-81jx-fbhz"},{"vulnerability":"VCID-h2zj-j6va-v7hs"},{"vulnerability":"VCID-hatr-ngra-qqb6"},{"vulnerability":"VCID-hmn3-mxh5-73fj"},{"vulnerability":"VCID-hxhp-4xdt-fqfp"},{"vulnerability":"VCID-jzft-takg-afb4"},{"vulnerability":"VCID-kfe8-dy9e-ryc5"},{"vulnerability":"VCID-m2g4-ecf6-sufy"},{"vulnerability":"VCID-n1x7-a5e5-ckec"},{"vulnerability":"VCID-p46s-buwz-h3by"},{"vulnerability":"VCID-t93h-vv13-4bck"},{"vulnerability":"VCID-tf3v-37zu-pkaf"},{"vulnerability":"VCID-uj8y-np9h-8qg6"},{"vulnerability":"VCID-v4u8-zktd-cfaq"},{"vulnerability":"VCID-wxcy-bnsr-qkdn"},{"vulnerability":"VCID-zup8-xngn-7bh7"},{"vulnerability":"VCID-zz2u-cmgw-k3c1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.10.4-1"}],"aliases":["CVE-2016-10198"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bk2h-q83z-43cn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60069?format=json","vulnerability_id":"VCID-byg3-424m-w3gs","summary":"Multiple vulnerabilities have been found in various GStreamer\n    plug-ins, the worst of which could lead to the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9634.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9634.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9634","reference_id":"","reference_type":"","scores":[{"value":"0.16094","scoring_system":"epss","scoring_elements":"0.94755","published_at":"2026-04-01T12:55:00Z"},{"value":"0.16094","scoring_system":"epss","scoring_elements":"0.94764","published_at":"2026-04-02T12:55:00Z"},{"value":"0.16094","scoring_system":"epss","scoring_elements":"0.94768","published_at":"2026-04-04T12:55:00Z"},{"value":"0.16094","scoring_system":"epss","scoring_elements":"0.94769","published_at":"2026-04-07T12:55:00Z"},{"value":"0.16094","scoring_system":"epss","scoring_elements":"0.94779","published_at":"2026-04-08T12:55:00Z"},{"value":"0.16094","scoring_system":"epss","scoring_elements":"0.94783","published_at":"2026-04-09T12:55:00Z"},{"value":"0.16094","scoring_system":"epss","scoring_elements":"0.94787","published_at":"2026-04-11T12:55:00Z"},{"value":"0.16094","scoring_system":"epss","scoring_elements":"0.94791","published_at":"2026-04-12T12:55:00Z"},{"value":"0.16094","scoring_system":"epss","scoring_elements":"0.94792","published_at":"2026-04-13T12:55:00Z"},{"value":"0.16094","scoring_system":"epss","scoring_elements":"0.94799","published_at":"2026-04-16T12:55:00Z"},{"value":"0.16094","scoring_system":"epss","scoring_elements":"0.94803","published_at":"2026-04-18T12:55:00Z"},{"value":"0.16094","scoring_system":"epss","scoring_elements":"0.94806","published_at":"2026-04-21T12:55:00Z"},{"value":"0.16094","scoring_system":"epss","scoring_elements":"0.94807","published_at":"2026-04-24T12:55:00Z"},{"value":"0.16094","scoring_system":"epss","scoring_elements":"0.94808","published_at":"2026-04-26T12:55:00Z"},{"value":"0.16094","scoring_system":"epss","scoring_elements":"0.94809","published_at":"2026-04-29T12:55:00Z"},{"value":"0.16094","scoring_system":"epss","scoring_elements":"0.94817","published_at":"2026-05-05T12:55:00Z"},{"value":"0.16094","scoring_system":"epss","scoring_elements":"0.94825","published_at":"2026-05-07T12:55:00Z"},{"value":"0.16094","scoring_system":"epss","scoring_elements":"0.94835","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9634"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9634","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9634"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9635","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9635"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9636","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9636"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1397441","reference_id":"1397441","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1397441"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845375","reference_id":"845375","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845375"},{"reference_url":"https://security.gentoo.org/glsa/201705-10","reference_id":"GLSA-201705-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201705-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2975","reference_id":"RHSA-2016:2975","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2975"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0019","reference_id":"RHSA-2017:0019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0020","reference_id":"RHSA-2017:0020","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0020"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1036085?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.4.4-2%2Bdeb8u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1kjc-6zdm-jkf3"},{"vulnerability":"VCID-1z2g-dxzn-27d2"},{"vulnerability":"VCID-2nz4-ctek-zbfy"},{"vulnerability":"VCID-358j-grsx-27fn"},{"vulnerability":"VCID-3qta-hpkg-hqad"},{"vulnerability":"VCID-521g-8qbp-cfh3"},{"vulnerability":"VCID-528p-7av9-1kgv"},{"vulnerability":"VCID-5ry6-b22q-37gy"},{"vulnerability":"VCID-5vfg-uj1z-zudn"},{"vulnerability":"VCID-6aaz-buqb-zfcm"},{"vulnerability":"VCID-6hjf-zva4-ekcv"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-771b-5s45-hbhd"},{"vulnerability":"VCID-7nn4-cj6x-uff8"},{"vulnerability":"VCID-92kd-us53-qubg"},{"vulnerability":"VCID-a741-fvg4-h3at"},{"vulnerability":"VCID-bk2h-q83z-43cn"},{"vulnerability":"VCID-bpqa-ngtx-pbes"},{"vulnerability":"VCID-byg3-424m-w3gs"},{"vulnerability":"VCID-cnza-7ar1-f7eh"},{"vulnerability":"VCID-exgv-kz5w-w3bq"},{"vulnerability":"VCID-f1k9-rdv3-nqen"},{"vulnerability":"VCID-f1qr-vrev-tbdc"},{"vulnerability":"VCID-fp9x-81jx-fbhz"},{"vulnerability":"VCID-h2zj-j6va-v7hs"},{"vulnerability":"VCID-hatr-ngra-qqb6"},{"vulnerability":"VCID-hgch-q86h-4qcn"},{"vulnerability":"VCID-hmn3-mxh5-73fj"},{"vulnerability":"VCID-hxhp-4xdt-fqfp"},{"vulnerability":"VCID-j1w1-4xvp-7bh8"},{"vulnerability":"VCID-jzft-takg-afb4"},{"vulnerability":"VCID-k1t8-1fq9-m3gg"},{"vulnerability":"VCID-kfe8-dy9e-ryc5"},{"vulnerability":"VCID-m2g4-ecf6-sufy"},{"vulnerability":"VCID-mcdu-z138-vkgv"},{"vulnerability":"VCID-n1tt-vu7b-skew"},{"vulnerability":"VCID-n1x7-a5e5-ckec"},{"vulnerability":"VCID-p46s-buwz-h3by"},{"vulnerability":"VCID-t93h-vv13-4bck"},{"vulnerability":"VCID-tf3v-37zu-pkaf"},{"vulnerability":"VCID-uj8y-np9h-8qg6"},{"vulnerability":"VCID-v4u8-zktd-cfaq"},{"vulnerability":"VCID-wxcy-bnsr-qkdn"},{"vulnerability":"VCID-zup8-xngn-7bh7"},{"vulnerability":"VCID-zz2u-cmgw-k3c1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.4.4-2%252Bdeb8u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1038145?