Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/ffmpeg@3.0.7-r0?arch=armhf&distroversion=v3.4&reponame=main
Typeapk
Namespacealpine
Nameffmpeg
Version3.0.7-r0
Qualifiers
arch armhf
distroversion v3.4
reponame main
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version3.1.8-r0
Latest_non_vulnerable_version3.1.11-r1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-51s3-7aca-uudb
vulnerability_id VCID-51s3-7aca-uudb
summary Heap-based buffer overflow in libavformat/rtmppkt.c in FFmpeg before 2.8.10, 3.0.x before 3.0.5, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 allows remote attackers to execute arbitrary code by leveraging failure to check for RTMP packet size mismatches.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-10191
reference_id
reference_type
scores
0
value 0.08661
scoring_system epss
scoring_elements 0.92416
published_at 2026-04-01T12:55:00Z
1
value 0.08661
scoring_system epss
scoring_elements 0.92422
published_at 2026-04-02T12:55:00Z
2
value 0.08661
scoring_system epss
scoring_elements 0.92431
published_at 2026-04-04T12:55:00Z
3
value 0.08661
scoring_system epss
scoring_elements 0.92434
published_at 2026-04-07T12:55:00Z
4
value 0.08661
scoring_system epss
scoring_elements 0.92445
published_at 2026-04-08T12:55:00Z
5
value 0.08661
scoring_system epss
scoring_elements 0.9245
published_at 2026-04-09T12:55:00Z
6
value 0.08661
scoring_system epss
scoring_elements 0.92456
published_at 2026-04-13T12:55:00Z
7
value 0.08661
scoring_system epss
scoring_elements 0.92458
published_at 2026-04-12T12:55:00Z
8
value 0.08661
scoring_system epss
scoring_elements 0.92467
published_at 2026-04-16T12:55:00Z
9
value 0.08661
scoring_system epss
scoring_elements 0.92466
published_at 2026-04-18T12:55:00Z
10
value 0.08661
scoring_system epss
scoring_elements 0.9247
published_at 2026-04-21T12:55:00Z
11
value 0.08661
scoring_system epss
scoring_elements 0.92472
published_at 2026-04-24T12:55:00Z
12
value 0.08661
scoring_system epss
scoring_elements 0.92473
published_at 2026-04-26T12:55:00Z
13
value 0.08661
scoring_system epss
scoring_elements 0.92469
published_at 2026-04-29T12:55:00Z
14
value 0.08661
scoring_system epss
scoring_elements 0.9248
published_at 2026-05-05T12:55:00Z
15
value 0.08661
scoring_system epss
scoring_elements 0.92489
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-10191
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10191
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10191
fixed_packages
0
url pkg:apk/alpine/ffmpeg@3.0.7-r0?arch=armhf&distroversion=v3.4&reponame=main
purl pkg:apk/alpine/ffmpeg@3.0.7-r0?arch=armhf&distroversion=v3.4&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ffmpeg@3.0.7-r0%3Farch=armhf&distroversion=v3.4&reponame=main
aliases CVE-2016-10191
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-51s3-7aca-uudb
1
url VCID-7cv2-w5ns-pqbd
vulnerability_id VCID-7cv2-w5ns-pqbd
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5199.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5199.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5199
reference_id
reference_type
scores
0
value 0.0072
scoring_system epss
scoring_elements 0.72424
published_at 2026-04-01T12:55:00Z
1
value 0.0072
scoring_system epss
scoring_elements 0.72429
published_at 2026-04-02T12:55:00Z
2
value 0.0072
scoring_system epss
scoring_elements 0.72447
published_at 2026-04-04T12:55:00Z
3
value 0.0072
scoring_system epss
scoring_elements 0.72423
published_at 2026-04-07T12:55:00Z
4
value 0.0072
scoring_system epss
scoring_elements 0.72462
published_at 2026-04-08T12:55:00Z
5
value 0.0072
scoring_system epss
scoring_elements 0.72475
published_at 2026-04-09T12:55:00Z
6
value 0.0072
scoring_system epss
scoring_elements 0.72497
published_at 2026-04-11T12:55:00Z
7
value 0.0072
scoring_system epss
scoring_elements 0.72479
published_at 2026-04-12T12:55:00Z
8
value 0.0072
scoring_system epss
scoring_elements 0.7247
published_at 2026-04-13T12:55:00Z
9
value 0.0072
scoring_system epss
scoring_elements 0.72512
published_at 2026-04-16T12:55:00Z
10
value 0.0072
scoring_system epss
scoring_elements 0.7252
published_at 2026-04-18T12:55:00Z
11
value 0.0072
scoring_system epss
scoring_elements 0.7251
published_at 2026-04-21T12:55:00Z
12
value 0.0072
scoring_system epss
scoring_elements 0.72553
published_at 2026-04-24T12:55:00Z
13
value 0.0072
scoring_system epss
scoring_elements 0.7256
published_at 2026-04-26T12:55:00Z
14
value 0.0072
scoring_system epss
scoring_elements 0.72558
published_at 2026-04-29T12:55:00Z
15
value 0.0072
scoring_system epss
scoring_elements 0.72551
published_at 2026-05-05T12:55:00Z
16
value 0.0072
scoring_system epss
scoring_elements 0.72581
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5199
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5181
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5182
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5183
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5184
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5185
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5186
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5187
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5188
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5189
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5190
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5190
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5191
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5191
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5192
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5192
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5193
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5194
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5198
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5199
