Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/taglib@1.4-4
Typedeb
Namespacedebian
Nametaglib
Version1.4-4
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.13-2+deb12u1
Latest_non_vulnerable_version2.0.2-2
Affected_by_vulnerabilities
0
url VCID-49vn-a68c-8qgx
vulnerability_id VCID-49vn-a68c-8qgx
summary
Multiple vulnerabilities have been found in TagLib, possibly
    resulting in Denial of Service.
references
0
reference_url http://mail.kde.org/pipermail/taglib-devel/2012-March/002186.html
reference_id
reference_type
scores
url http://mail.kde.org/pipermail/taglib-devel/2012-March/002186.html
1
reference_url http://mail.kde.org/pipermail/taglib-devel/2012-March/002191.html
reference_id
reference_type
scores
url http://mail.kde.org/pipermail/taglib-devel/2012-March/002191.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1584.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1584.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1584
reference_id
reference_type
scores
0
value 0.02815
scoring_system epss
scoring_elements 0.86187
published_at 2026-04-29T12:55:00Z
1
value 0.02815
scoring_system epss
scoring_elements 0.86077
published_at 2026-04-01T12:55:00Z
2
value 0.02815
scoring_system epss
scoring_elements 0.86087
published_at 2026-04-02T12:55:00Z
3
value 0.02815
scoring_system epss
scoring_elements 0.86104
published_at 2026-04-04T12:55:00Z
4
value 0.02815
scoring_system epss
scoring_elements 0.86103
published_at 2026-04-07T12:55:00Z
5
value 0.02815
scoring_system epss
scoring_elements 0.86122
published_at 2026-04-08T12:55:00Z
6
value 0.02815
scoring_system epss
scoring_elements 0.86133
published_at 2026-04-09T12:55:00Z
7
value 0.02815
scoring_system epss
scoring_elements 0.86148
published_at 2026-04-11T12:55:00Z
8
value 0.02815
scoring_system epss
scoring_elements 0.86146
published_at 2026-04-12T12:55:00Z
9
value 0.02815
scoring_system epss
scoring_elements 0.86142
published_at 2026-04-13T12:55:00Z
10
value 0.02815
scoring_system epss
scoring_elements 0.8616
published_at 2026-04-16T12:55:00Z
11
value 0.02815
scoring_system epss
scoring_elements 0.86165
published_at 2026-04-18T12:55:00Z
12
value 0.02815
scoring_system epss
scoring_elements 0.86157
published_at 2026-04-21T12:55:00Z
13
value 0.02815
scoring_system epss
scoring_elements 0.86178
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1584
5
reference_url http://secunia.com/advisories/48211
reference_id
reference_type
scores
url http://secunia.com/advisories/48211
6
reference_url http://secunia.com/advisories/48792
reference_id
reference_type
scores
url http://secunia.com/advisories/48792
7
reference_url http://secunia.com/advisories/49688
reference_id
reference_type
scores
url http://secunia.com/advisories/49688
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/78909
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/78909
9
reference_url https://github.com/taglib/taglib/commit/dcdf4fd954e3213c355746fa15b7480461972308
reference_id
reference_type
scores
url https://github.com/taglib/taglib/commit/dcdf4fd954e3213c355746fa15b7480461972308
10
reference_url http://www.gentoo.org/security/en/glsa/glsa-201206-16.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-201206-16.xml
11
reference_url http://www.openwall.com/lists/oss-security/2012/03/05/19
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/03/05/19
12
reference_url http://www.openwall.com/lists/oss-security/2012/03/21/11
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/03/21/11
13
reference_url http://www.openwall.com/lists/oss-security/2012/03/26/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/03/26/4
14
reference_url http://www.securityfocus.com/bid/52290
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/52290
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662705
reference_id 662705
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662705
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=810009
reference_id 810009
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=810009