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.10.4-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1kjc-6zdm-jkf3"},{"vulnerability":"VCID-2nz4-ctek-zbfy"},{"vulnerability":"VCID-358j-grsx-27fn"},{"vulnerability":"VCID-3qta-hpkg-hqad"},{"vulnerability":"VCID-521g-8qbp-cfh3"},{"vulnerability":"VCID-528p-7av9-1kgv"},{"vulnerability":"VCID-5ry6-b22q-37gy"},{"vulnerability":"VCID-6aaz-buqb-zfcm"},{"vulnerability":"VCID-6hjf-zva4-ekcv"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-771b-5s45-hbhd"},{"vulnerability":"VCID-7nn4-cj6x-uff8"},{"vulnerability":"VCID-92kd-us53-qubg"},{"vulnerability":"VCID-a741-fvg4-h3at"},{"vulnerability":"VCID-bpqa-ngtx-pbes"},{"vulnerability":"VCID-exgv-kz5w-w3bq"},{"vulnerability":"VCID-f1qr-vrev-tbdc"},{"vulnerability":"VCID-fp9x-81jx-fbhz"},{"vulnerability":"VCID-h2zj-j6va-v7hs"},{"vulnerability":"VCID-hatr-ngra-qqb6"},{"vulnerability":"VCID-hmn3-mxh5-73fj"},{"vulnerability":"VCID-hxhp-4xdt-fqfp"},{"vulnerability":"VCID-jzft-takg-afb4"},{"vulnerability":"VCID-kfe8-dy9e-ryc5"},{"vulnerability":"VCID-m2g4-ecf6-sufy"},{"vulnerability":"VCID-n1x7-a5e5-ckec"},{"vulnerability":"VCID-p46s-buwz-h3by"},{"vulnerability":"VCID-t93h-vv13-4bck"},{"vulnerability":"VCID-tf3v-37zu-pkaf"},{"vulnerability":"VCID-uj8y-np9h-8qg6"},{"vulnerability":"VCID-v4u8-zktd-cfaq"},{"vulnerability":"VCID-wxcy-bnsr-qkdn"},{"vulnerability":"VCID-zup8-xngn-7bh7"},{"vulnerability":"VCID-zz2u-cmgw-k3c1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.10.4-1"}],"aliases":["CVE-2016-9634"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-byg3-424m-w3gs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60073?format=json","vulnerability_id":"VCID-cnza-7ar1-f7eh","summary":"Multiple vulnerabilities have been found in various GStreamer\n    plug-ins, the worst of which could lead to the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9808.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9808.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9808","reference_id":"","reference_type":"","scores":[{"value":"0.05492","scoring_system":"epss","scoring_elements":"0.90177","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05492","scoring_system":"epss","scoring_elements":"0.9018","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05492","scoring_system":"epss","scoring_elements":"0.90192","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05492","scoring_system":"epss","scoring_elements":"0.90197","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05492","scoring_system":"epss","scoring_elements":"0.90213","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05492","scoring_system":"epss","scoring_elements":"0.90218","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05492","scoring_system":"epss","scoring_elements":"0.90227","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05492","scoring_system":"epss","scoring_elements":"0.90226","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05492","scoring_system":"epss","scoring_elements":"0.90221","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05492","scoring_system":"epss","scoring_elements":"0.90239","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05492","scoring_system":"epss","scoring_elements":"0.90235","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05492","scoring_system":"epss","scoring_elements":"0.90249","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05492","scoring_system":"epss","scoring_elements":"0.90248","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05492","scoring_system":"epss","scoring_elements":"0.90244","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05492","scoring_system":"epss","scoring_elements":"0.90257","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05492","scoring_system":"epss","scoring_elements":"0.90273","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05492","scoring_system":"epss","scoring_elements":"0.90283","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9808"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1397441","reference_id":"1397441","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1397441"},{"reference_url":"https://security.gentoo.org/glsa/201705-10","reference_id":"GLSA-201705-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201705-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2975","reference_id":"RHSA-2016:2975","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2975"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0019","reference_id":"RHSA-2017:0019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0020","reference_id":"RHSA-2017:0020","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0020"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1038145?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.10.4-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1kjc-6zdm-jkf3"},{"vulnerability":"VCID-2nz4-ctek-zbfy"},{"vulnerability":"VCID-358j-grsx-27fn"},{"vulnerability":"VCID-3qta-hpkg-hqad"},{"vulnerability":"VCID-521g-8qbp-cfh3"},{"vulnerability":"VCID-528p-7av9-1kgv"},{"vulnerability":"VCID-5ry6-b22q-37gy"},{"vulnerability":"VCID-6aaz-buqb-zfcm"},{"vulnerability":"VCID-6hjf-zva4-ekcv"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-771b-5s45-hbhd"},{"vulnerability":"VCID-7nn4-cj6x-uff8"},{"vulnerability":"VCID-92kd-us53-qubg"},{"vulnerability":"VCID-a741-fvg4-h3at"},{"vulnerability":"VCID-bpqa-ngtx-pbes"},{"vulnerability":"VCID-exgv-kz5w-w3bq"},{"vulnerability":"VCID-f1qr-vrev-tbdc"},{"vulnerability":"VCID-fp9x-81jx-fbhz"},{"vulnerability":"VCID-h2zj-j6va-v7hs"},{"vulnerability":"VCID-hatr-ngra-qqb6"},{"vulnerability":"VCID-hmn3-mxh5-73fj"},{"vulnerability":"VCID-hxhp-4xdt-fqfp"},{"vulnerability":"VCID-jzft-takg-afb4"},{"vulnerability":"VCID-kfe8-dy9e-ryc5"},{"vulnerability":"VCID-m2g4-ecf6-sufy"},{"vulnerability":"VCID-n1x7-a5e5-ckec"},{"vulnerability":"VCID-p46s-buwz-h3by"},{"vulnerability":"VCID-t93h-vv13-4bck"},{"vulnerability":"VCID-tf3v-37zu-pkaf"},{"vulnerability":"VCID-uj8y-np9h-8qg6"},{"vulnerability":"VCID-v4u8-zktd-cfaq"},{"vulnerability":"VCID-wxcy-bnsr-qkdn"},{"vulnerability":"VCID-zup8-xngn-7bh7"},{"vulnerability":"VCID-zz2u-cmgw-k3c1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.10.4-1"}],"aliases":["CVE-2016-9808"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cnza-7ar1-f7eh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60072?format=json","vulnerability_id":"VCID-f1k9-rdv3-nqen","summary":"Multiple vulnerabilities have been found in various GStreamer\n    plug-ins, the worst of which could lead to the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9807.