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5200
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5201
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5202
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5202
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5203
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5204
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5205
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5206
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5207
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5208
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5209
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5209
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5210
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5210
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5211
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5212
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5213
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5214
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5214
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5215
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5215
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5216
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5217
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5218
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5219
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5220
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5221
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5221
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5222
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5223
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5224
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5224
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5225
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5225
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5226
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5226
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9650
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9651
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9652
48
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1393731
reference_id 1393731
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1393731
49
reference_url https://security.gentoo.org/glsa/201611-16
reference_id GLSA-201611-16
reference_type
scores
url https://security.gentoo.org/glsa/201611-16
50
reference_url https://access.redhat.com/errata/RHSA-2016:2718
reference_id RHSA-2016:2718
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2718
51
reference_url https://usn.ubuntu.com/3133-1/
reference_id USN-3133-1
reference_type
scores
url https://usn.ubuntu.com/3133-1/
fixed_packages
0
url pkg:apk/alpine/ffmpeg@3.0.7-r0?arch=armhf&distroversion=v3.4&reponame=main
purl pkg:apk/alpine/ffmpeg@3.0.7-r0?arch=armhf&distroversion=v3.4&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ffmpeg@3.0.7-r0%3Farch=armhf&distroversion=v3.4&reponame=main
aliases CVE-2016-5199
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7cv2-w5ns-pqbd
2
url VCID-7ftk-cmhs-6kha
vulnerability_id VCID-7ftk-cmhs-6kha
summary Integer overflow in the mov_build_index function in libavformat/mov.c in FFmpeg before 2.8.8, 3.0.x before 3.0.3 and 3.1.x before 3.1.1 allows remote attackers to have unspecified impact via vectors involving sample size.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6164
reference_id
reference_type
scores
0
value 0.00936
scoring_system epss
scoring_elements 0.76121
published_at 2026-04-01T12:55:00Z
1
value 0.00936
scoring_system epss
scoring_elements 0.76125
published_at 2026-04-02T12:55:00Z
2
value 0.00936
scoring_system epss
scoring_elements 0.76158
published_at 2026-04-04T12:55:00Z
3
value 0.00936
scoring_system epss
scoring_elements 0.76138
published_at 2026-04-07T12:55:00Z
4
value 0.00936
scoring_system epss
scoring_elements 0.76171
published_at 2026-04-08T12:55:00Z
5
value 0.00936
scoring_system epss
scoring_elements 0.76184
published_at 2026-04-09T12:55:00Z
6
value 0.00936
scoring_system epss
scoring_elements 0.76209
published_at 2026-04-11T12:55:00Z
7
value 0.00936
scoring_system epss
scoring_elements 0.76185
published_at 2026-04-12T12:55:00Z
8
value 0.00936
scoring_system epss
scoring_elements 0.76183
published_at 2026-04-13T12:55:00Z
9
value 0.00936
scoring_system epss
scoring_elements 0.76224
published_at 2026-04-16T12:55:00Z
10
value 0.00936
scoring_system epss
scoring_elements 0.76228
published_at 2026-04-18T12:55:00Z
11
value 0.00936
scoring_system epss
scoring_elements 0.7621
published_at 2026-04-21T12:55:00Z
12
value 0.00936
scoring_system epss
scoring_elements 0.76248
published_at 2026-04-24T12:55:00Z
13
value 0.00936
scoring_system epss
scoring_elements 0.76258
published_at 2026-04-26T12:55:00Z
14
value 0.00936
scoring_system epss
scoring_elements 0.7627
published_at 2026-04-29T12:55:00Z
15
value 0.00936
scoring_system epss
scoring_elements 0.76279
published_at 2026-05-05T12:55:00Z
16
value 0.00936
scoring_system epss
scoring_elements 0.76308
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6164
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6164
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6164
fixed_packages
0
url pkg:apk/alpine/ffmpeg@3.0.7-r0?arch=armhf&distroversion=v3.4&reponame=main
purl pkg:apk/alpine/ffmpeg@3.0.7-r0?arch=armhf&distroversion=v3.4&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ffmpeg@3.0.7-r0%3Farch=armhf&distroversion=v3.4&reponame=main
aliases CVE-2016-6164
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7ftk-cmhs-6kha
3
url VCID-ayqf-v7b1-ekc4
vulnerability_id VCID-ayqf-v7b1-ekc4
summary