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:scott_wheeler:taglib:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:scott_wheeler:taglib:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:scott_wheeler:taglib:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:scott_wheeler:taglib:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:scott_wheeler:taglib:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.3:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:scott_wheeler:taglib:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.3.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:scott_wheeler:taglib:1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.4:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:scott_wheeler:taglib:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.5:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:scott_wheeler:taglib:1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.6:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:scott_wheeler:taglib:1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.6.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:scott_wheeler:taglib:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.6.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:scott_wheeler:taglib:1.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.6.3:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-1584
reference_id CVE-2012-1584
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-1584
30
reference_url https://security.gentoo.org/glsa/201206-16
reference_id GLSA-201206-16
reference_type
scores
url https://security.gentoo.org/glsa/201206-16
fixed_packages
0
url pkg:deb/debian/taglib@1.7.2-1
purl pkg:deb/debian/taglib@1.7.2-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-pkjn-axeb-ykej
1
vulnerability VCID-ufg2-ru5h-43eq
2
vulnerability VCID-vtmv-jem5-ffbj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/taglib@1.7.2-1
aliases CVE-2012-1584
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-49vn-a68c-8qgx
1
url VCID-8q82-evfa-s7fm
vulnerability_id VCID-8q82-evfa-s7fm
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could lead to user-assisted execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2396.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2396.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2396
reference_id
reference_type
scores
0
value 0.02464
scoring_system epss
scoring_elements 0.85303
published_at 2026-04-29T12:55:00Z
1
value 0.02464
scoring_system epss
scoring_elements 0.85296
published_at 2026-04-24T12:55:00Z
2
value 0.02464
scoring_system epss
scoring_elements 0.85305
published_at 2026-04-26T12:55:00Z
3
value 0.02464
scoring_system epss
scoring_elements 0.85211
published_at 2026-04-04T12:55:00Z
4
value 0.02464
scoring_system epss
scoring_elements 0.85213
published_at 2026-04-07T12:55:00Z
5
value 0.02464
scoring_system epss
scoring_elements 0.85235
published_at 2026-04-08T12:55:00Z
6
value 0.02464
scoring_system epss
scoring_elements 0.85243
published_at 2026-04-09T12:55:00Z
7
value 0.02464
scoring_system epss
scoring_elements 0.85258
published_at 2026-04-11T12:55:00Z
8
value 0.02464
scoring_system epss
scoring_elements 0.85255
published_at 2026-04-12T12:55:00Z
9
value 0.02464
scoring_system epss
scoring_elements 0.85252
published_at 2026-04-13T12:55:00Z
10
value 0.02464
scoring_system epss
scoring_elements 0.85272
published_at 2026-04-16T12:55:00Z
11
value 0.02464
scoring_system epss
scoring_elements 0.85274
published_at 2026-04-18T12:55:00Z
12
value 0.02464
scoring_system epss
scoring_elements 0.85273
published_at 2026-04-21T12:55:00Z
13
value 0.02478
scoring_system epss
scoring_elements 0.85226
published_at 2026-04-02T12:55:00Z
14
value 0.02478
scoring_system epss
scoring_elements 0.85214
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2396
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2396
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2396
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=818583
reference_id 818583
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=818583
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/18757.txt
reference_id CVE-2012-2396;OSVDB-81224
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/18757.txt
5
reference_url https://security.gentoo.org/glsa/201411-01
reference_id GLSA-201411-01
reference_type
scores
url https://security.gentoo.org/glsa/201411-01
fixed_packages
0
url pkg:deb/debian/taglib@1.7.2-1
purl pkg:deb/debian/taglib@1.7.2-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-pkjn-axeb-ykej
1
vulnerability VCID-ufg2-ru5h-43eq
2
vulnerability VCID-vtmv-jem5-ffbj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/taglib@1.7.2-1
aliases CVE-2012-2396
risk_score null
exploitability 2.0
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8q82-evfa-s7fm
2
url VCID-bb4x-nc5r-8qae
vulnerability_id VCID-bb4x-nc5r-8qae
summary
Multiple vulnerabilities have been found in TagLib, possibly
    resulting in Denial of Service.
