Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/faad2@2.10.1-1?distro=trixie
Typedeb
Namespacedebian
Namefaad2
Version2.10.1-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.11.2-1
Latest_non_vulnerable_version2.11.2-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-137n-d6bn-pucd
vulnerability_id VCID-137n-d6bn-pucd
summary The mp4ff_read_stsc function in common/mp4ff/mp4atom.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.7 allows remote attackers to cause a denial of service (large loop and CPU consumption) via a crafted mp4 file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9255
reference_id
reference_type
scores
0
value 0.00258
scoring_system epss
scoring_elements 0.49121
published_at 2026-05-07T12:55:00Z
1
value 0.00258
scoring_system epss
scoring_elements 0.49111
published_at 2026-04-01T12:55:00Z
2
value 0.00258
scoring_system epss
scoring_elements 0.49144
published_at 2026-04-02T12:55:00Z
3
value 0.00258
scoring_system epss
scoring_elements 0.49173
published_at 2026-04-04T12:55:00Z
4
value 0.00258
scoring_system epss
scoring_elements 0.49124
published_at 2026-04-07T12:55:00Z
5
value 0.00258
scoring_system epss
scoring_elements 0.49179
published_at 2026-04-08T12:55:00Z
6
value 0.00258
scoring_system epss
scoring_elements 0.49176
published_at 2026-04-24T12:55:00Z
7
value 0.00258
scoring_system epss
scoring_elements 0.49193
published_at 2026-04-11T12:55:00Z
8
value 0.00258
scoring_system epss
scoring_elements 0.49167
published_at 2026-04-12T12:55:00Z
9
value 0.00258
scoring_system epss
scoring_elements 0.49172
published_at 2026-04-13T12:55:00Z
10
value 0.00258
scoring_system epss
scoring_elements 0.49218
published_at 2026-04-16T12:55:00Z
11
value 0.00258
scoring_system epss
scoring_elements 0.49216
published_at 2026-04-18T12:55:00Z
12
value 0.00258
scoring_system epss
scoring_elements 0.49186
published_at 2026-04-21T12:55:00Z
13
value 0.00258
scoring_system epss
scoring_elements 0.49185
published_at 2026-04-26T12:55:00Z
14
value 0.00258
scoring_system epss
scoring_elements 0.49142
published_at 2026-04-29T12:55:00Z
15
value 0.00258
scoring_system epss
scoring_elements 0.49058
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9255
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9255
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9255
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867724
reference_id 867724
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867724
3
reference_url https://security.archlinux.org/AVG-328
reference_id AVG-328
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-328
fixed_packages
0
url pkg:deb/debian/faad2@2.8.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.8.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.8.1-1%3Fdistro=trixie
1
url pkg:deb/debian/faad2@2.10.0-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.0-1%3Fdistro=trixie
2
url pkg:deb/debian/faad2@2.10.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.1-1%3Fdistro=trixie
3
url pkg:deb/debian/faad2@2.11.2-1?distro=trixie
purl pkg:deb/debian/faad2@2.11.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.11.2-1%3Fdistro=trixie
aliases CVE-2017-9255
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-137n-d6bn-pucd
1
url VCID-187z-v5ch-yqfu
vulnerability_id VCID-187z-v5ch-yqfu
summary
Multiple vulnerabilities have been found in FAAD2, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20361
reference_id
reference_type
scores
0
value 0.00338
scoring_system epss
scoring_elements 0.56572
published_at 2026-05-07T12:55:00Z
1
value 0.00338
scoring_system epss
scoring_elements 0.56523
published_at 2026-05-05T12:55:00Z
2
value 0.00338
scoring_system epss
scoring_elements 0.56516
published_at 2026-04-01T12:55:00Z
3
value 0.00338
scoring_system epss
scoring_elements 0.56613
published_at 2026-04-07T12:55:00Z
4
value 0.00338
scoring_system epss
scoring_elements 0.56634
published_at 2026-04-04T12:55:00Z
5
value 0.00338
scoring_system epss
scoring_elements 0.56664
published_at 2026-04-16T12:55:00Z
6
value 0.00338
scoring_system epss
scoring_elements 0.56669
published_at 2026-04-09T12:55:00Z
7
value 0.00338
scoring_system epss
scoring_elements 0.56678
published_at 2026-04-11T12:55:00Z
8
value 0.00338
scoring_system epss
scoring_elements 0.56653
published_at 2026-04-12T12:55:00Z
9
value 0.00338
scoring_system epss
scoring_elements 0.56632
published_at 2026-04-13T12:55:00Z
10
value 0.00338
scoring_system epss
scoring_elements 0.56663
published_at 2026-04-18T12:55:00Z
11
value 0.00338
scoring_system epss
scoring_elements 0.56635
published_at 2026-04-21T12:55:00Z
12
value 0.00338
scoring_system epss
scoring_elements 0.56571
published_at 2026-04-29T12:55:00Z
13
value 0.00338
scoring_system epss
scoring_elements 0.56589
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20361
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19502
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19503
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19504
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20194
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20195
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20197
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20198
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20357
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20358
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20359
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20361