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9807.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9807","reference_id":"","reference_type":"","scores":[{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73389","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73397","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.7342","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73393","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.7343","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73443","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73467","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73447","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73439","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73482","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.7349","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73484","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73517","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73529","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73526","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.7352","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73544","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73568","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9807"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9807","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9807"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1401874","reference_id":"1401874","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1401874"},{"reference_url":"https://security.gentoo.org/glsa/201705-10","reference_id":"GLSA-201705-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201705-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2975","reference_id":"RHSA-2016:2975","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2975"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0019","reference_id":"RHSA-2017:0019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0020","reference_id":"RHSA-2017:0020","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0020"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1038145?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.10.4-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1kjc-6zdm-jkf3"},{"vulnerability":"VCID-2nz4-ctek-zbfy"},{"vulnerability":"VCID-358j-grsx-27fn"},{"vulnerability":"VCID-3qta-hpkg-hqad"},{"vulnerability":"VCID-521g-8qbp-cfh3"},{"vulnerability":"VCID-528p-7av9-1kgv"},{"vulnerability":"VCID-5ry6-b22q-37gy"},{"vulnerability":"VCID-6aaz-buqb-zfcm"},{"vulnerability":"VCID-6hjf-zva4-ekcv"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-771b-5s45-hbhd"},{"vulnerability":"VCID-7nn4-cj6x-uff8"},{"vulnerability":"VCID-92kd-us53-qubg"},{"vulnerability":"VCID-a741-fvg4-h3at"},{"vulnerability":"VCID-bpqa-ngtx-pbes"},{"vulnerability":"VCID-exgv-kz5w-w3bq"},{"vulnerability":"VCID-f1qr-vrev-tbdc"},{"vulnerability":"VCID-fp9x-81jx-fbhz"},{"vulnerability":"VCID-h2zj-j6va-v7hs"},{"vulnerability":"VCID-hatr-ngra-qqb6"},{"vulnerability":"VCID-hmn3-mxh5-73fj"},{"vulnerability":"VCID-hxhp-4xdt-fqfp"},{"vulnerability":"VCID-jzft-takg-afb4"},{"vulnerability":"VCID-kfe8-dy9e-ryc5"},{"vulnerability":"VCID-m2g4-ecf6-sufy"},{"vulnerability":"VCID-n1x7-a5e5-ckec"},{"vulnerability":"VCID-p46s-buwz-h3by"},{"vulnerability":"VCID-t93h-vv13-4bck"},{"vulnerability":"VCID-tf3v-37zu-pkaf"},{"vulnerability":"VCID-uj8y-np9h-8qg6"},{"vulnerability":"VCID-v4u8-zktd-cfaq"},{"vulnerability":"VCID-wxcy-bnsr-qkdn"},{"vulnerability":"VCID-zup8-xngn-7bh7"},{"vulnerability":"VCID-zz2u-cmgw-k3c1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.10.4-1"}],"aliases":["CVE-2016-9807"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f1k9-rdv3-nqen"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60075?format=json","vulnerability_id":"VCID-hgch-q86h-4qcn","summary":"Multiple vulnerabilities have been found in various GStreamer\n    plug-ins, the worst of which could lead to the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9810.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9810.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9810","reference_id":"","reference_type":"","scores":[{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71162","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71171","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71188","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71163","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71205","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71219","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71241","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71227","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.7121","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71257","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71264","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71294","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71301","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71305","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71291","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71327","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71363","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9810"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9810","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9810"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1401913","reference_id":"1401913","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1401913"},{"reference_url":"https://security.gentoo.org/glsa/201705-10","reference_id":"GLSA-201705-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201705-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2060","reference_id":"RHSA-2017:2060","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2060"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1038145?