Lookup for vulnerable packages by Package URL.

GET /api/packages/1081523?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/1081523?format=api",
    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.2-2?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "gst-plugins-base1.0",
    "version": "1.28.2-2",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46536?format=api",
            "vulnerability_id": "VCID-21tf-t9ww-ufg5",
            "summary": "A heap-based buffer overflow in GStreamer Base Plugins might allow\n    remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9928.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9928.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9928",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.17337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95015",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.17337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95026",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.17337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95027",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.17337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95029",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.17337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95037",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.17337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95041",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.17337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95047",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.17337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95048",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.17337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95051",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.17337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9506",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.17337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95063",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.17337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95065",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.17337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95064",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9928"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9928",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9928"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724904",
                    "reference_id": "1724904",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724904"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927978",
                    "reference_id": "927978",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927978"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202003-33",
                    "reference_id": "GLSA-202003-33",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202003-33"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3958-1/",
                    "reference_id": "USN-3958-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3958-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924548?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.14.4-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.14.4-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924544?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924542?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924546?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924545?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059623?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1081523?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.2-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2019-9928"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-21tf-t9ww-ufg5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60083?format=api",
            "vulnerability_id": "VCID-22k7-ftg2-w3ee",
            "summary": "Multiple vulnerabilities have been found in various GStreamer\n    plug-ins, the worst of which could lead to the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5839.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5839.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5839",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86604",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86705",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86696",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86704",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.03036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86614",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86634",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86633",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86652",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86661",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86675",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86673",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86666",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86679",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86685",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5839"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9811",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9811"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5837",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5837"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5839",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5839"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5844"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1419586",
                    "reference_id": "1419586",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1419586"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201702-4",
                    "reference_id": "ASA-201702-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201702-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-164",
                    "reference_id": "AVG-164",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-164"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201705-10",
                    "reference_id": "GLSA-201705-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201705-10"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2060",
                    "reference_id": "RHSA-2017:2060",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2060"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3244-1/",
                    "reference_id": "USN-3244-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3244-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924547?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.10.3-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.10.3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924544?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924542?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924546?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924545?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059623?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1081523?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.2-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-5839"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-22k7-ftg2-w3ee"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60088?format=api",
            "vulnerability_id": "VCID-2ykm-esve-s3b9",
            "summary": "Multiple vulnerabilities have been found in various GStreamer\n    plug-ins, the worst of which could lead to the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5844.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5844.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00724",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72494",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00724",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72631",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00724",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72625",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00724",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72634",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00724",
                            "scoring_system": "epss",
                            "scoring_elements": "0.725",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00724",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72517",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00724",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72532",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00724",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72544",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00724",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72568",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00724",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7255",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00724",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72541",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00724",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72583",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00724",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72593",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9811",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9811"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5837",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5837"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5839",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5839"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5844"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1419600",
                    "reference_id": "1419600",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1419600"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201702-4",
                    "reference_id": "ASA-201702-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201702-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-164",
                    "reference_id": "AVG-164",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-164"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201705-10",
                    "reference_id": "GLSA-201705-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201705-10"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2060",
                    "reference_id": "RHSA-2017:2060",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2060"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3244-1/",
                    "reference_id": "USN-3244-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3244-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924547?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.10.3-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.10.3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924544?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924542?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924546?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924545?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059623?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1081523?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.2-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-5844"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2ykm-esve-s3b9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35477?format=api",
            "vulnerability_id": "VCID-32zy-1a2y-nkdz",
            "summary": "Multiple vulnerabilities have been found in GStreamer and its plugins, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3522.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3522.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3522",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32402",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32552",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32588",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32412",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3246",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32487",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32491",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32452",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32426",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32461",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32439",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3241",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32238",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32122",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32038",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3522"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3522",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3522"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954761",