Multiple vulnerabilities have been found in FFmpeg, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7555
reference_id
reference_type
scores
0
value 0.00332
scoring_system epss
scoring_elements 0.55966
published_at 2026-04-01T12:55:00Z
1
value 0.00332
scoring_system epss
scoring_elements 0.56076
published_at 2026-04-07T12:55:00Z
2
value 0.00332
scoring_system epss
scoring_elements 0.56097
published_at 2026-04-04T12:55:00Z
3
value 0.00332
scoring_system epss
scoring_elements 0.56128
published_at 2026-04-08T12:55:00Z
4
value 0.00332
scoring_system epss
scoring_elements 0.56133
published_at 2026-04-09T12:55:00Z
5
value 0.00332
scoring_system epss
scoring_elements 0.56144
published_at 2026-04-11T12:55:00Z
6
value 0.00332
scoring_system epss
scoring_elements 0.56121
published_at 2026-04-12T12:55:00Z
7
value 0.00332
scoring_system epss
scoring_elements 0.56105
published_at 2026-04-13T12:55:00Z
8
value 0.00332
scoring_system epss
scoring_elements 0.56139
published_at 2026-04-16T12:55:00Z
9
value 0.00332
scoring_system epss
scoring_elements 0.56141
published_at 2026-04-18T12:55:00Z
10
value 0.00332
scoring_system epss
scoring_elements 0.56111
published_at 2026-04-21T12:55:00Z
11
value 0.00332
scoring_system epss
scoring_elements 0.56038
published_at 2026-04-24T12:55:00Z
12
value 0.00332
scoring_system epss
scoring_elements 0.56058
published_at 2026-04-26T12:55:00Z
13
value 0.00332
scoring_system epss
scoring_elements 0.56033
published_at 2026-04-29T12:55:00Z
14
value 0.00332
scoring_system epss
scoring_elements 0.55986
published_at 2026-05-05T12:55:00Z
15
value 0.00332
scoring_system epss
scoring_elements 0.56034
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7555
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7555
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7555
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840434
reference_id 840434
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840434
3
reference_url https://security.gentoo.org/glsa/201701-71
reference_id GLSA-201701-71
reference_type
scores
url https://security.gentoo.org/glsa/201701-71
fixed_packages
0
url pkg:apk/alpine/ffmpeg@3.0.7-r0?arch=armhf&distroversion=v3.4&reponame=main
purl pkg:apk/alpine/ffmpeg@3.0.7-r0?arch=armhf&distroversion=v3.4&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ffmpeg@3.0.7-r0%3Farch=armhf&distroversion=v3.4&reponame=main
aliases CVE-2016-7555
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ayqf-v7b1-ekc4
4
url VCID-ehgf-99d2-uyeh
vulnerability_id VCID-ehgf-99d2-uyeh
summary
Multiple vulnerabilities have been found in FFmpeg, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7502
reference_id
reference_type
scores
0
value 0.00309
scoring_system epss
scoring_elements 0.5397
published_at 2026-04-01T12:55:00Z
1
value 0.00309
scoring_system epss
scoring_elements 0.53987
published_at 2026-04-02T12:55:00Z
2
value 0.00309
scoring_system epss
scoring_elements 0.54014
published_at 2026-04-04T12:55:00Z
3
value 0.00309
scoring_system epss
scoring_elements 0.53989
published_at 2026-04-07T12:55:00Z
4
value 0.00309
scoring_system epss
scoring_elements 0.54041
published_at 2026-04-09T12:55:00Z
5
value 0.00309
scoring_system epss
scoring_elements 0.54088
published_at 2026-04-11T12:55:00Z
6
value 0.00309
scoring_system epss
scoring_elements 0.54069
published_at 2026-04-12T12:55:00Z
7
value 0.00309
scoring_system epss
scoring_elements 0.54052
published_at 2026-04-13T12:55:00Z
8
value 0.00309
scoring_system epss
scoring_elements 0.54091
published_at 2026-04-16T12:55:00Z
9
value 0.00309
scoring_system epss
scoring_elements 0.54095
published_at 2026-04-18T12:55:00Z
10
value 0.00309
scoring_system epss
scoring_elements 0.54078
published_at 2026-04-21T12:55:00Z
11
value 0.00309
scoring_system epss
scoring_elements 0.54045
published_at 2026-04-24T12:55:00Z
12
value 0.00309
scoring_system epss
scoring_elements 0.54056
published_at 2026-04-26T12:55:00Z
13
value 0.00309
scoring_system epss
scoring_elements 0.54028
published_at 2026-04-29T12:55:00Z
14
value 0.00309
scoring_system epss
scoring_elements 0.53977
published_at 2026-05-05T12:55:00Z
15
value 0.00309
scoring_system epss
scoring_elements 0.54019
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7502
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7502
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840434
reference_id 840434
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840434
3
reference_url https://security.gentoo.org/glsa/201701-71
reference_id GLSA-201701-71
reference_type
scores
url https://security.gentoo.org/glsa/201701-71
fixed_packages
0
url pkg:apk/alpine/ffmpeg@3.0.7-r0?arch=armhf&distroversion=v3.4&reponame=main
purl pkg:apk/alpine/ffmpeg@3.0.7-r0?arch=armhf&distroversion=v3.4&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ffmpeg@3.0.7-r0%3Farch=armhf&distroversion=v3.4&reponame=main
aliases CVE-2016-7502
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ehgf-99d2-uyeh
5
url VCID-fy4j-u18p-83f5
vulnerability_id VCID-fy4j-u18p-83f5
summary
Multiple vulnerabilities have been found in FFmpeg, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7905
reference_id
reference_type
scores
0
value 0.00538
scoring_system epss
scoring_elements 0.67472
published_at 2026-04-01T12:55:00Z
1
value 0.00538
scoring_system epss
scoring_elements 0.67508
published_at 2026-04-07T12:55:00Z
2
value 0.00538
scoring_system epss
scoring_elements 0.6753
published_at 2026-04-04T12:55:00Z
3
value 0.00538
scoring_system epss
scoring_elements 0.6756
published_at 2026-04-08T12:55:00Z
4
value 0.00538
scoring_system epss
scoring_elements 0.67574
published_at 2026-04-09T12:55:00Z
5
value 0.00538
scoring_system epss
scoring_elements 0.67596
published_at 2026-04-11T12:55:00Z
6
value 0.00538
scoring_system epss
scoring_elements 0.67583
published_at 2026-05-05T12:55:00Z
7
value 0.00538
scoring_system epss