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.10.4-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1kjc-6zdm-jkf3"},{"vulnerability":"VCID-2nz4-ctek-zbfy"},{"vulnerability":"VCID-358j-grsx-27fn"},{"vulnerability":"VCID-3qta-hpkg-hqad"},{"vulnerability":"VCID-521g-8qbp-cfh3"},{"vulnerability":"VCID-528p-7av9-1kgv"},{"vulnerability":"VCID-5ry6-b22q-37gy"},{"vulnerability":"VCID-6aaz-buqb-zfcm"},{"vulnerability":"VCID-6hjf-zva4-ekcv"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-771b-5s45-hbhd"},{"vulnerability":"VCID-7nn4-cj6x-uff8"},{"vulnerability":"VCID-92kd-us53-qubg"},{"vulnerability":"VCID-a741-fvg4-h3at"},{"vulnerability":"VCID-bpqa-ngtx-pbes"},{"vulnerability":"VCID-exgv-kz5w-w3bq"},{"vulnerability":"VCID-f1qr-vrev-tbdc"},{"vulnerability":"VCID-fp9x-81jx-fbhz"},{"vulnerability":"VCID-h2zj-j6va-v7hs"},{"vulnerability":"VCID-hatr-ngra-qqb6"},{"vulnerability":"VCID-hmn3-mxh5-73fj"},{"vulnerability":"VCID-hxhp-4xdt-fqfp"},{"vulnerability":"VCID-jzft-takg-afb4"},{"vulnerability":"VCID-kfe8-dy9e-ryc5"},{"vulnerability":"VCID-m2g4-ecf6-sufy"},{"vulnerability":"VCID-n1x7-a5e5-ckec"},{"vulnerability":"VCID-p46s-buwz-h3by"},{"vulnerability":"VCID-t93h-vv13-4bck"},{"vulnerability":"VCID-tf3v-37zu-pkaf"},{"vulnerability":"VCID-uj8y-np9h-8qg6"},{"vulnerability":"VCID-v4u8-zktd-cfaq"},{"vulnerability":"VCID-wxcy-bnsr-qkdn"},{"vulnerability":"VCID-zup8-xngn-7bh7"},{"vulnerability":"VCID-zz2u-cmgw-k3c1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.10.4-1"}],"aliases":["CVE-2016-9810"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hgch-q86h-4qcn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60084?format=json","vulnerability_id":"VCID-j1w1-4xvp-7bh8","summary":"Multiple vulnerabilities have been found in various GStreamer\n    plug-ins, the worst of which could lead to the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5840.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5840.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5840","reference_id":"","reference_type":"","scores":[{"value":"0.06856","scoring_system":"epss","scoring_elements":"0.91316","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06856","scoring_system":"epss","scoring_elements":"0.91438","published_at":"2026-05-09T12:55:00Z"},{"value":"0.06856","scoring_system":"epss","scoring_elements":"0.91413","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06856","scoring_system":"epss","scoring_elements":"0.91428","published_at":"2026-05-07T12:55:00Z"},{"value":"0.06856","scoring_system":"epss","scoring_elements":"0.91321","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06856","scoring_system":"epss","scoring_elements":"0.91331","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06856","scoring_system":"epss","scoring_elements":"0.91338","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06856","scoring_system":"epss","scoring_elements":"0.91351","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06856","scoring_system":"epss","scoring_elements":"0.91358","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06856","scoring_system":"epss","scoring_elements":"0.91364","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06856","scoring_system":"epss","scoring_elements":"0.91367","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06856","scoring_system":"epss","scoring_elements":"0.91392","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06856","scoring_system":"epss","scoring_elements":"0.9139","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06856","scoring_system":"epss","scoring_elements":"0.91401","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06856","scoring_system":"epss","scoring_elements":"0.91399","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5840"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10199","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10199"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5840","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5840"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5841","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5841"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5845"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1419588","reference_id":"1419588","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1419588"},{"reference_url":"https://security.archlinux.org/ASA-201702-3","reference_id":"ASA-201702-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201702-3"},{"reference_url":"https://security.archlinux.org/AVG-163","reference_id":"AVG-163","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-163"},{"reference_url":"https://security.gentoo.org/glsa/201705-10","reference_id":"GLSA-201705-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201705-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2060","reference_id":"RHSA-2017:2060","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2060"},{"reference_url":"https://usn.ubuntu.com/3245-1/","reference_id":"USN-3245-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3245-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1036085?