                    "reference_id": "1954761",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954761"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202208-31",
                    "reference_id": "GLSA-202208-31",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202208-31"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4959-1/",
                    "reference_id": "USN-4959-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4959-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924549?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.18.4-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924544?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924542?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924546?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924545?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059623?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1081523?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.2-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-3522"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-32zy-1a2y-nkdz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36391?format=api",
            "vulnerability_id": "VCID-4xqt-vrk6-dyfr",
            "summary": "Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47615.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47615.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24176",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24434",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24377",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24392",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24383",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24353",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24229",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24215",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24535",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24571",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2435",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24418",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24463",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24478",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47615"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47615"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331740",
                    "reference_id": "2331740",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331740"
                },
                {
                    "reference_url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8038.patch",
                    "reference_id": "8038.patch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:18:36Z/"
                        }
                    ],
                    "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8038.patch"
                },
                {
                    "reference_url": "https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/",
                    "reference_id": "GHSL-2024-115_GHSL-2024-118_Gstreamer",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:18:36Z/"
                        }
                    ],
                    "url": "https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202506-02",
                    "reference_id": "GLSA-202506-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202506-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11117",
                    "reference_id": "RHSA-2024:11117",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11117"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11118",
                    "reference_id": "RHSA-2024:11118",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11118"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11120",
                    "reference_id": "RHSA-2024:11120",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11120"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11123",
                    "reference_id": "RHSA-2024:11123",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11123"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11130",
                    "reference_id": "RHSA-2024:11130",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11130"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11141",
                    "reference_id": "RHSA-2024:11141",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11141"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11142",
                    "reference_id": "RHSA-2024:11142",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11142"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11143",
                    "reference_id": "RHSA-2024:11143",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11143"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11344",
                    "reference_id": "RHSA-2024:11344",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11344"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11345",
                    "reference_id": "RHSA-2024:11345",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11345"
                },
                {
                    "reference_url": "https://gstreamer.freedesktop.org/security/sa-2024-0026.html",
                    "reference_id": "sa-2024-0026.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:18:36Z/"
                        }
                    ],
                    "url": "https://gstreamer.freedesktop.org/security/sa-2024-0026.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7175-1/",
                    "reference_id": "USN-7175-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7175-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7807-1/",
                    "reference_id": "USN-7807-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7807-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924544?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924556?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924555?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924542?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924557?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.24.10-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.24.10-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924546?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924545?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059623?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1081523?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.2-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-47615"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4xqt-vrk6-dyfr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36371?format=api",
            "vulnerability_id": "VCID-64mw-yyjq-mqgp",
            "summary": "Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47542.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47542.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47542",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23224",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23268",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32445",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32835",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3281",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32852",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32829",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32793",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32643",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32528",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32796",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32844",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32873",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32874",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47542"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47542",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47542"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331717",
                    "reference_id": "2331717",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331717"
                },
                {
                    "reference_url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8033.patch",
                    "reference_id": "8033.patch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:30:59Z/"
                        }
                    ],
                    "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8033.patch"
                },
                {
                    "reference_url": "https://securitylab.github.com/advisories/GHSL-2024-235_Gstreamer/",
                    "reference_id": "GHSL-2024-235_Gstreamer",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:30:59Z/"
                        }
                    ],
                    "url": "https://securitylab.github.com/advisories/GHSL-2024-235_Gstreamer/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202506-02",
                    "reference_id": "GLSA-202506-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202506-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:7243",
                    "reference_id": "RHSA-2025:7243",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:7243"
                },
                {
                    "reference_url": "https://gstreamer.freedesktop.org/security/sa-2024-0008.html",
                    "reference_id": "sa-2024-0008.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:30:59Z/"
                        }
                    ],
                    "url": "https://gstreamer.freedesktop.org/security/sa-2024-0008.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7175-1/",
                    "reference_id": "USN-7175-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7175-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7807-1/",
                    "reference_id": "USN-7807-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7807-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924544?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924556?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924558?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924542?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924557?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.24.10-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.24.10-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924546?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924545?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059623?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1081523?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.2-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-47542"
            ],
            "risk_score": 2.8,
            "exploitability": "0.5",
            "weighted_severity": "5.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-64mw-yyjq-mqgp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36389?format=api",
            "vulnerability_id": "VCID-9wre-pzu1-y3a7",