scoring_elements 0.6755
published_at 2026-04-13T12:55:00Z
8
value 0.00538
scoring_system epss
scoring_elements 0.67585
published_at 2026-04-16T12:55:00Z
9
value 0.00538
scoring_system epss
scoring_elements 0.67597
published_at 2026-04-18T12:55:00Z
10
value 0.00538
scoring_system epss
scoring_elements 0.67576
published_at 2026-04-21T12:55:00Z
11
value 0.00538
scoring_system epss
scoring_elements 0.67595
published_at 2026-04-24T12:55:00Z
12
value 0.00538
scoring_system epss
scoring_elements 0.67606
published_at 2026-04-26T12:55:00Z
13
value 0.00538
scoring_system epss
scoring_elements 0.67608
published_at 2026-04-29T12:55:00Z
14
value 0.00538
scoring_system epss
scoring_elements 0.67626
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7905
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7905
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7905
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840434
reference_id 840434
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840434
3
reference_url https://security.gentoo.org/glsa/201701-71
reference_id GLSA-201701-71
reference_type
scores
url https://security.gentoo.org/glsa/201701-71
fixed_packages
0
url pkg:apk/alpine/ffmpeg@3.0.7-r0?arch=armhf&distroversion=v3.4&reponame=main
purl pkg:apk/alpine/ffmpeg@3.0.7-r0?arch=armhf&distroversion=v3.4&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ffmpeg@3.0.7-r0%3Farch=armhf&distroversion=v3.4&reponame=main
aliases CVE-2016-7905
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fy4j-u18p-83f5
6
url VCID-gqfr-j8ju-73fh
vulnerability_id VCID-gqfr-j8ju-73fh
summary
Multiple vulnerabilities have been found in FFmpeg, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7562
reference_id
reference_type
scores
0
value 0.00634
scoring_system epss
scoring_elements 0.7032
published_at 2026-04-01T12:55:00Z
1
value 0.00634
scoring_system epss
scoring_elements 0.70332
published_at 2026-04-02T12:55:00Z
2
value 0.00634
scoring_system epss
scoring_elements 0.70349
published_at 2026-04-04T12:55:00Z
3
value 0.00634
scoring_system epss
scoring_elements 0.70327
published_at 2026-04-07T12:55:00Z
4
value 0.00634
scoring_system epss
scoring_elements 0.70372
published_at 2026-04-08T12:55:00Z
5
value 0.00634
scoring_system epss
scoring_elements 0.70387
published_at 2026-04-09T12:55:00Z
6
value 0.00634
scoring_system epss
scoring_elements 0.70411
published_at 2026-04-11T12:55:00Z
7
value 0.00634
scoring_system epss
scoring_elements 0.70395
published_at 2026-04-12T12:55:00Z
8
value 0.00634
scoring_system epss
scoring_elements 0.70381
published_at 2026-04-13T12:55:00Z
9
value 0.00634
scoring_system epss
scoring_elements 0.70424
published_at 2026-04-16T12:55:00Z
10
value 0.00634
scoring_system epss
scoring_elements 0.70433
published_at 2026-04-18T12:55:00Z
11
value 0.00634
scoring_system epss
scoring_elements 0.70413
published_at 2026-04-21T12:55:00Z
12
value 0.00634
scoring_system epss
scoring_elements 0.70464
published_at 2026-04-24T12:55:00Z
13
value 0.00634
scoring_system epss
scoring_elements 0.70473
published_at 2026-04-29T12:55:00Z
14
value 0.00634
scoring_system epss
scoring_elements 0.70448
published_at 2026-05-05T12:55:00Z
15
value 0.00634
scoring_system epss
scoring_elements 0.70487
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7562
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7562
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840434
reference_id 840434
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840434
3
reference_url https://security.gentoo.org/glsa/201701-71
reference_id GLSA-201701-71
reference_type
scores
url https://security.gentoo.org/glsa/201701-71
fixed_packages
0
url pkg:apk/alpine/ffmpeg@3.0.7-r0?arch=armhf&distroversion=v3.4&reponame=main
purl pkg:apk/alpine/ffmpeg@3.0.7-r0?arch=armhf&distroversion=v3.4&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ffmpeg@3.0.7-r0%3Farch=armhf&distroversion=v3.4&reponame=main
aliases CVE-2016-7562
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gqfr-j8ju-73fh
7
url VCID-jrpc-5n1u-dygq
vulnerability_id VCID-jrpc-5n1u-dygq
summary
Multiple vulnerabilities have been found in FFmpeg, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7450
reference_id
reference_type
scores
0
value 0.00221
scoring_system epss
scoring_elements 0.44678
published_at 2026-04-01T12:55:00Z
1
value 0.00221
scoring_system epss
scoring_elements 0.44758
published_at 2026-04-12T12:55:00Z
2
value 0.00221
scoring_system epss
scoring_elements 0.44778
published_at 2026-04-04T12:55:00Z
3
value 0.00221
scoring_system epss
scoring_elements 0.44717
published_at 2026-04-07T12:55:00Z
4
value 0.00221
scoring_system epss
scoring_elements 0.4477
published_at 2026-04-08T12:55:00Z
5
value 0.00221
scoring_system epss
scoring_elements 0.44773
published_at 2026-04-09T12:55:00Z
6
value 0.00221
scoring_system epss
scoring_elements 0.4479
published_at 2026-04-11T12:55:00Z
7
value 0.00221
scoring_system epss
scoring_elements 0.4476
published_at 2026-04-13T12:55:00Z
8
value 0.00221
scoring_system epss
scoring_elements 0.44814
published_at 2026-04-16T12:55:00Z
9
value 0.00221
scoring_system epss
scoring_elements 0.44806
published_at 2026-04-18T12:55:00Z
10
value 0.00221
scoring_system epss
scoring_elements 0.44737
published_at 2026-04-21T12:55:00Z
11
value 0.00221
scoring_system epss
scoring_elements 0.44656
published_at 2026-04-24T12:55:00Z
12
value 0.00221
scoring_system epss
scoring_elements 0.44662
published_at 2026-04-26T12:55:00Z
13
value 0.00221
scoring_system epss
scoring_elements 0.44583
published_at 2026-04-29T12:55:00Z
14
value 0.00221
scoring_system epss
scoring_elements 0.44465
published_at 2026-05-05T12:55:00Z
15
value 0.00221
scoring_system epss
scoring_elements 0.44535
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7450
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7450