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.4.4-2%2Bdeb8u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1kjc-6zdm-jkf3"},{"vulnerability":"VCID-1z2g-dxzn-27d2"},{"vulnerability":"VCID-2nz4-ctek-zbfy"},{"vulnerability":"VCID-358j-grsx-27fn"},{"vulnerability":"VCID-3qta-hpkg-hqad"},{"vulnerability":"VCID-521g-8qbp-cfh3"},{"vulnerability":"VCID-528p-7av9-1kgv"},{"vulnerability":"VCID-5ry6-b22q-37gy"},{"vulnerability":"VCID-5vfg-uj1z-zudn"},{"vulnerability":"VCID-6aaz-buqb-zfcm"},{"vulnerability":"VCID-6hjf-zva4-ekcv"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-771b-5s45-hbhd"},{"vulnerability":"VCID-7nn4-cj6x-uff8"},{"vulnerability":"VCID-92kd-us53-qubg"},{"vulnerability":"VCID-a741-fvg4-h3at"},{"vulnerability":"VCID-bk2h-q83z-43cn"},{"vulnerability":"VCID-bpqa-ngtx-pbes"},{"vulnerability":"VCID-byg3-424m-w3gs"},{"vulnerability":"VCID-cnza-7ar1-f7eh"},{"vulnerability":"VCID-exgv-kz5w-w3bq"},{"vulnerability":"VCID-f1k9-rdv3-nqen"},{"vulnerability":"VCID-f1qr-vrev-tbdc"},{"vulnerability":"VCID-fp9x-81jx-fbhz"},{"vulnerability":"VCID-h2zj-j6va-v7hs"},{"vulnerability":"VCID-hatr-ngra-qqb6"},{"vulnerability":"VCID-hgch-q86h-4qcn"},{"vulnerability":"VCID-hmn3-mxh5-73fj"},{"vulnerability":"VCID-hxhp-4xdt-fqfp"},{"vulnerability":"VCID-j1w1-4xvp-7bh8"},{"vulnerability":"VCID-jzft-takg-afb4"},{"vulnerability":"VCID-k1t8-1fq9-m3gg"},{"vulnerability":"VCID-kfe8-dy9e-ryc5"},{"vulnerability":"VCID-m2g4-ecf6-sufy"},{"vulnerability":"VCID-mcdu-z138-vkgv"},{"vulnerability":"VCID-n1tt-vu7b-skew"},{"vulnerability":"VCID-n1x7-a5e5-ckec"},{"vulnerability":"VCID-p46s-buwz-h3by"},{"vulnerability":"VCID-t93h-vv13-4bck"},{"vulnerability":"VCID-tf3v-37zu-pkaf"},{"vulnerability":"VCID-uj8y-np9h-8qg6"},{"vulnerability":"VCID-v4u8-zktd-cfaq"},{"vulnerability":"VCID-wxcy-bnsr-qkdn"},{"vulnerability":"VCID-zup8-xngn-7bh7"},{"vulnerability":"VCID-zz2u-cmgw-k3c1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.4.4-2%252Bdeb8u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1038145?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.10.4-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1kjc-6zdm-jkf3"},{"vulnerability":"VCID-2nz4-ctek-zbfy"},{"vulnerability":"VCID-358j-grsx-27fn"},{"vulnerability":"VCID-3qta-hpkg-hqad"},{"vulnerability":"VCID-521g-8qbp-cfh3"},{"vulnerability":"VCID-528p-7av9-1kgv"},{"vulnerability":"VCID-5ry6-b22q-37gy"},{"vulnerability":"VCID-6aaz-buqb-zfcm"},{"vulnerability":"VCID-6hjf-zva4-ekcv"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-771b-5s45-hbhd"},{"vulnerability":"VCID-7nn4-cj6x-uff8"},{"vulnerability":"VCID-92kd-us53-qubg"},{"vulnerability":"VCID-a741-fvg4-h3at"},{"vulnerability":"VCID-bpqa-ngtx-pbes"},{"vulnerability":"VCID-exgv-kz5w-w3bq"},{"vulnerability":"VCID-f1qr-vrev-tbdc"},{"vulnerability":"VCID-fp9x-81jx-fbhz"},{"vulnerability":"VCID-h2zj-j6va-v7hs"},{"vulnerability":"VCID-hatr-ngra-qqb6"},{"vulnerability":"VCID-hmn3-mxh5-73fj"},{"vulnerability":"VCID-hxhp-4xdt-fqfp"},{"vulnerability":"VCID-jzft-takg-afb4"},{"vulnerability":"VCID-kfe8-dy9e-ryc5"},{"vulnerability":"VCID-m2g4-ecf6-sufy"},{"vulnerability":"VCID-n1x7-a5e5-ckec"},{"vulnerability":"VCID-p46s-buwz-h3by"},{"vulnerability":"VCID-t93h-vv13-4bck"},{"vulnerability":"VCID-tf3v-37zu-pkaf"},{"vulnerability":"VCID-uj8y-np9h-8qg6"},{"vulnerability":"VCID-v4u8-zktd-cfaq"},{"vulnerability":"VCID-wxcy-bnsr-qkdn"},{"vulnerability":"VCID-zup8-xngn-7bh7"},{"vulnerability":"VCID-zz2u-cmgw-k3c1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.10.4-1"}],"aliases":["CVE-2017-5840"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j1w1-4xvp-7bh8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60070?format=json","vulnerability_id":"VCID-k1t8-1fq9-m3gg","summary":"Multiple vulnerabilities have been found in various GStreamer\n    plug-ins, the worst of which could lead to the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9635.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9635.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9635","reference_id":"","reference_type":"","scores":[{"value":"0.16094","scoring_system":"epss","scoring_elements":"0.94755","published_at":"2026-04-01T12:55:00Z"},{"value":"0.16094","scoring_system":"epss","scoring_elements":"0.94764","published_at":"2026-04-02T12:55:00Z"},{"value":"0.16094","scoring_system":"epss","scoring_elements":"0.94768","published_at":"2026-04-04T12:55:00Z"},{"value":"0.16094","scoring_system":"epss","scoring_elements":"0.94769","published_at":"2026-04-07T12:55:00Z"},{"value":"0.16094","scoring_system":"epss","scoring_elements":"0.94779","published_at":"2026-04-08T12:55:00Z"},{"value":"0.16094","scoring_system":"epss","scoring_elements":"0.94783","published_at":"2026-04-09T12:55:00Z"},{"value":"0.16094","scoring_system":"epss","scoring_elements":"0.94787","published_at":"2026-04-11T12:55:00Z"},{"value":"0.16094","scoring_system":"epss","scoring_elements":"0.94791","published_at":"2026-04-12T12:55:00Z"},{"value":"0.16094","scoring_system":"epss","scoring_elements":"0.94792","published_at":"2026-04-13T12:55:00Z"},{"value":"0.16094","scoring_system":"epss","scoring_elements":"0.94799","published_at":"2026-04-16T12:55:00Z"},{"value":"0.16094","scoring_system":"epss","scoring_elements":"0.94803","published_at":"2026-04-18T12:55:00Z"},{"value":"0.16094","scoring_system":"epss","scoring_elements":"0.94806","published_at":"2026-04-21T12:55:00Z"},{"value":"0.16094","scoring_system":"epss","scoring_elements":"0.94807","published_at":"2026-04-24T12:55:00Z"},{"value":"0.16094","scoring_system":"epss","scoring_elements":"0.94808","published_at":"2026-04-26T12:55:00Z"},{"value":"0.16094","scoring_system":"epss","scoring_elements":"0.94809","published_at":"2026-04-29T12:55:00Z"},{"value":"0.16094","scoring_system":"epss","scoring_elements":"0.94817","published_at":"2026-05-05T12:55:00Z"},{"value":"0.16094","scoring_system":"epss","scoring_elements":"0.94825","published_at":"2026-05-07T12:55:00Z"},{"value":"0.16094","scoring_system":"epss","scoring_elements":"0.94835","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9635"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9634","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9634"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9635","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9635"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9636","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9636"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1397441","reference_id":"1397441","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1397441"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845375","reference_id":"845375","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845375"},{"reference_url":"https://security.gentoo.org/glsa/201705-10","reference_id":"GLSA-201705-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201705-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2975","reference_id":"RHSA-2016:2975","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2975"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0019","reference_id":"RHSA-2017:0019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0020","reference_id":"RHSA-2017:0020","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0020"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1036085?