            "summary": "Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47607.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47607.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47607",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27864",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28244",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28186",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28199",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28182",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28137",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28053",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27941",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28341",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28384",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28175",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2824",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28282",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28288",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47607"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47607",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47607"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331754",
                    "reference_id": "2331754",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331754"
                },
                {
                    "reference_url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8037.patch",
                    "reference_id": "8037.patch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:22:43Z/"
                        }
                    ],
                    "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8037.patch"
                },
                {
                    "reference_url": "https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/",
                    "reference_id": "GHSL-2024-115_GHSL-2024-118_Gstreamer",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:22:43Z/"
                        }
                    ],
                    "url": "https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202506-02",
                    "reference_id": "GLSA-202506-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202506-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11117",
                    "reference_id": "RHSA-2024:11117",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11117"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11118",
                    "reference_id": "RHSA-2024:11118",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11118"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11120",
                    "reference_id": "RHSA-2024:11120",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11120"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11123",
                    "reference_id": "RHSA-2024:11123",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11123"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11130",
                    "reference_id": "RHSA-2024:11130",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11130"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11141",
                    "reference_id": "RHSA-2024:11141",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11141"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11142",
                    "reference_id": "RHSA-2024:11142",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11142"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11143",
                    "reference_id": "RHSA-2024:11143",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11143"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11344",
                    "reference_id": "RHSA-2024:11344",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11344"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11345",
                    "reference_id": "RHSA-2024:11345",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11345"
                },
                {
                    "reference_url": "https://gstreamer.freedesktop.org/security/sa-2024-0024.html",
                    "reference_id": "sa-2024-0024.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:22:43Z/"
                        }
                    ],
                    "url": "https://gstreamer.freedesktop.org/security/sa-2024-0024.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7175-1/",
                    "reference_id": "USN-7175-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7175-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7807-1/",
                    "reference_id": "USN-7807-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7807-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924544?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924556?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924555?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924542?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924557?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.24.10-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.24.10-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924546?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924545?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059623?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1081523?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.2-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-47607"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9wre-pzu1-y3a7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64262?format=api",
            "vulnerability_id": "VCID-a2rd-ntzd-2kdr",
            "summary": "GStreamer: GStreamer: Arbitrary code execution via RIFF palette integer overflow in AVI file handling",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2921.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2921.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-2921",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09324",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09408",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09374",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09285",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09361",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0942",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09391",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09377",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10437",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10419",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10408",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10351",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10333",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10307",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-2921"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2921",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2921"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447496",
                    "reference_id": "2447496",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447496"
                },
                {
                    "reference_url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/e3a99c35266fc92dd6a18ac5fde028d0cda559e6",
                    "reference_id": "e3a99c35266fc92dd6a18ac5fde028d0cda559e6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-16T15:26:01Z/"
                        }
                    ],
                    "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/e3a99c35266fc92dd6a18ac5fde028d0cda559e6"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:6259",
                    "reference_id": "RHSA-2026:6259",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:6259"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:6300",
                    "reference_id": "RHSA-2026:6300",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:6300"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:6750",
                    "reference_id": "RHSA-2026:6750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:6750"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7673",
                    "reference_id": "RHSA-2026:7673",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7673"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7850",
                    "reference_id": "RHSA-2026:7850",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7850"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8854",
                    "reference_id": "RHSA-2026:8854",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8854"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8857",
                    "reference_id": "RHSA-2026:8857",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8857"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8862",
                    "reference_id": "RHSA-2026:8862",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8862"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8874",
                    "reference_id": "RHSA-2026:8874",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8874"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8876",
                    "reference_id": "RHSA-2026:8876",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8876"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:9446",
                    "reference_id": "RHSA-2026:9446",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:9446"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:9447",
                    "reference_id": "RHSA-2026:9447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:9447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:9487",
                    "reference_id": "RHSA-2026:9487",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:9487"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:9488",
                    "reference_id": "RHSA-2026:9488",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:9488"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8130-1/",
                    "reference_id": "USN-8130-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8130-1/"
                },
                {
                    "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-26-168/",
                    "reference_id": "ZDI-26-168",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-16T15:26:01Z/"
                        }
                    ],
                    "url": "https://www.zerodayinitiative.com/advisories/ZDI-26-168/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924544?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924561?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%2Bdeb11u5?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%252Bdeb11u5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924542?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924560?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u6?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u6%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924546?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924562?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.26.2-1%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.26.2-1%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924545?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059623?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1081523?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.2-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2026-2921"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a2rd-ntzd-2kdr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60086?format=api",
            "vulnerability_id": "VCID-aay9-3b4y-kbh1",