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20362
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15296
15
reference_url https://github.com/knik0/faad2/issues/30
reference_id
reference_type
scores
url https://github.com/knik0/faad2/issues/30
16
reference_url https://seclists.org/bugtraq/2019/Sep/28
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Sep/28
17
reference_url https://www.debian.org/security/2019/dsa-4522
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4522
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiocoding:freeware_advanced_audio_decoder_2:2.8.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:audiocoding:freeware_advanced_audio_decoder_2:2.8.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiocoding:freeware_advanced_audio_decoder_2:2.8.8:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-20361
reference_id CVE-2018-20361
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-20361
20
reference_url https://security.gentoo.org/glsa/202006-17
reference_id GLSA-202006-17
reference_type
scores
url https://security.gentoo.org/glsa/202006-17
fixed_packages
0
url pkg:deb/debian/faad2@2.8.8-2?distro=trixie
purl pkg:deb/debian/faad2@2.8.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.8.8-2%3Fdistro=trixie
1
url pkg:deb/debian/faad2@2.10.0-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.0-1%3Fdistro=trixie
2
url pkg:deb/debian/faad2@2.10.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.1-1%3Fdistro=trixie
3
url pkg:deb/debian/faad2@2.11.2-1?distro=trixie
purl pkg:deb/debian/faad2@2.11.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.11.2-1%3Fdistro=trixie
aliases CVE-2018-20361
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-187z-v5ch-yqfu
2
url VCID-1jc2-bqz4-7qdy
vulnerability_id VCID-1jc2-bqz4-7qdy
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-32274
reference_id
reference_type
scores
0
value 0.00217
scoring_system epss
scoring_elements 0.44024
published_at 2026-05-07T12:55:00Z
1
value 0.00217
scoring_system epss
scoring_elements 0.4419
published_at 2026-04-01T12:55:00Z
2
value 0.00217
scoring_system epss
scoring_elements 0.44257
published_at 2026-04-02T12:55:00Z
3
value 0.00217
scoring_system epss
scoring_elements 0.4428
published_at 2026-04-04T12:55:00Z
4
value 0.00217
scoring_system epss
scoring_elements 0.44212
published_at 2026-04-07T12:55:00Z
5
value 0.00217
scoring_system epss
scoring_elements 0.44264
published_at 2026-04-08T12:55:00Z
6
value 0.00217
scoring_system epss
scoring_elements 0.44269
published_at 2026-04-09T12:55:00Z
7
value 0.00217
scoring_system epss
scoring_elements 0.44287
published_at 2026-04-11T12:55:00Z
8
value 0.00217
scoring_system epss
scoring_elements 0.44254
published_at 2026-04-13T12:55:00Z
9
value 0.00217
scoring_system epss
scoring_elements 0.44313
published_at 2026-04-16T12:55:00Z
10
value 0.00217
scoring_system epss
scoring_elements 0.44304
published_at 2026-04-18T12:55:00Z
11
value 0.00217
scoring_system epss
scoring_elements 0.44231
published_at 2026-04-21T12:55:00Z
12
value 0.00217
scoring_system epss
scoring_elements 0.4415
published_at 2026-04-24T12:55:00Z
13
value 0.00217
scoring_system epss
scoring_elements 0.44153
published_at 2026-04-26T12:55:00Z
14
value 0.00217
scoring_system epss
scoring_elements 0.4407
published_at 2026-04-29T12:55:00Z
15
value 0.00217
scoring_system epss
scoring_elements 0.43947
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-32274
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20199
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20360
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6956
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32272
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32272
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32273
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32274
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32274
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32276
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32276
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32277
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32278
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32278
11
reference_url https://security.archlinux.org/AVG-2403
reference_id AVG-2403
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2403
12
reference_url https://usn.ubuntu.com/6313-1/
reference_id USN-6313-1
reference_type
scores
url https://usn.ubuntu.com/6313-1/
fixed_packages
0
url pkg:deb/debian/faad2@2.10.0-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.0-1%3Fdistro=trixie
1
url pkg:deb/debian/faad2@2.10.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.1-1%3Fdistro=trixie
2
url pkg:deb/debian/faad2@2.11.2-1?distro=trixie
purl pkg:deb/debian/faad2@2.11.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.11.2-1%3Fdistro=trixie
aliases CVE-2021-32274
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1jc2-bqz4-7qdy
3
url VCID-2qkx-5mua-qbfh
vulnerability_id VCID-2qkx-5mua-qbfh
summary The mp4ff_read_stsc function in common/mp4ff/mp4atom.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.7 allows remote attackers to cause a denial of service (memory allocation error and application crash) via a crafted mp4 file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9219
reference_id
reference_type
scores
0
value 0.00241
scoring_system epss
scoring_elements 0.47316
published_at 2026-05-07T12:55:00Z
1
value 0.00241
scoring_system epss
scoring_elements 0.47325