references
0
reference_url http://mail.kde.org/pipermail/taglib-devel/2012-March/002186.html
reference_id
reference_type
scores
url http://mail.kde.org/pipermail/taglib-devel/2012-March/002186.html
1
reference_url http://mail.kde.org/pipermail/taglib-devel/2012-March/002187.html
reference_id
reference_type
scores
url http://mail.kde.org/pipermail/taglib-devel/2012-March/002187.html
2
reference_url http://osvdb.org/79814
reference_id
reference_type
scores
url http://osvdb.org/79814
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1107.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1107.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1107
reference_id
reference_type
scores
0
value 0.02857
scoring_system epss
scoring_elements 0.86286
published_at 2026-04-29T12:55:00Z
1
value 0.02857
scoring_system epss
scoring_elements 0.8618
published_at 2026-04-01T12:55:00Z
2
value 0.02857
scoring_system epss
scoring_elements 0.8619
published_at 2026-04-02T12:55:00Z
3
value 0.02857
scoring_system epss
scoring_elements 0.86203
published_at 2026-04-04T12:55:00Z
4
value 0.02857
scoring_system epss
scoring_elements 0.86204
published_at 2026-04-07T12:55:00Z
5
value 0.02857
scoring_system epss
scoring_elements 0.86222
published_at 2026-04-08T12:55:00Z
6
value 0.02857
scoring_system epss
scoring_elements 0.86234
published_at 2026-04-09T12:55:00Z
7
value 0.02857
scoring_system epss
scoring_elements 0.86248
published_at 2026-04-11T12:55:00Z
8
value 0.02857
scoring_system epss
scoring_elements 0.86246
published_at 2026-04-12T12:55:00Z
9
value 0.02857
scoring_system epss
scoring_elements 0.86242
published_at 2026-04-13T12:55:00Z
10
value 0.02857
scoring_system epss
scoring_elements 0.86259
published_at 2026-04-16T12:55:00Z
11
value 0.02857
scoring_system epss
scoring_elements 0.86264
published_at 2026-04-18T12:55:00Z
12
value 0.02857
scoring_system epss
scoring_elements 0.86257
published_at 2026-04-21T12:55:00Z
13
value 0.02857
scoring_system epss
scoring_elements 0.86277
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1107
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1107
6
reference_url http://secunia.com/advisories/48211
reference_id
reference_type
scores
url http://secunia.com/advisories/48211
7
reference_url http://secunia.com/advisories/48792
reference_id
reference_type
scores
url http://secunia.com/advisories/48792
8
reference_url http://secunia.com/advisories/49688
reference_id
reference_type
scores
url http://secunia.com/advisories/49688
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/73666
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/73666
10
reference_url https://github.com/taglib/taglib/commit/77d61c6eca4d08b9b025738acf6b926cc750db23
reference_id
reference_type
scores
url https://github.com/taglib/taglib/commit/77d61c6eca4d08b9b025738acf6b926cc750db23
11
reference_url http://www.gentoo.org/security/en/glsa/glsa-201206-16.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-201206-16.xml
12
reference_url http://www.openwall.com/lists/oss-security/2012/03/05/19
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/03/05/19
13
reference_url http://www.securityfocus.com/bid/52284
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/52284
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662705
reference_id 662705
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662705
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800553
reference_id 800553
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800553
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:scott_wheeler:taglib:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:scott_wheeler:taglib:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:scott_wheeler:taglib:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:scott_wheeler:taglib:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:scott_wheeler:taglib:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.3:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:scott_wheeler:taglib:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.3.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:scott_wheeler:taglib:1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.4:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:scott_wheeler:taglib:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.5:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:scott_wheeler:taglib:1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.6:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:scott_wheeler:taglib:1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.6.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:scott_wheeler:taglib:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.6.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:scott_wheeler:taglib:1.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.6.3:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-1107
reference_id CVE-2012-1107
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-1107