            "summary": "Multiple vulnerabilities have been found in various GStreamer\n    plug-ins, the worst of which could lead to the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5842.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5842.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00795",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7391",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00795",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74042",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00795",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74035",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00795",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74044",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00795",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7392",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00795",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73944",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00795",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73915",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00795",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73949",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00795",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73962",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00795",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73986",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00795",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73968",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00795",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7396",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00795",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00795",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7401",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00795",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74001",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9811",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9811"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5837",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5837"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5839",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5839"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5844"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1419591",
                    "reference_id": "1419591",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1419591"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201702-4",
                    "reference_id": "ASA-201702-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201702-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-164",
                    "reference_id": "AVG-164",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-164"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201705-10",
                    "reference_id": "GLSA-201705-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201705-10"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2060",
                    "reference_id": "RHSA-2017:2060",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2060"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3244-1/",
                    "reference_id": "USN-3244-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3244-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924547?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.10.3-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.10.3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924544?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924542?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924546?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924545?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059623?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1081523?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.2-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-5842"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aay9-3b4y-kbh1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36382?format=api",
            "vulnerability_id": "VCID-b22v-3x5y-kbbx",
            "summary": "Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47600.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47600.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47600",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28113",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28156",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00174",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38468",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00174",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38829",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00174",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38802",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00174",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38848",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00174",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38826",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00174",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38746",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00174",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3858",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00174",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38556",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00174",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3879",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00174",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38842",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00174",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38853",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00174",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38866",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47600"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47600",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47600"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331738",
                    "reference_id": "2331738",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331738"
                },
                {
                    "reference_url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8034.patch",
                    "reference_id": "8034.patch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:27:40Z/"
                        }
                    ],
                    "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8034.patch"
                },
                {
                    "reference_url": "https://securitylab.github.com/advisories/GHSL-2024-248_Gstreamer/",
                    "reference_id": "GHSL-2024-248_Gstreamer",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:27:40Z/"
                        }
                    ],
                    "url": "https://securitylab.github.com/advisories/GHSL-2024-248_Gstreamer/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202506-02",
                    "reference_id": "GLSA-202506-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202506-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:7243",
                    "reference_id": "RHSA-2025:7243",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:7243"
                },
                {
                    "reference_url": "https://gstreamer.freedesktop.org/security/sa-2024-0018.html",
                    "reference_id": "sa-2024-0018.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:27:40Z/"
                        }
                    ],
                    "url": "https://gstreamer.freedesktop.org/security/sa-2024-0018.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7175-1/",
                    "reference_id": "USN-7175-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7175-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7807-1/",
                    "reference_id": "USN-7807-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7807-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924544?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924556?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924555?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924542?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924557?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.24.10-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.24.10-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924546?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924545?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059623?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1081523?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.2-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-47600"
            ],
            "risk_score": 2.3,
            "exploitability": "0.5",
            "weighted_severity": "4.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b22v-3x5y-kbbx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68429?format=api",
            "vulnerability_id": "VCID-bd83-n2qx-gqeh",
            "summary": "gstreamer1-plugins-base: GStreamer Subparse NULL Pointer Dereference",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47807.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47807.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-47807",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07055",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07171",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07086",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07139",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07168",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07301",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07292",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07223",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07218",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07344",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07111",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09384",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.093",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09338",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-47807"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47807",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47807"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2387143",
                    "reference_id": "2387143",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2387143"
                },
                {
                    "reference_url": "https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md",
                    "reference_id": "ATREDIS-2025-0003.md",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-12T13:52:51Z/"
                        }
                    ],
                    "url": "https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md"
                },
                {
                    "reference_url": "https://gstreamer.freedesktop.org/security/",
                    "reference_id": "security",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-12T13:52:51Z/"
                        }
                    ],
                    "url": "https://gstreamer.freedesktop.org/security/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7716-1/",
                    "reference_id": "USN-7716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7716-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7827-1/",
                    "reference_id": "USN-7827-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7827-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924544?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924559?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%2Bdeb11u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%252Bdeb11u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924542?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924546?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924545?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059623?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1081523?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.2-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-47807"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bd83-n2qx-gqeh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60076?format=api",
            "vulnerability_id": "VCID-c9pa-ua87-tbdp",