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.4.4-2%2Bdeb8u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1kjc-6zdm-jkf3"},{"vulnerability":"VCID-1z2g-dxzn-27d2"},{"vulnerability":"VCID-2nz4-ctek-zbfy"},{"vulnerability":"VCID-358j-grsx-27fn"},{"vulnerability":"VCID-3qta-hpkg-hqad"},{"vulnerability":"VCID-521g-8qbp-cfh3"},{"vulnerability":"VCID-528p-7av9-1kgv"},{"vulnerability":"VCID-5ry6-b22q-37gy"},{"vulnerability":"VCID-5vfg-uj1z-zudn"},{"vulnerability":"VCID-6aaz-buqb-zfcm"},{"vulnerability":"VCID-6hjf-zva4-ekcv"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-771b-5s45-hbhd"},{"vulnerability":"VCID-7nn4-cj6x-uff8"},{"vulnerability":"VCID-92kd-us53-qubg"},{"vulnerability":"VCID-a741-fvg4-h3at"},{"vulnerability":"VCID-bk2h-q83z-43cn"},{"vulnerability":"VCID-bpqa-ngtx-pbes"},{"vulnerability":"VCID-byg3-424m-w3gs"},{"vulnerability":"VCID-cnza-7ar1-f7eh"},{"vulnerability":"VCID-exgv-kz5w-w3bq"},{"vulnerability":"VCID-f1k9-rdv3-nqen"},{"vulnerability":"VCID-f1qr-vrev-tbdc"},{"vulnerability":"VCID-fp9x-81jx-fbhz"},{"vulnerability":"VCID-h2zj-j6va-v7hs"},{"vulnerability":"VCID-hatr-ngra-qqb6"},{"vulnerability":"VCID-hgch-q86h-4qcn"},{"vulnerability":"VCID-hmn3-mxh5-73fj"},{"vulnerability":"VCID-hxhp-4xdt-fqfp"},{"vulnerability":"VCID-j1w1-4xvp-7bh8"},{"vulnerability":"VCID-jzft-takg-afb4"},{"vulnerability":"VCID-k1t8-1fq9-m3gg"},{"vulnerability":"VCID-kfe8-dy9e-ryc5"},{"vulnerability":"VCID-m2g4-ecf6-sufy"},{"vulnerability":"VCID-mcdu-z138-vkgv"},{"vulnerability":"VCID-n1tt-vu7b-skew"},{"vulnerability":"VCID-n1x7-a5e5-ckec"},{"vulnerability":"VCID-p46s-buwz-h3by"},{"vulnerability":"VCID-t93h-vv13-4bck"},{"vulnerability":"VCID-tf3v-37zu-pkaf"},{"vulnerability":"VCID-uj8y-np9h-8qg6"},{"vulnerability":"VCID-v4u8-zktd-cfaq"},{"vulnerability":"VCID-wxcy-bnsr-qkdn"},{"vulnerability":"VCID-zup8-xngn-7bh7"},{"vulnerability":"VCID-zz2u-cmgw-k3c1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.4.4-2%252Bdeb8u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1038145?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.10.4-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1kjc-6zdm-jkf3"},{"vulnerability":"VCID-2nz4-ctek-zbfy"},{"vulnerability":"VCID-358j-grsx-27fn"},{"vulnerability":"VCID-3qta-hpkg-hqad"},{"vulnerability":"VCID-521g-8qbp-cfh3"},{"vulnerability":"VCID-528p-7av9-1kgv"},{"vulnerability":"VCID-5ry6-b22q-37gy"},{"vulnerability":"VCID-6aaz-buqb-zfcm"},{"vulnerability":"VCID-6hjf-zva4-ekcv"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-771b-5s45-hbhd"},{"vulnerability":"VCID-7nn4-cj6x-uff8"},{"vulnerability":"VCID-92kd-us53-qubg"},{"vulnerability":"VCID-a741-fvg4-h3at"},{"vulnerability":"VCID-bpqa-ngtx-pbes"},{"vulnerability":"VCID-exgv-kz5w-w3bq"},{"vulnerability":"VCID-f1qr-vrev-tbdc"},{"vulnerability":"VCID-fp9x-81jx-fbhz"},{"vulnerability":"VCID-h2zj-j6va-v7hs"},{"vulnerability":"VCID-hatr-ngra-qqb6"},{"vulnerability":"VCID-hmn3-mxh5-73fj"},{"vulnerability":"VCID-hxhp-4xdt-fqfp"},{"vulnerability":"VCID-jzft-takg-afb4"},{"vulnerability":"VCID-kfe8-dy9e-ryc5"},{"vulnerability":"VCID-m2g4-ecf6-sufy"},{"vulnerability":"VCID-n1x7-a5e5-ckec"},{"vulnerability":"VCID-p46s-buwz-h3by"},{"vulnerability":"VCID-t93h-vv13-4bck"},{"vulnerability":"VCID-tf3v-37zu-pkaf"},{"vulnerability":"VCID-uj8y-np9h-8qg6"},{"vulnerability":"VCID-v4u8-zktd-cfaq"},{"vulnerability":"VCID-wxcy-bnsr-qkdn"},{"vulnerability":"VCID-zup8-xngn-7bh7"},{"vulnerability":"VCID-zz2u-cmgw-k3c1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.10.4-1"}],"aliases":["CVE-2016-9635"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k1t8-1fq9-m3gg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60085?format=json","vulnerability_id":"VCID-mcdu-z138-vkgv","summary":"Multiple vulnerabilities have been found in various GStreamer\n    plug-ins, the worst of which could lead to the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5841.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5841.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5841","reference_id":"","reference_type":"","scores":[{"value":"0.03108","scoring_system":"epss","scoring_elements":"0.86758","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03108","scoring_system":"epss","scoring_elements":"0.8692","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03108","scoring_system":"epss","scoring_elements":"0.86884","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03108","scoring_system":"epss","scoring_elements":"0.86903","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03108","scoring_system":"epss","scoring_elements":"0.86769","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03108","scoring_system":"epss","scoring_elements":"0.86787","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03108","scoring_system":"epss","scoring_elements":"0.86785","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03108","scoring_system":"epss","scoring_elements":"0.86805","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03108","scoring_system":"epss","scoring_elements":"0.86813","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03108","scoring_system":"epss","scoring_elements":"0.86827","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03108","scoring_system":"epss","scoring_elements":"0.86823","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03108","scoring_system":"epss","scoring_elements":"0.86819","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03108","scoring_system":"epss","scoring_elements":"0.86835","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03108","scoring_system":"epss","scoring_elements":"0.86839","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03108","scoring_system":"epss","scoring_elements":"0.86