29
reference_url https://security.gentoo.org/glsa/201206-16
reference_id GLSA-201206-16
reference_type
scores
url https://security.gentoo.org/glsa/201206-16
fixed_packages
0
url pkg:deb/debian/taglib@1.7.2-1
purl pkg:deb/debian/taglib@1.7.2-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-pkjn-axeb-ykej
1
vulnerability VCID-ufg2-ru5h-43eq
2
vulnerability VCID-vtmv-jem5-ffbj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/taglib@1.7.2-1
aliases CVE-2012-1107
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bb4x-nc5r-8qae
3
url VCID-pkjn-axeb-ykej
vulnerability_id VCID-pkjn-axeb-ykej
summary taglib: Incorrect cast in rebuildAggregateFrames function
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12678.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12678.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12678
reference_id
reference_type
scores
0
value 0.00641
scoring_system epss
scoring_elements 0.70646
published_at 2026-04-29T12:55:00Z
1
value 0.00641
scoring_system epss
scoring_elements 0.70637
published_at 2026-04-24T12:55:00Z
2
value 0.00641
scoring_system epss
scoring_elements 0.70647
published_at 2026-04-26T12:55:00Z
3
value 0.0069
scoring_system epss
scoring_elements 0.71762
published_at 2026-04-08T12:55:00Z
4
value 0.0069
scoring_system epss
scoring_elements 0.71773
published_at 2026-04-09T12:55:00Z
5
value 0.0069
scoring_system epss
scoring_elements 0.71798
published_at 2026-04-11T12:55:00Z
6
value 0.0069
scoring_system epss
scoring_elements 0.71781
published_at 2026-04-12T12:55:00Z
7
value 0.0069
scoring_system epss
scoring_elements 0.71763
published_at 2026-04-13T12:55:00Z
8
value 0.0069
scoring_system epss
scoring_elements 0.71806
published_at 2026-04-16T12:55:00Z
9
value 0.0069
scoring_system epss
scoring_elements 0.71812
published_at 2026-04-18T12:55:00Z
10
value 0.0069
scoring_system epss
scoring_elements 0.71794
published_at 2026-04-21T12:55:00Z
11
value 0.0069
scoring_system epss
scoring_elements 0.71723
published_at 2026-04-07T12:55:00Z
12
value 0.0069
scoring_system epss
scoring_elements 0.7173
published_at 2026-04-02T12:55:00Z
13
value 0.0069
scoring_system epss
scoring_elements 0.71749
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12678
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12678
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12678
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1483959
reference_id 1483959
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1483959
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871511
reference_id 871511
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871511
fixed_packages
0
url pkg:deb/debian/taglib@1.11.1%2Bdfsg.1-0.3%2Bdeb10u1
purl pkg:deb/debian/taglib@1.11.1%2Bdfsg.1-0.3%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ufg2-ru5h-43eq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/taglib@1.11.1%252Bdfsg.1-0.3%252Bdeb10u1
aliases CVE-2017-12678
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pkjn-axeb-ykej
4
url VCID-ufg2-ru5h-43eq
vulnerability_id VCID-ufg2-ru5h-43eq
summary taglib: TagLib segmentation violation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-47466.json
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-47466.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-47466
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.05872
published_at 2026-04-02T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.06125
published_at 2026-04-29T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.05975
published_at 2026-04-09T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.05957
published_at 2026-04-11T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.05947
published_at 2026-04-12T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.05938
published_at 2026-04-13T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.05903
published_at 2026-04-16T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.05914
published_at 2026-04-18T12:55:00Z
8
value 0.00022
scoring_system epss
scoring_elements 0.06065
published_at 2026-04-21T12:55:00Z
9
value 0.00022
scoring_system epss
scoring_elements 0.06088
published_at 2026-04-24T12:55:00Z
10
value 0.00022
scoring_system epss
scoring_elements 0.06117
published_at 2026-04-26T12:55:00Z
11
value 0.00022
scoring_system epss
scoring_elements 0.05905
published_at 2026-04-04T12:55:00Z
12
value 0.00022
scoring_system epss
scoring_elements 0.05898
published_at 2026-04-07T12:55:00Z
13
value 0.00022
scoring_system epss
scoring_elements 0.05936
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-47466
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47466
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/taglib/taglib/issues/1163
reference_id 1163
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-22T14:20:24Z/
url https://github.com/taglib/taglib/issues/1163
5
reference_url https://github.com/taglib/taglib/pull/1164
reference_id 1164
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-22T14:20:24Z/