published_at 2026-04-01T12:55:00Z
2
value 0.00241
scoring_system epss
scoring_elements 0.47361
published_at 2026-04-02T12:55:00Z
3
value 0.00241
scoring_system epss
scoring_elements 0.47382
published_at 2026-04-12T12:55:00Z
4
value 0.00241
scoring_system epss
scoring_elements 0.47331
published_at 2026-04-07T12:55:00Z
5
value 0.00241
scoring_system epss
scoring_elements 0.47386
published_at 2026-04-08T12:55:00Z
6
value 0.00241
scoring_system epss
scoring_elements 0.47383
published_at 2026-04-09T12:55:00Z
7
value 0.00241
scoring_system epss
scoring_elements 0.47408
published_at 2026-04-11T12:55:00Z
8
value 0.00241
scoring_system epss
scoring_elements 0.47389
published_at 2026-04-13T12:55:00Z
9
value 0.00241
scoring_system epss
scoring_elements 0.47448
published_at 2026-04-16T12:55:00Z
10
value 0.00241
scoring_system epss
scoring_elements 0.47441
published_at 2026-04-18T12:55:00Z
11
value 0.00241
scoring_system epss
scoring_elements 0.47392
published_at 2026-04-21T12:55:00Z
12
value 0.00241
scoring_system epss
scoring_elements 0.47378
published_at 2026-04-24T12:55:00Z
13
value 0.00241
scoring_system epss
scoring_elements 0.47387
published_at 2026-04-26T12:55:00Z
14
value 0.00241
scoring_system epss
scoring_elements 0.47334
published_at 2026-04-29T12:55:00Z
15
value 0.00241
scoring_system epss
scoring_elements 0.47252
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9219
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9219
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867724
reference_id 867724
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867724
3
reference_url https://security.archlinux.org/AVG-328
reference_id AVG-328
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-328
fixed_packages
0
url pkg:deb/debian/faad2@2.8.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.8.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.8.1-1%3Fdistro=trixie
1
url pkg:deb/debian/faad2@2.10.0-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.0-1%3Fdistro=trixie
2
url pkg:deb/debian/faad2@2.10.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.1-1%3Fdistro=trixie
3
url pkg:deb/debian/faad2@2.11.2-1?distro=trixie
purl pkg:deb/debian/faad2@2.11.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.11.2-1%3Fdistro=trixie
aliases CVE-2017-9219
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2qkx-5mua-qbfh
4
url VCID-34d7-q5p3-fua1
vulnerability_id VCID-34d7-q5p3-fua1
summary
Multiple vulnerabilities have been found in FAAD2, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20362
reference_id
reference_type
scores
0
value 0.00344
scoring_system epss
scoring_elements 0.56948
published_at 2026-05-07T12:55:00Z
1
value 0.00344
scoring_system epss
scoring_elements 0.56901
published_at 2026-05-05T12:55:00Z
2
value 0.00344
scoring_system epss
scoring_elements 0.56898
published_at 2026-04-01T12:55:00Z
3
value 0.00344
scoring_system epss
scoring_elements 0.56995
published_at 2026-04-02T12:55:00Z
4
value 0.00344
scoring_system epss
scoring_elements 0.57017
published_at 2026-04-04T12:55:00Z
5
value 0.00344
scoring_system epss
scoring_elements 0.56994
published_at 2026-04-07T12:55:00Z
6
value 0.00344
scoring_system epss
scoring_elements 0.57044
published_at 2026-04-08T12:55:00Z
7
value 0.00344
scoring_system epss
scoring_elements 0.57046
published_at 2026-04-09T12:55:00Z
8
value 0.00344
scoring_system epss
scoring_elements 0.57057
published_at 2026-04-11T12:55:00Z
9
value 0.00344
scoring_system epss
scoring_elements 0.57036
published_at 2026-04-12T12:55:00Z
10
value 0.00344
scoring_system epss
scoring_elements 0.57012
published_at 2026-04-13T12:55:00Z
11
value 0.00344
scoring_system epss
scoring_elements 0.57041
published_at 2026-04-16T12:55:00Z
12
value 0.00344
scoring_system epss
scoring_elements 0.57038
published_at 2026-04-18T12:55:00Z
13
value 0.00344
scoring_system epss
scoring_elements 0.57016
published_at 2026-04-21T12:55:00Z
14
value 0.00344
scoring_system epss
scoring_elements 0.56949
published_at 2026-04-24T12:55:00Z
15
value 0.00344
scoring_system epss
scoring_elements 0.56968
published_at 2026-04-26T12:55:00Z
16
value 0.00344
scoring_system epss
scoring_elements 0.56951
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20362
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19502
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19503
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19504
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20194
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20195
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20197
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20198
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20357
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20358
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20359
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20361
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20362
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15296
15
reference_url https://github.com/knik0/faad2/issues/26
reference_id
reference_type
scores
url https://github.com/knik0/faad2/issues/26
16
reference_url https://lists.debian.org/debian-lts-announce/2019/05/msg00022.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/05/msg00022.html
17
reference_url https://seclists.org/bugtraq/2019/Sep/28
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Sep/28
18
reference_url https://www.debian.org/security/2019/dsa-4522