838","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03108","scoring_system":"epss","scoring_elements":"0.86855","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03108","scoring_system":"epss","scoring_elements":"0.86861","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5841"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10199","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10199"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5840","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5840"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5841","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5841"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5845"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1419589","reference_id":"1419589","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1419589"},{"reference_url":"https://security.archlinux.org/ASA-201702-3","reference_id":"ASA-201702-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201702-3"},{"reference_url":"https://security.archlinux.org/AVG-163","reference_id":"AVG-163","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-163"},{"reference_url":"https://security.gentoo.org/glsa/201705-10","reference_id":"GLSA-201705-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201705-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2060","reference_id":"RHSA-2017:2060","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2060"},{"reference_url":"https://usn.ubuntu.com/3245-1/","reference_id":"USN-3245-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3245-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1036085?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.4.4-2%2Bdeb8u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1kjc-6zdm-jkf3"},{"vulnerability":"VCID-1z2g-dxzn-27d2"},{"vulnerability":"VCID-2nz4-ctek-zbfy"},{"vulnerability":"VCID-358j-grsx-27fn"},{"vulnerability":"VCID-3qta-hpkg-hqad"},{"vulnerability":"VCID-521g-8qbp-cfh3"},{"vulnerability":"VCID-528p-7av9-1kgv"},{"vulnerability":"VCID-5ry6-b22q-37gy"},{"vulnerability":"VCID-5vfg-uj1z-zudn"},{"vulnerability":"VCID-6aaz-buqb-zfcm"},{"vulnerability":"VCID-6hjf-zva4-ekcv"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-771b-5s45-hbhd"},{"vulnerability":"VCID-7nn4-cj6x-uff8"},{"vulnerability":"VCID-92kd-us53-qubg"},{"vulnerability":"VCID-a741-fvg4-h3at"},{"vulnerability":"VCID-bk2h-q83z-43cn"},{"vulnerability":"VCID-bpqa-ngtx-pbes"},{"vulnerability":"VCID-byg3-424m-w3gs"},{"vulnerability":"VCID-cnza-7ar1-f7eh"},{"vulnerability":"VCID-exgv-kz5w-w3bq"},{"vulnerability":"VCID-f1k9-rdv3-nqen"},{"vulnerability":"VCID-f1qr-vrev-tbdc"},{"vulnerability":"VCID-fp9x-81jx-fbhz"},{"vulnerability":"VCID-h2zj-j6va-v7hs"},{"vulnerability":"VCID-hatr-ngra-qqb6"},{"vulnerability":"VCID-hgch-q86h-4qcn"},{"vulnerability":"VCID-hmn3-mxh5-73fj"},{"vulnerability":"VCID-hxhp-4xdt-fqfp"},{"vulnerability":"VCID-j1w1-4xvp-7bh8"},{"vulnerability":"VCID-jzft-takg-afb4"},{"vulnerability":"VCID-k1t8-1fq9-m3gg"},{"vulnerability":"VCID-kfe8-dy9e-ryc5"},{"vulnerability":"VCID-m2g4-ecf6-sufy"},{"vulnerability":"VCID-mcdu-z138-vkgv"},{"vulnerability":"VCID-n1tt-vu7b-skew"},{"vulnerability":"VCID-n1x7-a5e5-ckec"},{"vulnerability":"VCID-p46s-buwz-h3by"},{"vulnerability":"VCID-t93h-vv13-4bck"},{"vulnerability":"VCID-tf3v-37zu-pkaf"},{"vulnerability":"VCID-uj8y-np9h-8qg6"},{"vulnerability":"VCID-v4u8-zktd-cfaq"},{"vulnerability":"VCID-wxcy-bnsr-qkdn"},{"vulnerability":"VCID-zup8-xngn-7bh7"},{"vulnerability":"VCID-zz2u-cmgw-k3c1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.4.4-2%252Bdeb8u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1038145?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.10.4-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1kjc-6zdm-jkf3"},{"vulnerability":"VCID-2nz4-ctek-zbfy"},{"vulnerability":"VCID-358j-grsx-27fn"},{"vulnerability":"VCID-3qta-hpkg-hqad"},{"vulnerability":"VCID-521g-8qbp-cfh3"},{"vulnerability":"VCID-528p-7av9-1kgv"},{"vulnerability":"VCID-5ry6-b22q-37gy"},{"vulnerability":"VCID-6aaz-buqb-zfcm"},{"vulnerability":"VCID-6hjf-zva4-ekcv"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-771b-5s45-hbhd"},{"vulnerability":"VCID-7nn4-cj6x-uff8"},{"vulnerability":"VCID-92kd-us53-qubg"},{"vulnerability":"VCID-a741-fvg4-h3at"},{"vulnerability":"VCID-bpqa-ngtx-pbes"},{"vulnerability":"VCID-exgv-kz5w-w3bq"},{"vulnerability":"VCID-f1qr-vrev-tbdc"},{"vulnerability":"VCID-fp9x-81jx-fbhz"},{"vulnerability":"VCID-h2zj-j6va-v7hs"},{"vulnerability":"VCID-hatr-ngra-qqb6"},{"vulnerability":"VCID-hmn3-mxh5-73fj"},{"vulnerability":"VCID-hxhp-4xdt-fqfp"},{"vulnerability":"VCID-jzft-takg-afb4"},{"vulnerability":"VCID-kfe8-dy9e-ryc5"},{"vulnerability":"VCID-m2g4-ecf6-sufy"},{"vulnerability":"VCID-n1x7-a5e5-ckec"},{"vulnerability":"VCID-p46s-buwz-h3by"},{"vulnerability":"VCID-t93h-vv13-4bck"},{"vulnerability":"VCID-tf3v-37zu-pkaf"},{"vulnerability":"VCID-uj8y-np9h-8qg6"},{"vulnerability":"VCID-v4u8-zktd-cfaq"},{"vulnerability":"VCID-wxcy-bnsr-qkdn"},{"vulnerability":"VCID-zup8-xngn-7bh7"},{"vulnerability":"VCID-zz2u-cmgw-k3c1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.10.4-1"}],"aliases":["CVE-2017-5841"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mcdu-z138-vkgv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60071?format=json","vulnerability_id":"VCID-n1tt-vu7b-skew","summary":"Multiple vulnerabilities have been found in various GStreamer\n    plug-ins, the worst of which could lead to the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9636.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9636.