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7450
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840434
reference_id 840434
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840434
3
reference_url https://security.gentoo.org/glsa/201701-71
reference_id GLSA-201701-71
reference_type
scores
url https://security.gentoo.org/glsa/201701-71
fixed_packages
0
url pkg:apk/alpine/ffmpeg@3.0.7-r0?arch=armhf&distroversion=v3.4&reponame=main
purl pkg:apk/alpine/ffmpeg@3.0.7-r0?arch=armhf&distroversion=v3.4&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ffmpeg@3.0.7-r0%3Farch=armhf&distroversion=v3.4&reponame=main
aliases CVE-2016-7450
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jrpc-5n1u-dygq
8
url VCID-mfbv-npxq-fbb7
vulnerability_id VCID-mfbv-npxq-fbb7
summary
Multiple vulnerabilities have been found in FFmpeg, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7122
reference_id
reference_type
scores
0
value 0.00186
scoring_system epss
scoring_elements 0.40388
published_at 2026-04-01T12:55:00Z
1
value 0.00186
scoring_system epss
scoring_elements 0.40475
published_at 2026-04-02T12:55:00Z
2
value 0.00186
scoring_system epss
scoring_elements 0.40501
published_at 2026-04-04T12:55:00Z
3
value 0.00186
scoring_system epss
scoring_elements 0.40424
published_at 2026-04-07T12:55:00Z
4
value 0.00186
scoring_system epss
scoring_elements 0.40474
published_at 2026-04-08T12:55:00Z
5
value 0.00186
scoring_system epss
scoring_elements 0.40485
published_at 2026-04-09T12:55:00Z
6
value 0.00186
scoring_system epss
scoring_elements 0.40506
published_at 2026-04-11T12:55:00Z
7
value 0.00186
scoring_system epss
scoring_elements 0.40469
published_at 2026-04-12T12:55:00Z
8
value 0.00186
scoring_system epss
scoring_elements 0.4045
published_at 2026-04-13T12:55:00Z
9
value 0.00186
scoring_system epss
scoring_elements 0.40497
published_at 2026-04-16T12:55:00Z
10
value 0.00186
scoring_system epss
scoring_elements 0.40466
published_at 2026-04-18T12:55:00Z
11
value 0.00186
scoring_system epss
scoring_elements 0.4039
published_at 2026-04-21T12:55:00Z
12
value 0.00186
scoring_system epss
scoring_elements 0.4028
published_at 2026-04-24T12:55:00Z
13
value 0.00186
scoring_system epss
scoring_elements 0.40267
published_at 2026-04-26T12:55:00Z
14
value 0.00186
scoring_system epss
scoring_elements 0.40186
published_at 2026-04-29T12:55:00Z
15
value 0.00186
scoring_system epss
scoring_elements 0.40048
published_at 2026-05-05T12:55:00Z
16
value 0.00186
scoring_system epss
scoring_elements 0.40115
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7122
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7122
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7122
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840434
reference_id 840434
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840434
3
reference_url https://security.gentoo.org/glsa/201701-71
reference_id GLSA-201701-71
reference_type
scores
url https://security.gentoo.org/glsa/201701-71
fixed_packages
0
url pkg:apk/alpine/ffmpeg@3.0.7-r0?arch=armhf&distroversion=v3.4&reponame=main
purl pkg:apk/alpine/ffmpeg@3.0.7-r0?arch=armhf&distroversion=v3.4&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ffmpeg@3.0.7-r0%3Farch=armhf&distroversion=v3.4&reponame=main
aliases CVE-2016-7122
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mfbv-npxq-fbb7
9
url VCID-tsrj-t3se-2fbw
vulnerability_id VCID-tsrj-t3se-2fbw
summary Heap-based buffer overflow in libavformat/http.c in FFmpeg before 2.8.10, 3.0.x before 3.0.5, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 allows remote web servers to execute arbitrary code via a negative chunk size in an HTTP response.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-10190
reference_id
reference_type
scores
0
value 0.10189
scoring_system epss
scoring_elements 0.93097
published_at 2026-04-01T12:55:00Z
1
value 0.10189
scoring_system epss
scoring_elements 0.93107
published_at 2026-04-02T12:55:00Z
2
value 0.10189
scoring_system epss
scoring_elements 0.9311
published_at 2026-04-04T12:55:00Z
3
value 0.10189
scoring_system epss
scoring_elements 0.93109
published_at 2026-04-07T12:55:00Z
4
value 0.10189
scoring_system epss
scoring_elements 0.93118
published_at 2026-04-08T12:55:00Z
5
value 0.10189
scoring_system epss
scoring_elements 0.93122
published_at 2026-04-09T12:55:00Z
6
value 0.10189
scoring_system epss
scoring_elements 0.93128
published_at 2026-04-11T12:55:00Z
7
value 0.10189
scoring_system epss
scoring_elements 0.93125
published_at 2026-04-12T12:55:00Z
8
value 0.10189
scoring_system epss
scoring_elements 0.93127
published_at 2026-04-13T12:55:00Z
9
value 0.10189
scoring_system epss
scoring_elements 0.93144
published_at 2026-04-16T12:55:00Z
10
value 0.10189
scoring_system epss
scoring_elements 0.93148
published_at 2026-04-18T12:55:00Z
11
value 0.10189
scoring_system epss
scoring_elements 0.93155
published_at 2026-04-21T12:55:00Z
12
value 0.10189
scoring_system epss
scoring_elements 0.93161
published_at 2026-04-24T12:55:00Z
13
value 0.10189
scoring_system epss
scoring_elements 0.9316
published_at 2026-04-26T12:55:00Z
14
value 0.10189
scoring_system epss
scoring_elements 0.93157
published_at 2026-04-29T12:55:00Z
15
value 0.10189
scoring_system epss
scoring_elements 0.93163
published_at 2026-05-05T12:55:00Z
16
value 0.10189
scoring_system epss
scoring_elements 0.93177
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-10190
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10190
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10190
fixed_packages
0
url pkg:apk/alpine/ffmpeg@3.0.7-r0?arch=armhf&distroversion=v3.4&reponame=main
purl pkg:apk/alpine/ffmpeg@3.0.7-r0?arch=armhf&distroversion=v3.4&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ffmpeg@3.0.7-r0%3Farch=armhf&distroversion=v3.4&reponame=main