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4522
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiocoding:freeware_advanced_audio_decoder_2:2.8.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:audiocoding:freeware_advanced_audio_decoder_2:2.8.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiocoding:freeware_advanced_audio_decoder_2:2.8.8:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-20362
reference_id CVE-2018-20362
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-20362
21
reference_url https://security.gentoo.org/glsa/202006-17
reference_id GLSA-202006-17
reference_type
scores
url https://security.gentoo.org/glsa/202006-17
fixed_packages
0
url pkg:deb/debian/faad2@2.8.8-2?distro=trixie
purl pkg:deb/debian/faad2@2.8.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.8.8-2%3Fdistro=trixie
1
url pkg:deb/debian/faad2@2.10.0-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.0-1%3Fdistro=trixie
2
url pkg:deb/debian/faad2@2.10.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.1-1%3Fdistro=trixie
3
url pkg:deb/debian/faad2@2.11.2-1?distro=trixie
purl pkg:deb/debian/faad2@2.11.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.11.2-1%3Fdistro=trixie
aliases CVE-2018-20362
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-34d7-q5p3-fua1
5
url VCID-53bt-akgh-nkb8
vulnerability_id VCID-53bt-akgh-nkb8
summary The mp4ff_read_stco function in common/mp4ff/mp4atom.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.7 allows remote attackers to cause a denial of service (large loop and CPU consumption) via a crafted mp4 file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9256
reference_id
reference_type
scores
0
value 0.00258
scoring_system epss
scoring_elements 0.49121
published_at 2026-05-07T12:55:00Z
1
value 0.00258
scoring_system epss
scoring_elements 0.49111
published_at 2026-04-01T12:55:00Z
2
value 0.00258
scoring_system epss
scoring_elements 0.49144
published_at 2026-04-02T12:55:00Z
3
value 0.00258
scoring_system epss
scoring_elements 0.49173
published_at 2026-04-04T12:55:00Z
4
value 0.00258
scoring_system epss
scoring_elements 0.49124
published_at 2026-04-07T12:55:00Z
5
value 0.00258
scoring_system epss
scoring_elements 0.49179
published_at 2026-04-08T12:55:00Z
6
value 0.00258
scoring_system epss
scoring_elements 0.49176
published_at 2026-04-24T12:55:00Z
7
value 0.00258
scoring_system epss
scoring_elements 0.49193
published_at 2026-04-11T12:55:00Z
8
value 0.00258
scoring_system epss
scoring_elements 0.49167
published_at 2026-04-12T12:55:00Z
9
value 0.00258
scoring_system epss
scoring_elements 0.49172
published_at 2026-04-13T12:55:00Z
10
value 0.00258
scoring_system epss
scoring_elements 0.49218
published_at 2026-04-16T12:55:00Z
11
value 0.00258
scoring_system epss
scoring_elements 0.49216
published_at 2026-04-18T12:55:00Z
12
value 0.00258
scoring_system epss
scoring_elements 0.49186
published_at 2026-04-21T12:55:00Z
13
value 0.00258
scoring_system epss
scoring_elements 0.49185
published_at 2026-04-26T12:55:00Z
14
value 0.00258
scoring_system epss
scoring_elements 0.49142
published_at 2026-04-29T12:55:00Z
15
value 0.00258
scoring_system epss
scoring_elements 0.49058
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9256
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9256
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9256
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867724
reference_id 867724
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867724
3
reference_url https://security.archlinux.org/AVG-328
reference_id AVG-328
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-328
fixed_packages
0
url pkg:deb/debian/faad2@2.8.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.8.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.8.1-1%3Fdistro=trixie
1
url pkg:deb/debian/faad2@2.10.0-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.0-1%3Fdistro=trixie
2
url pkg:deb/debian/faad2@2.10.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.1-1%3Fdistro=trixie
3
url pkg:deb/debian/faad2@2.11.2-1?distro=trixie
purl pkg:deb/debian/faad2@2.11.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.11.2-1%3Fdistro=trixie
aliases CVE-2017-9256
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-53bt-akgh-nkb8
6
url VCID-5mun-g1fm-73aq
vulnerability_id VCID-5mun-g1fm-73aq
summary
Multiple vulnerabilities have been found in FAAD2, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20359
reference_id
reference_type
scores
0
value 0.00323
scoring_system epss
scoring_elements 0.55335
published_at 2026-05-07T12:55:00Z
1
value 0.00323
scoring_system epss
scoring_elements 0.55293
published_at 2026-05-05T12:55:00Z
2
value 0.00323
scoring_system epss
scoring_elements 0.5527
published_at 2026-04-01T12:55:00Z
3
value 0.00323
scoring_system epss
scoring_elements 0.55369
published_at 2026-04-02T12:55:00Z
4
value 0.00323
scoring_system epss
scoring_elements 0.55393
published_at 2026-04-13T12:55:00Z
5
value 0.00323
scoring_system epss
scoring_elements 0.55371
published_at 2026-04-26T12:55:00Z
6
value 0.00323
scoring_system epss
scoring_elements 0.55422
published_at 2026-04-09T12:55:00Z
7
value 0.00323
scoring_system epss
scoring_elements 0.55433
published_at 2026-04-18T12:55:00Z
8
value 0.00323
scoring_system epss
scoring_elements 0.55411
published_at 2026-04-21T12:55:00Z
9
value 0.00323
scoring_system epss
scoring_elements 0.55429
published_at 2026-04-16T12:55:00Z
10
value 0.00323
scoring_system epss
scoring_elements 0.5535