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9636","reference_id":"","reference_type":"","scores":[{"value":"0.1664","scoring_system":"epss","scoring_elements":"0.94893","published_at":"2026-04-01T12:55:00Z"},{"value":"0.1664","scoring_system":"epss","scoring_elements":"0.94902","published_at":"2026-04-02T12:55:00Z"},{"value":"0.1664","scoring_system":"epss","scoring_elements":"0.94905","published_at":"2026-04-04T12:55:00Z"},{"value":"0.1664","scoring_system":"epss","scoring_elements":"0.94907","published_at":"2026-04-07T12:55:00Z"},{"value":"0.1664","scoring_system":"epss","scoring_elements":"0.94916","published_at":"2026-04-08T12:55:00Z"},{"value":"0.1664","scoring_system":"epss","scoring_elements":"0.94919","published_at":"2026-04-09T12:55:00Z"},{"value":"0.1664","scoring_system":"epss","scoring_elements":"0.94924","published_at":"2026-04-11T12:55:00Z"},{"value":"0.1664","scoring_system":"epss","scoring_elements":"0.94927","published_at":"2026-04-12T12:55:00Z"},{"value":"0.1664","scoring_system":"epss","scoring_elements":"0.94929","published_at":"2026-04-13T12:55:00Z"},{"value":"0.1664","scoring_system":"epss","scoring_elements":"0.94937","published_at":"2026-04-16T12:55:00Z"},{"value":"0.1664","scoring_system":"epss","scoring_elements":"0.9494","published_at":"2026-04-18T12:55:00Z"},{"value":"0.1664","scoring_system":"epss","scoring_elements":"0.94944","published_at":"2026-04-29T12:55:00Z"},{"value":"0.1664","scoring_system":"epss","scoring_elements":"0.94945","published_at":"2026-04-24T12:55:00Z"},{"value":"0.1664","scoring_system":"epss","scoring_elements":"0.94951","published_at":"2026-05-05T12:55:00Z"},{"value":"0.1664","scoring_system":"epss","scoring_elements":"0.94958","published_at":"2026-05-07T12:55:00Z"},{"value":"0.1664","scoring_system":"epss","scoring_elements":"0.94968","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9636"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9634","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9634"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9635","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9635"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9636","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9636"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1397441","reference_id":"1397441","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1397441"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845375","reference_id":"845375","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845375"},{"reference_url":"https://security.gentoo.org/glsa/201705-10","reference_id":"GLSA-201705-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201705-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2975","reference_id":"RHSA-2016:2975","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2975"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0019","reference_id":"RHSA-2017:0019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0020","reference_id":"RHSA-2017:0020","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0020"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1036085?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.4.4-2%2Bdeb8u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1kjc-6zdm-jkf3"},{"vulnerability":"VCID-1z2g-dxzn-27d2"},{"vulnerability":"VCID-2nz4-ctek-zbfy"},{"vulnerability":"VCID-358j-grsx-27fn"},{"vulnerability":"VCID-3qta-hpkg-hqad"},{"vulnerability":"VCID-521g-8qbp-cfh3"},{"vulnerability":"VCID-528p-7av9-1kgv"},{"vulnerability":"VCID-5ry6-b22q-37gy"},{"vulnerability":"VCID-5vfg-uj1z-zudn"},{"vulnerability":"VCID-6aaz-buqb-zfcm"},{"vulnerability":"VCID-6hjf-zva4-ekcv"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-771b-5s45-hbhd"},{"vulnerability":"VCID-7nn4-cj6x-uff8"},{"vulnerability":"VCID-92kd-us53-qubg"},{"vulnerability":"VCID-a741-fvg4-h3at"},{"vulnerability":"VCID-bk2h-q83z-43cn"},{"vulnerability":"VCID-bpqa-ngtx-pbes"},{"vulnerability":"VCID-byg3-424m-w3gs"},{"vulnerability":"VCID-cnza-7ar1-f7eh"},{"vulnerability":"VCID-exgv-kz5w-w3bq"},{"vulnerability":"VCID-f1k9-rdv3-nqen"},{"vulnerability":"VCID-f1qr-vrev-tbdc"},{"vulnerability":"VCID-fp9x-81jx-fbhz"},{"vulnerability":"VCID-h2zj-j6va-v7hs"},{"vulnerability":"VCID-hatr-ngra-qqb6"},{"vulnerability":"VCID-hgch-q86h-4qcn"},{"vulnerability":"VCID-hmn3-mxh5-73fj"},{"vulnerability":"VCID-hxhp-4xdt-fqfp"},{"vulnerability":"VCID-j1w1-4xvp-7bh8"},{"vulnerability":"VCID-jzft-takg-afb4"},{"vulnerability":"VCID-k1t8-1fq9-m3gg"},{"vulnerability":"VCID-kfe8-dy9e-ryc5"},{"vulnerability":"VCID-m2g4-ecf6-sufy"},{"vulnerability":"VCID-mcdu-z138-vkgv"},{"vulnerability":"VCID-n1tt-vu7b-skew"},{"vulnerability":"VCID-n1x7-a5e5-ckec"},{"vulnerability":"VCID-p46s-buwz-h3by"},{"vulnerability":"VCID-t93h-vv13-4bck"},{"vulnerability":"VCID-tf3v-37zu-pkaf"},{"vulnerability":"VCID-uj8y-np9h-8qg6"},{"vulnerability":"VCID-v4u8-zktd-cfaq"},{"vulnerability":"VCID-wxcy-bnsr-qkdn"},{"vulnerability":"VCID-zup8-xngn-7bh7"},{"vulnerability":"VCID-zz2u-cmgw-k3c1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.4.4-2%252Bdeb8u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1038145?format=json","purl":"pkg:deb/debian/gst-plugins-good1.0@1.10.4-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1kjc-6zdm-jkf3"},{"vulnerability":"VCID-2nz4-ctek-zbfy"},{"vulnerability":"VCID-358j-grsx-27fn"},{"vulnerability":"VCID-3qta-hpkg-hqad"},{"vulnerability":"VCID-521g-8qbp-cfh3"},{"vulnerability":"VCID-528p-7av9-1kgv"},{"vulnerability":"VCID-5ry6-b22q-37gy"},{"vulnerability":"VCID-6aaz-buqb-zfcm"},{"vulnerability":"VCID-6hjf-zva4-ekcv"},{"vulnerability":"VCID-6rvw-7p62-rbdf"},{"vulnerability":"VCID-771b-5s45-hbhd"},{"vulnerability":"VCID-7nn4-cj6x-uff8"},{"vulnerability":"VCID-92kd-us53-qubg"},{"vulnerability":"VCID-a741-fvg4-h3at"},{"vulnerability":"VCID-bpqa-ngtx-pbes"},{"vulnerability":"VCID-exgv-kz5w-w3bq"},{"vulnerability":"VCID-f1qr-vrev-tbdc"},{"vulnerability":"VCID-fp9x-81jx-fbhz"},{"vulnerability":"VCID-h2zj-j6va-v7hs"},{"vulnerability":"VCID-hatr-ngra-qqb6"},{"vulnerability":"VCID-hmn3-mxh5-73fj"},{"vulnerability":"VCID-hxhp-4xdt-fqfp"},{"vulnerability":"VCID-jzft-takg-afb4"},{"vulnerability":"VCID-kfe8-dy9e-ryc5"},{"vulnerability":"VCID-m2g4-ecf6-sufy"},{"vulnerability":"VCID-n1x7-a5e5-ckec"},{"vulnerability":"VCID-p46s-buwz-h3by"},{"vulnerability":"VCID-t93h-vv13-4bck"},{"vulnerability":"VCID-tf3v-37zu-pkaf"},{"vulnerability":"VCID-uj8y-np9h-8qg6"},{"vulnerability":"VCID-v4u8-zktd-cfaq"},{"vulnerability":"VCID-wxcy-bnsr-qkdn"},{"vulnerability":"VCID-zup8-xngn-7bh7"},{"vulnerability":"VCID-zz2u-cmgw-k3c1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.10.4-1"}],"aliases":["CVE-2016-9636"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n1tt-vu7b-skew"}],"risk_score":"4.4","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.10.4-1"}