url https://github.com/taglib/taglib/pull/1164
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2368007
reference_id 2368007
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2368007
7
reference_url https://github.com/taglib/taglib/commit/dfa33bec0806cbb45785accb8cc6c2048a7d40cf
reference_id dfa33bec0806cbb45785accb8cc6c2048a7d40cf
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-22T14:20:24Z/
url https://github.com/taglib/taglib/commit/dfa33bec0806cbb45785accb8cc6c2048a7d40cf
8
reference_url https://github.com/taglib/taglib/compare/v1.13.1...v2.0
reference_id v1.13.1...v2.0
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-22T14:20:24Z/
url https://github.com/taglib/taglib/compare/v1.13.1...v2.0
fixed_packages
0
url pkg:deb/debian/taglib@1.13-2
purl pkg:deb/debian/taglib@1.13-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ufg2-ru5h-43eq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/taglib@1.13-2
1
url pkg:deb/debian/taglib@1.13-2%2Bdeb12u1
purl pkg:deb/debian/taglib@1.13-2%2Bdeb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/taglib@1.13-2%252Bdeb12u1
2
url pkg:deb/debian/taglib@2.0.2-2
purl pkg:deb/debian/taglib@2.0.2-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/taglib@2.0.2-2
aliases CVE-2023-47466
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ufg2-ru5h-43eq
5
url VCID-vtmv-jem5-ffbj
vulnerability_id VCID-vtmv-jem5-ffbj
summary taglib: heap-based buffer over-read via a crafted audio file
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11439.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11439.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-11439
reference_id
reference_type
scores
0
value 0.0074
scoring_system epss
scoring_elements 0.72848
published_at 2026-04-01T12:55:00Z
1
value 0.0074
scoring_system epss
scoring_elements 0.72996
published_at 2026-04-29T12:55:00Z
2
value 0.0074
scoring_system epss
scoring_elements 0.72947
published_at 2026-04-21T12:55:00Z
3
value 0.0074
scoring_system epss
scoring_elements 0.72989
published_at 2026-04-24T12:55:00Z
4
value 0.0074
scoring_system epss
scoring_elements 0.72998
published_at 2026-04-26T12:55:00Z
5
value 0.0074
scoring_system epss
scoring_elements 0.72855
published_at 2026-04-02T12:55:00Z
6
value 0.0074
scoring_system epss
scoring_elements 0.72876
published_at 2026-04-04T12:55:00Z
7
value 0.0074
scoring_system epss
scoring_elements 0.72851
published_at 2026-04-07T12:55:00Z
8
value 0.0074
scoring_system epss
scoring_elements 0.72889
published_at 2026-04-08T12:55:00Z
9
value 0.0074
scoring_system epss
scoring_elements 0.72902
published_at 2026-04-09T12:55:00Z
10
value 0.0074
scoring_system epss
scoring_elements 0.72927
published_at 2026-04-11T12:55:00Z
11
value 0.0074
scoring_system epss
scoring_elements 0.7291
published_at 2026-04-12T12:55:00Z
12
value 0.0074
scoring_system epss
scoring_elements 0.72904
published_at 2026-04-13T12:55:00Z
13
value 0.0074
scoring_system epss
scoring_elements 0.72945
published_at 2026-04-16T12:55:00Z
14
value 0.0074
scoring_system epss
scoring_elements 0.72955
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-11439
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11439
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11439
3
reference_url http://seclists.org/fulldisclosure/2018/May/49
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2018/May/49
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00022.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/07/msg00022.html
6
reference_url https://lists.debian.org/debian-lts-announce/2021/09/msg00020.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2021/09/msg00020.html
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1584868
reference_id 1584868
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1584868
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=903847
reference_id 903847
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=903847
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:taglib:taglib:1.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:taglib:taglib:1.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:taglib:taglib:1.11.1:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-11439
reference_id CVE-2018-11439
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-11439
13
reference_url https://access.redhat.com/errata/RHSA-2020:1175
reference_id RHSA-2020:1175
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1175
fixed_packages
0
url pkg:deb/debian/taglib@1.11.1%2Bdfsg.1-0.3%2Bdeb10u1
purl pkg:deb/debian/taglib@1.11.1%2Bdfsg.1-0.3%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ufg2-ru5h-43eq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/taglib@1.11.1%252Bdfsg.1-0.3%252Bdeb10u1
aliases CVE-2018-11439
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vtmv-jem5-ffbj
6
url VCID-xcw3-cs2e-cqg1
vulnerability_id VCID-xcw3-cs2e-cqg1
summary
Multiple vulnerabilities have been found in TagLib, possibly
    resulting in Denial of Service.