published_at 2026-04-24T12:55:00Z
11
value 0.00323
scoring_system epss
scoring_elements 0.55344
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20359
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19502
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19503
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19504
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20194
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20195
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20197
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20198
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20357
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20358
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20359
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20361
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20362
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15296
15
reference_url https://github.com/knik0/faad2/issues/29
reference_id
reference_type
scores
url https://github.com/knik0/faad2/issues/29
16
reference_url https://seclists.org/bugtraq/2019/Sep/28
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Sep/28
17
reference_url https://www.debian.org/security/2019/dsa-4522
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4522
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiocoding:freeware_advanced_audio_decoder_2:2.8.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:audiocoding:freeware_advanced_audio_decoder_2:2.8.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiocoding:freeware_advanced_audio_decoder_2:2.8.8:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-20359
reference_id CVE-2018-20359
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-20359
20
reference_url https://security.gentoo.org/glsa/202006-17
reference_id GLSA-202006-17
reference_type
scores
url https://security.gentoo.org/glsa/202006-17
fixed_packages
0
url pkg:deb/debian/faad2@2.8.8-2?distro=trixie
purl pkg:deb/debian/faad2@2.8.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.8.8-2%3Fdistro=trixie
1
url pkg:deb/debian/faad2@2.10.0-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.0-1%3Fdistro=trixie
2
url pkg:deb/debian/faad2@2.10.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.1-1%3Fdistro=trixie
3
url pkg:deb/debian/faad2@2.11.2-1?distro=trixie
purl pkg:deb/debian/faad2@2.11.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.11.2-1%3Fdistro=trixie
aliases CVE-2018-20359
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5mun-g1fm-73aq
7
url VCID-6dn6-jvsq-pudm
vulnerability_id VCID-6dn6-jvsq-pudm
summary
Multiple vulnerabilities have been found in FAAD2, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20198
reference_id
reference_type
scores
0
value 0.00329
scoring_system epss
scoring_elements 0.55779
published_at 2026-04-01T12:55:00Z
1
value 0.00329
scoring_system epss
scoring_elements 0.55892
published_at 2026-04-02T12:55:00Z
2
value 0.00329
scoring_system epss
scoring_elements 0.55914
published_at 2026-04-04T12:55:00Z
3
value 0.00329
scoring_system epss
scoring_elements 0.55893
published_at 2026-04-07T12:55:00Z
4
value 0.00329
scoring_system epss
scoring_elements 0.55943
published_at 2026-04-08T12:55:00Z
5
value 0.00329
scoring_system epss
scoring_elements 0.55945
published_at 2026-04-09T12:55:00Z
6
value 0.00329
scoring_system epss
scoring_elements 0.55955
published_at 2026-04-11T12:55:00Z
7
value 0.00329
scoring_system epss
scoring_elements 0.55935
published_at 2026-04-12T12:55:00Z
8
value 0.00329
scoring_system epss
scoring_elements 0.55917
published_at 2026-04-13T12:55:00Z
9
value 0.00329
scoring_system epss
scoring_elements 0.55953
published_at 2026-04-16T12:55:00Z
10
value 0.00329
scoring_system epss
scoring_elements 0.55956
published_at 2026-04-18T12:55:00Z
11
value 0.00329
scoring_system epss
scoring_elements 0.55931
published_at 2026-04-21T12:55:00Z
12
value 0.00329
scoring_system epss
scoring_elements 0.55857
published_at 2026-04-24T12:55:00Z
13
value 0.00329
scoring_system epss
scoring_elements 0.55875
published_at 2026-04-26T12:55:00Z
14
value 0.00329
scoring_system epss
scoring_elements 0.5585
published_at 2026-04-29T12:55:00Z
15
value 0.00329
scoring_system epss
scoring_elements 0.55792
published_at 2026-05-05T12:55:00Z
16
value 0.00329
scoring_system epss
scoring_elements 0.55839
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20198
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19502
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19503
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19504
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20194
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20195
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20197
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20198
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20357
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20358
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20359
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20361
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20362
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15296
15
reference_url https://security.gentoo.org/glsa/202006-17
reference_id GLSA-202006-17
reference_type
scores
url https://security.gentoo.org/glsa/202006-17
fixed_packages
0
url pkg:deb/debian/faad2@2.8.8-2?distro=trixie
purl pkg:deb/debian/faad2@2.8.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.8.8-2%3Fdistro=trixie