            "summary": "Multiple vulnerabilities have been found in various GStreamer\n    plug-ins, the worst of which could lead to the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9811.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9811.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9811",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00485",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65282",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00485",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65331",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00485",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65357",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00485",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65321",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00485",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65373",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00485",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65384",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00485",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65403",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00485",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6539",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00485",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65362",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00485",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65398",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00485",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65409",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00485",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65393",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00485",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6541",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00485",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65422",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00485",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65418",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9811"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9811",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9811"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5837",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5837"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5839",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5839"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5844"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401918",
                    "reference_id": "1401918",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401918"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201705-10",
                    "reference_id": "GLSA-201705-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201705-10"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2060",
                    "reference_id": "RHSA-2017:2060",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2060"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3244-1/",
                    "reference_id": "USN-3244-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3244-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924543?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.10.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.10.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924544?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924542?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924546?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924545?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059623?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1081523?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.2-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-9811"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c9pa-ua87-tbdp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36370?format=api",
            "vulnerability_id": "VCID-gw57-rwva-r7fb",
            "summary": "Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47541.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47541.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47541",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25345",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25385",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35385",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35779",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35756",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35797",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35785",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35737",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35502",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35471",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35738",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35788",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3581",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35819",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47541"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47541",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47541"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331724",
                    "reference_id": "2331724",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331724"
                },
                {
                    "reference_url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8036.patch",
                    "reference_id": "8036.patch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:33:06Z/"
                        }
                    ],
                    "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8036.patch"
                },
                {
                    "reference_url": "https://securitylab.github.com/advisories/GHSL-2024-228_GStreamer/",
                    "reference_id": "GHSL-2024-228_GStreamer",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:33:06Z/"
                        }
                    ],
                    "url": "https://securitylab.github.com/advisories/GHSL-2024-228_GStreamer/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202506-02",
                    "reference_id": "GLSA-202506-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202506-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:7243",
                    "reference_id": "RHSA-2025:7243",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:7243"
                },
                {
                    "reference_url": "https://gstreamer.freedesktop.org/security/sa-2024-0023.html",
                    "reference_id": "sa-2024-0023.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:33:06Z/"
                        }
                    ],
                    "url": "https://gstreamer.freedesktop.org/security/sa-2024-0023.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7175-1/",
                    "reference_id": "USN-7175-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7175-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7807-1/",
                    "reference_id": "USN-7807-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7807-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924544?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924556?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924555?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924542?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924557?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.24.10-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.24.10-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924546?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924545?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059623?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1081523?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.2-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-47541"
            ],
            "risk_score": 2.8,
            "exploitability": "0.5",
            "weighted_severity": "5.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gw57-rwva-r7fb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36367?format=api",
            "vulnerability_id": "VCID-j8pf-ztyq-1ufd",
            "summary": "Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47538.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47538.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27864",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28244",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28186",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28199",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28182",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28137",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28053",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27941",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28341",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28384",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28175",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2824",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28282",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28288",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47538"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47538"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331727",
                    "reference_id": "2331727",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331727"
                },
                {
                    "reference_url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8035.patch",
                    "reference_id": "8035.patch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:36:36Z/"
                        }
                    ],
                    "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8035.patch"
                },
                {
                    "reference_url": "https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/",
                    "reference_id": "GHSL-2024-115_GHSL-2024-118_Gstreamer",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:36:36Z/"
                        }
                    ],
                    "url": "https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202506-02",
                    "reference_id": "GLSA-202506-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202506-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11117",
                    "reference_id": "RHSA-2024:11117",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11117"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11118",
                    "reference_id": "RHSA-2024:11118",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11118"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11120",
                    "reference_id": "RHSA-2024:11120",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11120"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11123",
                    "reference_id": "RHSA-2024:11123",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11123"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11130",
                    "reference_id": "RHSA-2024:11130",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11130"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11141",
                    "reference_id": "RHSA-2024:11141",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11141"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11142",
                    "reference_id": "RHSA-2024:11142",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11142"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11143",
                    "reference_id": "RHSA-2024:11143",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11143"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11344",
                    "reference_id": "RHSA-2024:11344",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11344"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11345",
                    "reference_id": "RHSA-2024:11345",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11345"
                },
                {
                    "reference_url": "https://gstreamer.freedesktop.org/security/sa-2024-0022.html",
                    "reference_id": "sa-2024-0022.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:36:36Z/"
                        }
                    ],
                    "url": "https://gstreamer.freedesktop.org/security/sa-2024-0022.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7175-1/",
                    "reference_id": "USN-7175-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7175-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7807-1/",