references
0
reference_url http://mail.kde.org/pipermail/taglib-devel/2012-March/002186.html
reference_id
reference_type
scores
url http://mail.kde.org/pipermail/taglib-devel/2012-March/002186.html
1
reference_url http://mail.kde.org/pipermail/taglib-devel/2012-March/002191.html
reference_id
reference_type
scores
url http://mail.kde.org/pipermail/taglib-devel/2012-March/002191.html
2
reference_url http://osvdb.org/79813
reference_id
reference_type
scores
url http://osvdb.org/79813
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1108.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1108.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1108
reference_id
reference_type
scores
0
value 0.04038
scoring_system epss
scoring_elements 0.8853
published_at 2026-04-29T12:55:00Z
1
value 0.04038
scoring_system epss
scoring_elements 0.88446
published_at 2026-04-01T12:55:00Z
2
value 0.04038
scoring_system epss
scoring_elements 0.88454
published_at 2026-04-02T12:55:00Z
3
value 0.04038
scoring_system epss
scoring_elements 0.8847
published_at 2026-04-04T12:55:00Z
4
value 0.04038
scoring_system epss
scoring_elements 0.88473
published_at 2026-04-07T12:55:00Z
5
value 0.04038
scoring_system epss
scoring_elements 0.88492
published_at 2026-04-08T12:55:00Z
6
value 0.04038
scoring_system epss
scoring_elements 0.88498
published_at 2026-04-09T12:55:00Z
7
value 0.04038
scoring_system epss
scoring_elements 0.88509
published_at 2026-04-21T12:55:00Z
8
value 0.04038
scoring_system epss
scoring_elements 0.88502
published_at 2026-04-12T12:55:00Z
9
value 0.04038
scoring_system epss
scoring_elements 0.88501
published_at 2026-04-13T12:55:00Z
10
value 0.04038
scoring_system epss
scoring_elements 0.88515
published_at 2026-04-16T12:55:00Z
11
value 0.04038
scoring_system epss
scoring_elements 0.88511
published_at 2026-04-18T12:55:00Z
12
value 0.04038
scoring_system epss
scoring_elements 0.88525
published_at 2026-04-24T12:55:00Z
13
value 0.04038
scoring_system epss
scoring_elements 0.88531
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1108
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1108
6
reference_url http://secunia.com/advisories/48211
reference_id
reference_type
scores
url http://secunia.com/advisories/48211
7
reference_url http://secunia.com/advisories/48792
reference_id
reference_type
scores
url http://secunia.com/advisories/48792
8
reference_url http://secunia.com/advisories/49688
reference_id
reference_type
scores
url http://secunia.com/advisories/49688
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/73665
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/73665
10
reference_url https://github.com/taglib/taglib/commit/b3646a07348ffa276ea41a9dae03ddc63ea6c532
reference_id
reference_type
scores
url https://github.com/taglib/taglib/commit/b3646a07348ffa276ea41a9dae03ddc63ea6c532
11
reference_url http://www.gentoo.org/security/en/glsa/glsa-201206-16.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-201206-16.xml
12
reference_url http://www.openwall.com/lists/oss-security/2012/03/05/19
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/03/05/19
13
reference_url http://www.securityfocus.com/bid/52284
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/52284
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662705
reference_id 662705
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662705
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800559
reference_id 800559
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800559
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:scott_wheeler:taglib:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:scott_wheeler:taglib:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:scott_wheeler:taglib:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:scott_wheeler:taglib:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:scott_wheeler:taglib:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.3:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:scott_wheeler:taglib:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.3.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:scott_wheeler:taglib:1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.4:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:scott_wheeler:taglib:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.5:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:scott_wheeler:taglib:1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.6:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:scott_wheeler:taglib:1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.6.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:scott_wheeler:taglib:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.6.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:scott_wheeler:taglib:1.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:scott_wheeler:taglib:1.6.3:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-1108
reference_id CVE-2012-1108
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-1108
29
reference_url https://security.gentoo.org/glsa/201206-16
reference_id GLSA-201206-16
reference_type
scores
url https://security.gentoo.org/glsa/201206-16
fixed_packages
0
url pkg:deb/debian/taglib@1.7.2-1
purl pkg:deb/debian/taglib@1.7.2-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-pkjn-axeb-ykej
1
vulnerability VCID-ufg2-ru5h-43eq
2
vulnerability VCID-vtmv-jem5-ffbj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/taglib@1.7.2-1
aliases CVE-2012-1108
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xcw3-cs2e-cqg1
Fixing_vulnerabilities
Risk_score3.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/taglib@1.4-4