1
url pkg:deb/debian/faad2@2.10.0-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.0-1%3Fdistro=trixie
2
url pkg:deb/debian/faad2@2.10.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.1-1%3Fdistro=trixie
3
url pkg:deb/debian/faad2@2.11.2-1?distro=trixie
purl pkg:deb/debian/faad2@2.11.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.11.2-1%3Fdistro=trixie
aliases CVE-2018-20198
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6dn6-jvsq-pudm
8
url VCID-7vtd-6des-5fdj
vulnerability_id VCID-7vtd-6des-5fdj
summary Multiple denial of service vulnerabilities have been found in FAAD2.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38857
reference_id
reference_type
scores
0
value 0.00386
scoring_system epss
scoring_elements 0.59783
published_at 2026-05-07T12:55:00Z
1
value 0.00386
scoring_system epss
scoring_elements 0.59735
published_at 2026-05-05T12:55:00Z
2
value 0.00386
scoring_system epss
scoring_elements 0.59726
published_at 2026-04-02T12:55:00Z
3
value 0.00386
scoring_system epss
scoring_elements 0.59751
published_at 2026-04-04T12:55:00Z
4
value 0.00386
scoring_system epss
scoring_elements 0.59721
published_at 2026-04-07T12:55:00Z
5
value 0.00386
scoring_system epss
scoring_elements 0.59772
published_at 2026-04-29T12:55:00Z
6
value 0.00386
scoring_system epss
scoring_elements 0.59786
published_at 2026-04-09T12:55:00Z
7
value 0.00386
scoring_system epss
scoring_elements 0.59805
published_at 2026-04-11T12:55:00Z
8
value 0.00386
scoring_system epss
scoring_elements 0.5979
published_at 2026-04-12T12:55:00Z
9
value 0.00386
scoring_system epss
scoring_elements 0.59809
published_at 2026-04-16T12:55:00Z
10
value 0.00386
scoring_system epss
scoring_elements 0.59816
published_at 2026-04-18T12:55:00Z
11
value 0.00386
scoring_system epss
scoring_elements 0.59799
published_at 2026-04-21T12:55:00Z
12
value 0.00386
scoring_system epss
scoring_elements 0.59769
published_at 2026-04-24T12:55:00Z
13
value 0.00386
scoring_system epss
scoring_elements 0.59787
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38857
1
reference_url https://github.com/knik0/faad2/issues/171
reference_id 171
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-26T21:38:32Z/
url https://github.com/knik0/faad2/issues/171
2
reference_url https://security.gentoo.org/glsa/202401-13
reference_id GLSA-202401-13
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-26T21:38:32Z/
url https://security.gentoo.org/glsa/202401-13
3
reference_url https://usn.ubuntu.com/6313-1/
reference_id USN-6313-1
reference_type
scores
url https://usn.ubuntu.com/6313-1/
fixed_packages
0
url pkg:deb/debian/faad2@0?distro=trixie
purl pkg:deb/debian/faad2@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@0%3Fdistro=trixie
1
url pkg:deb/debian/faad2@2.10.0-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.0-1%3Fdistro=trixie
2
url pkg:deb/debian/faad2@2.10.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.1-1%3Fdistro=trixie
3
url pkg:deb/debian/faad2@2.11.2-1?distro=trixie
purl pkg:deb/debian/faad2@2.11.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.11.2-1%3Fdistro=trixie
aliases CVE-2023-38857
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7vtd-6des-5fdj
9
url VCID-867f-4yg1-bfdn
vulnerability_id VCID-867f-4yg1-bfdn
summary
Multiple vulnerabilities have been found in FAAD2, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20194
reference_id
reference_type
scores
0
value 0.00289
scoring_system epss
scoring_elements 0.52242
published_at 2026-04-01T12:55:00Z
1
value 0.00289
scoring_system epss
scoring_elements 0.52285
published_at 2026-04-02T12:55:00Z
2
value 0.00289
scoring_system epss
scoring_elements 0.52313
published_at 2026-04-04T12:55:00Z
3
value 0.00289
scoring_system epss
scoring_elements 0.52276
published_at 2026-04-07T12:55:00Z
4
value 0.00289
scoring_system epss
scoring_elements 0.52328
published_at 2026-04-26T12:55:00Z
5
value 0.00289
scoring_system epss
scoring_elements 0.52323
published_at 2026-04-09T12:55:00Z
6
value 0.00289
scoring_system epss
scoring_elements 0.52373
published_at 2026-04-11T12:55:00Z
7
value 0.00289
scoring_system epss
scoring_elements 0.52358
published_at 2026-04-12T12:55:00Z
8
value 0.00289
scoring_system epss
scoring_elements 0.52344
published_at 2026-04-13T12:55:00Z
9
value 0.00289
scoring_system epss
scoring_elements 0.52382
published_at 2026-04-16T12:55:00Z
10
value 0.00289
scoring_system epss
scoring_elements 0.52387
published_at 2026-04-18T12:55:00Z
11
value 0.00289
scoring_system epss
scoring_elements 0.52371
published_at 2026-04-21T12:55:00Z
12
value 0.00289
scoring_system epss
scoring_elements 0.52318
published_at 2026-04-24T12:55:00Z
13
value 0.00289
scoring_system epss
scoring_elements 0.52291
published_at 2026-04-29T12:55:00Z
14
value 0.00289
scoring_system epss
scoring_elements 0.52234
published_at 2026-05-05T12:55:00Z
15
value 0.00289
scoring_system epss
scoring_elements 0.52286
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20194
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19502
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19503
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19504
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20194
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20195
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20197
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20198
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20357
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20358