aliases CVE-2016-10190
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tsrj-t3se-2fbw
10
url VCID-ud3h-b3k7-dkd3
vulnerability_id VCID-ud3h-b3k7-dkd3
summary
Multiple vulnerabilities have been found in FFmpeg, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7785
reference_id
reference_type
scores
0
value 0.00276
scoring_system epss
scoring_elements 0.50938
published_at 2026-04-01T12:55:00Z
1
value 0.00276
scoring_system epss
scoring_elements 0.50992
published_at 2026-04-02T12:55:00Z
2
value 0.00276
scoring_system epss
scoring_elements 0.51017
published_at 2026-04-04T12:55:00Z
3
value 0.00276
scoring_system epss
scoring_elements 0.50975
published_at 2026-04-07T12:55:00Z
4
value 0.00276
scoring_system epss
scoring_elements 0.51032
published_at 2026-04-13T12:55:00Z
5
value 0.00276
scoring_system epss
scoring_elements 0.51028
published_at 2026-04-09T12:55:00Z
6
value 0.00276
scoring_system epss
scoring_elements 0.51071
published_at 2026-04-11T12:55:00Z
7
value 0.00276
scoring_system epss
scoring_elements 0.51049
published_at 2026-04-12T12:55:00Z
8
value 0.00276
scoring_system epss
scoring_elements 0.5107
published_at 2026-04-16T12:55:00Z
9
value 0.00276
scoring_system epss
scoring_elements 0.51076
published_at 2026-04-18T12:55:00Z
10
value 0.00276
scoring_system epss
scoring_elements 0.51053
published_at 2026-04-21T12:55:00Z
11
value 0.00276
scoring_system epss
scoring_elements 0.51001
published_at 2026-04-24T12:55:00Z
12
value 0.00276
scoring_system epss
scoring_elements 0.51009
published_at 2026-04-26T12:55:00Z
13
value 0.00276
scoring_system epss
scoring_elements 0.50969
published_at 2026-04-29T12:55:00Z
14
value 0.00276
scoring_system epss
scoring_elements 0.50899
published_at 2026-05-05T12:55:00Z
15
value 0.00276
scoring_system epss
scoring_elements 0.5095
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7785
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7785
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7785
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840434
reference_id 840434
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840434
3
reference_url https://security.gentoo.org/glsa/201701-71
reference_id GLSA-201701-71
reference_type
scores
url https://security.gentoo.org/glsa/201701-71
fixed_packages
0
url pkg:apk/alpine/ffmpeg@3.0.7-r0?arch=armhf&distroversion=v3.4&reponame=main
purl pkg:apk/alpine/ffmpeg@3.0.7-r0?arch=armhf&distroversion=v3.4&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ffmpeg@3.0.7-r0%3Farch=armhf&distroversion=v3.4&reponame=main
aliases CVE-2016-7785
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ud3h-b3k7-dkd3
11
url VCID-ujdm-ubfw-57bs
vulnerability_id VCID-ujdm-ubfw-57bs
summary The zlib_refill function in libavformat/swfdec.c in FFmpeg before 3.1.3 allows remote attackers to cause an infinite loop denial of service via a crafted SWF file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6881
reference_id
reference_type
scores
0
value 0.00435
scoring_system epss
scoring_elements 0.62819
published_at 2026-04-01T12:55:00Z
1
value 0.00435
scoring_system epss
scoring_elements 0.62876
published_at 2026-04-02T12:55:00Z
2
value 0.00435
scoring_system epss
scoring_elements 0.62906
published_at 2026-04-04T12:55:00Z
3
value 0.00435
scoring_system epss
scoring_elements 0.6287
published_at 2026-04-07T12:55:00Z
4
value 0.00435
scoring_system epss
scoring_elements 0.62921
published_at 2026-04-08T12:55:00Z
5
value 0.00435
scoring_system epss
scoring_elements 0.62937
published_at 2026-04-09T12:55:00Z
6
value 0.00435
scoring_system epss
scoring_elements 0.62955
published_at 2026-04-11T12:55:00Z
7
value 0.00435
scoring_system epss
scoring_elements 0.62944
published_at 2026-04-12T12:55:00Z
8
value 0.00435
scoring_system epss
scoring_elements 0.62922
published_at 2026-04-13T12:55:00Z
9
value 0.00435
scoring_system epss
scoring_elements 0.62962
published_at 2026-04-16T12:55:00Z
10
value 0.00435
scoring_system epss
scoring_elements 0.6297
published_at 2026-04-18T12:55:00Z
11
value 0.00435
scoring_system epss
scoring_elements 0.62949
published_at 2026-04-21T12:55:00Z
12
value 0.00435
scoring_system epss
scoring_elements 0.62969
published_at 2026-04-24T12:55:00Z
13
value 0.00435
scoring_system epss
scoring_elements 0.62984
published_at 2026-04-29T12:55:00Z
14
value 0.00435
scoring_system epss
scoring_elements 0.62939
published_at 2026-05-05T12:55:00Z
15
value 0.00435
scoring_system epss
scoring_elements 0.62985
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6881
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6881
fixed_packages
0
url pkg:apk/alpine/ffmpeg@3.0.7-r0?arch=armhf&distroversion=v3.4&reponame=main
purl pkg:apk/alpine/ffmpeg@3.0.7-r0?arch=armhf&distroversion=v3.4&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ffmpeg@3.0.7-r0%3Farch=armhf&distroversion=v3.4&reponame=main
aliases CVE-2016-6881
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ujdm-ubfw-57bs
12
url VCID-vka8-kexr-g7ej
vulnerability_id VCID-vka8-kexr-g7ej
summary Heap-based buffer overflow in ffserver.c in FFmpeg before 2.8.10, 3.0.x before 3.0.5, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 allows remote attackers to execute arbitrary code by leveraging failure to check chunk size.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-10192
reference_id
reference_type
scores
0
value 0.04839
scoring_system epss
scoring_elements 0.89539
published_at 2026-04-18T12:55:00Z
1
value 0.04839
scoring_system epss
scoring_elements 0.89536
published_at 2026-04-21T12:55:00Z
2
value 0.04839
scoring_system epss
scoring_elements 0.89551
published_at 2026-04-24T12:55:00Z
3
value 0.04839
scoring_system epss
scoring_elements 0.89555
published_at 2026-04-29T12:55:00Z
4
value 0.04839
scoring_system epss
scoring_elements 0.89563
published_at 2026-05-05T12:55:00Z
5
value 0.04839
scoring_system epss