                    "reference_id": "USN-7807-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7807-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924544?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924556?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924555?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924542?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924557?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.24.10-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.24.10-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924546?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924545?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059623?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1081523?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.2-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-47538"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j8pf-ztyq-1ufd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36400?format=api",
            "vulnerability_id": "VCID-jkag-wv9p-5yhm",
            "summary": "Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47835.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47835.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47835",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2318",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2345",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23395",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23412",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23407",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23389",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23199",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23187",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23528",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23565",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23347",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2342",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2347",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23488",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47835"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47835",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47835"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331742",
                    "reference_id": "2331742",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331742"
                },
                {
                    "reference_url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8039.patch",
                    "reference_id": "8039.patch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:14:03Z/"
                        }
                    ],
                    "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8039.patch"
                },
                {
                    "reference_url": "https://securitylab.github.com/advisories/GHSL-2024-263_Gstreamer/",
                    "reference_id": "GHSL-2024-263_Gstreamer",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:14:03Z/"
                        }
                    ],
                    "url": "https://securitylab.github.com/advisories/GHSL-2024-263_Gstreamer/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202506-02",
                    "reference_id": "GLSA-202506-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202506-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:7243",
                    "reference_id": "RHSA-2025:7243",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:7243"
                },
                {
                    "reference_url": "https://gstreamer.freedesktop.org/security/sa-2024-0029.html",
                    "reference_id": "sa-2024-0029.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:14:03Z/"
                        }
                    ],
                    "url": "https://gstreamer.freedesktop.org/security/sa-2024-0029.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7175-1/",
                    "reference_id": "USN-7175-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7175-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7807-1/",
                    "reference_id": "USN-7807-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7807-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924544?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924556?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924555?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924542?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924557?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.24.10-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.24.10-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924546?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924545?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059623?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1081523?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.2-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-47835"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jkag-wv9p-5yhm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68430?format=api",
            "vulnerability_id": "VCID-k198-ngub-ayfx",
            "summary": "gstreamer1-plugins-base: GStreamer Subparse Stack Buffer Overflow",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47806.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47806.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-47806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22633",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22548",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22676",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22466",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22602",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22618",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23846",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23919",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23865",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23876",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28955",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29137",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29026",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-47806"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47806"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2387145",
                    "reference_id": "2387145",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2387145"
                },
                {
                    "reference_url": "https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md",
                    "reference_id": "ATREDIS-2025-0003.md",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-08T15:45:02Z/"
                        }
                    ],
                    "url": "https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md"
                },
                {
                    "reference_url": "https://gstreamer.freedesktop.org/security/",
                    "reference_id": "security",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-08T15:45:02Z/"
                        }
                    ],
                    "url": "https://gstreamer.freedesktop.org/security/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7716-1/",
                    "reference_id": "USN-7716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7716-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7827-1/",
                    "reference_id": "USN-7827-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7827-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924544?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924559?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%2Bdeb11u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%252Bdeb11u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924542?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924546?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924545?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059623?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1081523?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.2-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-47806"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k198-ngub-ayfx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78301?format=api",
            "vulnerability_id": "VCID-rkb1-hqh5-uqcy",
            "summary": "gstreamer-plugins-base: heap overwrite in subtitle parsing",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37328.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37328.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37328",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.07706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91889",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91938",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.07706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91921",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.07706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9194",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.07706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91937",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.07706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91934",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.07706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91939",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.07706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91897",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91904",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91917",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91922",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.07706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91925",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.07706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91924",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37328"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37328",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37328"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254540",
                    "reference_id": "2254540",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254540"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2302",
                    "reference_id": "RHSA-2024:2302",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2302"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3088",
                    "reference_id": "RHSA-2024:3088",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3088"
                },
                {
                    "reference_url": "https://gstreamer.freedesktop.org/security/sa-2023-0003.html",
                    "reference_id": "sa-2023-0003.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-06T18:26:04Z/"
                        }
                    ],
                    "url": "https://gstreamer.freedesktop.org/security/sa-2023-0003.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6268-1/",
                    "reference_id": "USN-6268-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6268-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7807-1/",
                    "reference_id": "USN-7807-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7807-1/"
                },
                {
                    "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-23-901/",
                    "reference_id": "ZDI-23-901",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-06T18:26:04Z/"
                        }
                    ],
                    "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-901/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924551?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924544?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924550?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924542?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924552?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.22.4-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.4-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924546?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924545?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059623?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1081523?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.2-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-37328"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rkb1-hqh5-uqcy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60079?format=api",