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20359
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20361
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20362
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15296
15
reference_url https://security.gentoo.org/glsa/202006-17
reference_id GLSA-202006-17
reference_type
scores
url https://security.gentoo.org/glsa/202006-17
fixed_packages
0
url pkg:deb/debian/faad2@2.8.8-2?distro=trixie
purl pkg:deb/debian/faad2@2.8.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.8.8-2%3Fdistro=trixie
1
url pkg:deb/debian/faad2@2.10.0-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.0-1%3Fdistro=trixie
2
url pkg:deb/debian/faad2@2.10.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.1-1%3Fdistro=trixie
3
url pkg:deb/debian/faad2@2.11.2-1?distro=trixie
purl pkg:deb/debian/faad2@2.11.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.11.2-1%3Fdistro=trixie
aliases CVE-2018-20194
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-867f-4yg1-bfdn
10
url VCID-8rem-57bh-tffv
vulnerability_id VCID-8rem-57bh-tffv
summary The mp4ff_read_ctts function in common/mp4ff/mp4atom.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.7 allows remote attackers to cause a denial of service (large loop and CPU consumption) via a crafted mp4 file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9257
reference_id
reference_type
scores
0
value 0.00258
scoring_system epss
scoring_elements 0.49121
published_at 2026-05-07T12:55:00Z
1
value 0.00258
scoring_system epss
scoring_elements 0.49111
published_at 2026-04-01T12:55:00Z
2
value 0.00258
scoring_system epss
scoring_elements 0.49144
published_at 2026-04-02T12:55:00Z
3
value 0.00258
scoring_system epss
scoring_elements 0.49173
published_at 2026-04-04T12:55:00Z
4
value 0.00258
scoring_system epss
scoring_elements 0.49124
published_at 2026-04-07T12:55:00Z
5
value 0.00258
scoring_system epss
scoring_elements 0.49179
published_at 2026-04-08T12:55:00Z
6
value 0.00258
scoring_system epss
scoring_elements 0.49176
published_at 2026-04-24T12:55:00Z
7
value 0.00258
scoring_system epss
scoring_elements 0.49193
published_at 2026-04-11T12:55:00Z
8
value 0.00258
scoring_system epss
scoring_elements 0.49167
published_at 2026-04-12T12:55:00Z
9
value 0.00258
scoring_system epss
scoring_elements 0.49172
published_at 2026-04-13T12:55:00Z
10
value 0.00258
scoring_system epss
scoring_elements 0.49218
published_at 2026-04-16T12:55:00Z
11
value 0.00258
scoring_system epss
scoring_elements 0.49216
published_at 2026-04-18T12:55:00Z
12
value 0.00258
scoring_system epss
scoring_elements 0.49186
published_at 2026-04-21T12:55:00Z
13
value 0.00258
scoring_system epss
scoring_elements 0.49185
published_at 2026-04-26T12:55:00Z
14
value 0.00258
scoring_system epss
scoring_elements 0.49142
published_at 2026-04-29T12:55:00Z
15
value 0.00258
scoring_system epss
scoring_elements 0.49058
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9257
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9257
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867724
reference_id 867724
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867724
3
reference_url https://security.archlinux.org/AVG-328
reference_id AVG-328
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-328
fixed_packages
0
url pkg:deb/debian/faad2@2.8.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.8.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.8.1-1%3Fdistro=trixie
1
url pkg:deb/debian/faad2@2.10.0-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.0-1%3Fdistro=trixie
2
url pkg:deb/debian/faad2@2.10.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.1-1%3Fdistro=trixie
3
url pkg:deb/debian/faad2@2.11.2-1?distro=trixie
purl pkg:deb/debian/faad2@2.11.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.11.2-1%3Fdistro=trixie
aliases CVE-2017-9257
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8rem-57bh-tffv
11
url VCID-a78p-kvvr-6yev
vulnerability_id VCID-a78p-kvvr-6yev
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-32278
reference_id
reference_type
scores
0
value 0.00217
scoring_system epss
scoring_elements 0.44024
published_at 2026-05-07T12:55:00Z
1
value 0.00217
scoring_system epss
scoring_elements 0.4419
published_at 2026-04-01T12:55:00Z
2
value 0.00217
scoring_system epss
scoring_elements 0.44257
published_at 2026-04-02T12:55:00Z
3
value 0.00217
scoring_system epss
scoring_elements 0.4428
published_at 2026-04-04T12:55:00Z
4
value 0.00217
scoring_system epss
scoring_elements 0.44212
published_at 2026-04-07T12:55:00Z
5
value 0.00217
scoring_system epss
scoring_elements 0.44264
published_at 2026-04-08T12:55:00Z
6
value 0.00217
scoring_system epss
scoring_elements 0.44269
published_at 2026-04-09T12:55:00Z
7
value 0.00217
scoring_system epss
scoring_elements 0.44287
published_at 2026-04-11T12:55:00Z
8
value 0.00217
scoring_system epss
scoring_elements 0.44254
published_at 2026-04-13T12:55:00Z
9
value 0.00217
scoring_system epss
scoring_elements 0.44313
published_at 2026-04-16T12:55:00Z
10
value 0.00217
scoring_system epss
scoring_elements 0.44304
published_at 2026-04-18T12:55:00Z
11
value 0.00217
scoring_system epss
scoring_elements 0.44231
published_at 2026-04-21T12:55:00Z
12
value 0.00217
scoring_system epss
scoring_elements 0.4415
published_at 2026-04-24T12:55:00Z
13
value 0.00217
scoring_system epss
scoring_elements 0.44153
published_at 2026-04-26T12:55:00Z
14
value 0.00217
scoring_system epss