scoring_elements 0.89582
published_at 2026-05-07T12:55:00Z
6
value 0.05544
scoring_system epss
scoring_elements 0.90274
published_at 2026-04-11T12:55:00Z
7
value 0.05544
scoring_system epss
scoring_elements 0.90273
published_at 2026-04-12T12:55:00Z
8
value 0.05544
scoring_system epss
scoring_elements 0.90223
published_at 2026-04-01T12:55:00Z
9
value 0.05544
scoring_system epss
scoring_elements 0.90284
published_at 2026-04-16T12:55:00Z
10
value 0.05544
scoring_system epss
scoring_elements 0.90267
published_at 2026-04-13T12:55:00Z
11
value 0.05544
scoring_system epss
scoring_elements 0.90226
published_at 2026-04-02T12:55:00Z
12
value 0.05544
scoring_system epss
scoring_elements 0.90239
published_at 2026-04-04T12:55:00Z
13
value 0.05544
scoring_system epss
scoring_elements 0.90243
published_at 2026-04-07T12:55:00Z
14
value 0.05544
scoring_system epss
scoring_elements 0.90259
published_at 2026-04-08T12:55:00Z
15
value 0.05544
scoring_system epss
scoring_elements 0.90265
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-10192
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10192
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10192
fixed_packages
0
url pkg:apk/alpine/ffmpeg@3.0.7-r0?arch=armhf&distroversion=v3.4&reponame=main
purl pkg:apk/alpine/ffmpeg@3.0.7-r0?arch=armhf&distroversion=v3.4&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ffmpeg@3.0.7-r0%3Farch=armhf&distroversion=v3.4&reponame=main
aliases CVE-2016-10192
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vka8-kexr-g7ej
13
url VCID-wpwh-kftw-vyhp
vulnerability_id VCID-wpwh-kftw-vyhp
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5024.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5024.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5024
reference_id
reference_type
scores
0
value 0.00202
scoring_system epss
scoring_elements 0.42205
published_at 2026-04-01T12:55:00Z
1
value 0.00202
scoring_system epss
scoring_elements 0.42002
published_at 2026-05-07T12:55:00Z
2
value 0.00202
scoring_system epss
scoring_elements 0.42069
published_at 2026-04-29T12:55:00Z
3
value 0.00202
scoring_system epss
scoring_elements 0.41928
published_at 2026-05-05T12:55:00Z
4
value 0.00202
scoring_system epss
scoring_elements 0.42281
published_at 2026-04-02T12:55:00Z
5
value 0.00202
scoring_system epss
scoring_elements 0.42309
published_at 2026-04-04T12:55:00Z
6
value 0.00202
scoring_system epss
scoring_elements 0.42251
published_at 2026-04-07T12:55:00Z
7
value 0.00202
scoring_system epss
scoring_elements 0.42302
published_at 2026-04-08T12:55:00Z
8
value 0.00202
scoring_system epss
scoring_elements 0.4231
published_at 2026-04-09T12:55:00Z
9
value 0.00202
scoring_system epss
scoring_elements 0.42332
published_at 2026-04-11T12:55:00Z
10
value 0.00202
scoring_system epss
scoring_elements 0.42296
published_at 2026-04-12T12:55:00Z
11
value 0.00202
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-13T12:55:00Z
12
value 0.00202
scoring_system epss
scoring_elements 0.42318
published_at 2026-04-16T12:55:00Z
13
value 0.00202
scoring_system epss
scoring_elements 0.42294
published_at 2026-04-18T12:55:00Z
14
value 0.00202
scoring_system epss
scoring_elements 0.42222
published_at 2026-04-21T12:55:00Z
15
value 0.00202
scoring_system epss
scoring_elements 0.42156
published_at 2026-04-24T12:55:00Z
16
value 0.00202
scoring_system epss
scoring_elements 0.42152
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5024
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5006
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5007
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5008
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5009
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5010
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5011
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5012
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5013
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5014
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5014
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5015
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5016
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5017
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5018
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5019
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5020
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5021
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5022
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5023
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5024
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5025
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5026
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5027
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5027
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5028
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1416675
reference_id 1416675
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1416675
26
reference_url https://security.archlinux.org/ASA-201701-33
reference_id ASA-201701-33
reference_type
scores
url https://security.archlinux.org/ASA-201701-33
27
reference_url https://security.archlinux.org/ASA-201702-10
reference_id ASA-201702-10
reference_type
scores
url https://security.archlinux.org/ASA-201702-10
28
reference_url https://security.archlinux.org/AVG-156
reference_id AVG-156
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-156
29
reference_url https://security.archlinux.org/AVG-172
reference_id AVG-172
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-172
30
reference_url https://security.gentoo.org/glsa/201701-66
reference_id GLSA-201701-66
reference_type
scores
url https://security.gentoo.org/glsa/201701-66
31
reference_url https://security.gentoo.org/glsa/201705-05