            "vulnerability_id": "VCID-vyzk-txky-muce",
            "summary": "Multiple vulnerabilities have been found in various GStreamer\n    plug-ins, the worst of which could lead to the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5837.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5837.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5837",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00724",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72494",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00724",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72631",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00724",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72625",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00724",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72634",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00724",
                            "scoring_system": "epss",
                            "scoring_elements": "0.725",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00724",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72517",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00724",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72532",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00724",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72544",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00724",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72568",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00724",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7255",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00724",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72541",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00724",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72583",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00724",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72593",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5837"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9811",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9811"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5837",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5837"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5839",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5839"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5844"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1419584",
                    "reference_id": "1419584",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1419584"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201702-4",
                    "reference_id": "ASA-201702-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201702-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-164",
                    "reference_id": "AVG-164",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-164"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201705-10",
                    "reference_id": "GLSA-201705-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201705-10"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2060",
                    "reference_id": "RHSA-2017:2060",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2060"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3244-1/",
                    "reference_id": "USN-3244-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3244-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924547?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.10.3-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.10.3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924544?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924542?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924546?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924545?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059623?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1081523?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.2-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-5837"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vyzk-txky-muce"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68431?format=api",
            "vulnerability_id": "VCID-ye91-ftez-j7bb",
            "summary": "gstreamer1-plugins-base: GStreamer Subparse NULL Pointer Dereference",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47808.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47808.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-47808",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2548",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.254",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25517",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25288",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25355",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25412",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26657",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2677",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26713",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26721",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26692",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32257",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32456",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32341",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-47808"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47808",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47808"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2387146",
                    "reference_id": "2387146",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2387146"
                },
                {
                    "reference_url": "https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md",
                    "reference_id": "ATREDIS-2025-0003.md",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-07T19:49:18Z/"
                        }
                    ],
                    "url": "https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md"
                },
                {
                    "reference_url": "https://gstreamer.freedesktop.org/security/",
                    "reference_id": "security",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-07T19:49:18Z/"
                        }
                    ],
                    "url": "https://gstreamer.freedesktop.org/security/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7716-1/",
                    "reference_id": "USN-7716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7716-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7827-1/",
                    "reference_id": "USN-7827-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7827-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924544?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924559?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%2Bdeb11u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%252Bdeb11u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924542?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924546?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924545?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059623?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1081523?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.2-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-47808"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ye91-ftez-j7bb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/75662?format=api",
            "vulnerability_id": "VCID-ygdq-ef5t-e7bc",
            "summary": "gstreamer: EXIF Metadata Parsing Integer Overflow",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4453.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4453.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-4453",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87334",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.873",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87296",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87311",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87315",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87309",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87325",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87332",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.03337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87252",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87268",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87265",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87285",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87293",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87306",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-4453"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4453",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4453"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282999",
                    "reference_id": "2282999",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282999"
                },
                {
                    "reference_url": "https://gitlab.freedesktop.org/tpm/gstreamer/-/commit/e68eccff103ab0e91e6d77a892f57131b33902f5",
                    "reference_id": "e68eccff103ab0e91e6d77a892f57131b33902f5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-23T15:47:50Z/"
                        }
                    ],
                    "url": "https://gitlab.freedesktop.org/tpm/gstreamer/-/commit/e68eccff103ab0e91e6d77a892f57131b33902f5"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00019.html",
                    "reference_id": "msg00019.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-23T15:47:50Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00019.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:9056",
                    "reference_id": "RHSA-2024:9056",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:9056"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:18416",
                    "reference_id": "RHSA-2025:18416",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:18416"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:7178",
                    "reference_id": "RHSA-2025:7178",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:7178"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6798-1/",
                    "reference_id": "USN-6798-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6798-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7807-1/",
                    "reference_id": "USN-7807-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7807-1/"
                },
                {
                    "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-24-467/",
                    "reference_id": "ZDI-24-467",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-23T15:47:50Z/"
                        }
                    ],
                    "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-467/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924544?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924553?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924542?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%2Bdeb12u5?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.22.0-3%252Bdeb12u5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924554?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.24.3-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.24.3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924546?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924545?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059623?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1081523?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-base1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.2-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-4453"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ygdq-ef5t-e7bc"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-base1.0@1.28.2-2%3Fdistro=trixie"
}