reference_id GLSA-201705-05
reference_type
scores
url https://security.gentoo.org/glsa/201705-05
32
reference_url https://access.redhat.com/errata/RHSA-2017:0206
reference_id RHSA-2017:0206
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0206
33
reference_url https://usn.ubuntu.com/3180-1/
reference_id USN-3180-1
reference_type
scores
url https://usn.ubuntu.com/3180-1/
fixed_packages
0
url pkg:apk/alpine/ffmpeg@3.0.7-r0?arch=armhf&distroversion=v3.4&reponame=main
purl pkg:apk/alpine/ffmpeg@3.0.7-r0?arch=armhf&distroversion=v3.4&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ffmpeg@3.0.7-r0%3Farch=armhf&distroversion=v3.4&reponame=main
aliases CVE-2017-5024
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wpwh-kftw-vyhp
14
url VCID-ysu4-93vf-q7gp
vulnerability_id VCID-ysu4-93vf-q7gp
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5025.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5025.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5025
reference_id
reference_type
scores
0
value 0.00354
scoring_system epss
scoring_elements 0.57641
published_at 2026-04-01T12:55:00Z
1
value 0.00354
scoring_system epss
scoring_elements 0.5767
published_at 2026-05-05T12:55:00Z
2
value 0.00354
scoring_system epss
scoring_elements 0.57734
published_at 2026-04-26T12:55:00Z
3
value 0.00354
scoring_system epss
scoring_elements 0.57713
published_at 2026-04-29T12:55:00Z
4
value 0.00354
scoring_system epss
scoring_elements 0.57726
published_at 2026-04-02T12:55:00Z
5
value 0.00354
scoring_system epss
scoring_elements 0.57748
published_at 2026-04-04T12:55:00Z
6
value 0.00354
scoring_system epss
scoring_elements 0.57721
published_at 2026-04-07T12:55:00Z
7
value 0.00354
scoring_system epss
scoring_elements 0.57776
published_at 2026-04-08T12:55:00Z
8
value 0.00354
scoring_system epss
scoring_elements 0.57778
published_at 2026-04-09T12:55:00Z
9
value 0.00354
scoring_system epss
scoring_elements 0.57794
published_at 2026-04-11T12:55:00Z
10
value 0.00354
scoring_system epss
scoring_elements 0.57772
published_at 2026-04-12T12:55:00Z
11
value 0.00354
scoring_system epss
scoring_elements 0.57752
published_at 2026-04-13T12:55:00Z
12
value 0.00354
scoring_system epss
scoring_elements 0.57781
published_at 2026-04-16T12:55:00Z
13
value 0.00354
scoring_system epss
scoring_elements 0.57779
published_at 2026-04-18T12:55:00Z
14
value 0.00354
scoring_system epss
scoring_elements 0.57755
published_at 2026-04-21T12:55:00Z
15
value 0.00354
scoring_system epss
scoring_elements 0.57714
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5025
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5006
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5007
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5008
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5009
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5010
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5011
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5012
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5013
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5014
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5014
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5015
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5016
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5017
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5018
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5019
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5020
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5021
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5022
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5023
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5024
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5025
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5026
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5027
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5027
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5028
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1416676
reference_id 1416676
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1416676
26
reference_url https://security.archlinux.org/ASA-201701-33
reference_id ASA-201701-33
reference_type
scores
url https://security.archlinux.org/ASA-201701-33
27
reference_url https://security.archlinux.org/ASA-201702-10
reference_id ASA-201702-10
reference_type
scores
url https://security.archlinux.org/ASA-201702-10
28
reference_url https://security.archlinux.org/AVG-156
reference_id AVG-156
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-156
29
reference_url https://security.archlinux.org/AVG-172
reference_id AVG-172
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-172
30
reference_url https://security.gentoo.org/glsa/201701-66
reference_id GLSA-201701-66
reference_type
scores
url https://security.gentoo.org/glsa/201701-66
31
reference_url https://security.gentoo.org/glsa/201705-05
reference_id GLSA-201705-05
reference_type
scores
url https://security.gentoo.org/glsa/201705-05
32
reference_url https://access.redhat.com/errata/RHSA-2017:0206
reference_id RHSA-2017:0206
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0206
33
reference_url https://usn.ubuntu.com/3180-1/
reference_id USN-3180-1
reference_type
scores
url https://usn.ubuntu.com/3180-1/
fixed_packages
0
url pkg:apk/alpine/ffmpeg@3.0.7-r0?arch=armhf&distroversion=v3.4&reponame=main
purl pkg:apk/alpine/ffmpeg@3.0.7-r0?arch=armhf&distroversion=v3.4&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ffmpeg@3.0.7-r0%3Farch=armhf&distroversion=v3.4&reponame=main
aliases CVE-2017-5025
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ysu4-93vf-q7gp
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/ffmpeg@3.0.7-r0%3Farch=armhf&distroversion=v3.4&reponame=main