scoring_elements 0.4407
published_at 2026-04-29T12:55:00Z
15
value 0.00217
scoring_system epss
scoring_elements 0.43947
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-32278
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20199
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20360
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6956
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32272
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32272
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32273
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32274
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32274
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32276
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32276
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32277
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32278
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32278
11
reference_url https://security.archlinux.org/AVG-2403
reference_id AVG-2403
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2403
12
reference_url https://usn.ubuntu.com/6313-1/
reference_id USN-6313-1
reference_type
scores
url https://usn.ubuntu.com/6313-1/
fixed_packages
0
url pkg:deb/debian/faad2@2.10.0-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.0-1%3Fdistro=trixie
1
url pkg:deb/debian/faad2@2.10.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.1-1%3Fdistro=trixie
2
url pkg:deb/debian/faad2@2.11.2-1?distro=trixie
purl pkg:deb/debian/faad2@2.11.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.11.2-1%3Fdistro=trixie
aliases CVE-2021-32278
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a78p-kvvr-6yev
12
url VCID-amm7-4bpv-qqbq
vulnerability_id VCID-amm7-4bpv-qqbq
summary
Multiple vulnerabilities have been found in FAAD2, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-19503
reference_id
reference_type
scores
0
value 0.00395
scoring_system epss
scoring_elements 0.60237
published_at 2026-04-01T12:55:00Z
1
value 0.00395
scoring_system epss
scoring_elements 0.60314
published_at 2026-04-02T12:55:00Z
2
value 0.00395
scoring_system epss
scoring_elements 0.60339
published_at 2026-04-04T12:55:00Z
3
value 0.00395
scoring_system epss
scoring_elements 0.60307
published_at 2026-04-07T12:55:00Z
4
value 0.00395
scoring_system epss
scoring_elements 0.60357
published_at 2026-04-08T12:55:00Z
5
value 0.00395
scoring_system epss
scoring_elements 0.60372
published_at 2026-04-09T12:55:00Z
6
value 0.00395
scoring_system epss
scoring_elements 0.60393
published_at 2026-04-11T12:55:00Z
7
value 0.00395
scoring_system epss
scoring_elements 0.6038
published_at 2026-04-12T12:55:00Z
8
value 0.00395
scoring_system epss
scoring_elements 0.6036
published_at 2026-04-13T12:55:00Z
9
value 0.00395
scoring_system epss
scoring_elements 0.60401
published_at 2026-04-16T12:55:00Z
10
value 0.00395
scoring_system epss
scoring_elements 0.6041
published_at 2026-04-18T12:55:00Z
11
value 0.00395
scoring_system epss
scoring_elements 0.60402
published_at 2026-04-21T12:55:00Z
12
value 0.00395
scoring_system epss
scoring_elements 0.60385
published_at 2026-04-24T12:55:00Z
13
value 0.00395
scoring_system epss
scoring_elements 0.60399
published_at 2026-04-26T12:55:00Z
14
value 0.00395
scoring_system epss
scoring_elements 0.60386
published_at 2026-04-29T12:55:00Z
15
value 0.00395
scoring_system epss
scoring_elements 0.60344
published_at 2026-05-05T12:55:00Z
16
value 0.00395
scoring_system epss
scoring_elements 0.6039
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-19503
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19502
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19503
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19504
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20194
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20195
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20197
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20198
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20357
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20358
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20359
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20361
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20362
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15296
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914641
reference_id 914641
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914641
16
reference_url https://security.gentoo.org/glsa/202006-17
reference_id GLSA-202006-17
reference_type
scores
url https://security.gentoo.org/glsa/202006-17
fixed_packages
0
url pkg:deb/debian/faad2@2.8.8-2?distro=trixie
purl pkg:deb/debian/faad2@2.8.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.8.8-2%3Fdistro=trixie
1
url pkg:deb/debian/faad2@2.10.0-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.0-1%3Fdistro=trixie
2
url pkg:deb/debian/faad2@2.10.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.1-1%3Fdistro=trixie
3
url pkg:deb/debian/faad2@2.11.2-1?distro=trixie
purl pkg:deb/debian/faad2@2.11.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.11.2-1%3Fdistro=trixie
aliases CVE-2018-19503
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-amm7-4bpv-qqbq
13
url VCID-b2jx-kqkj-t7a3
vulnerability_id VCID-b2jx-kqkj-t7a3
summary The mp4ff_read_stsd function in common/mp4ff/mp4atom.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.7 allows remote attackers to cause a denial of service (large loop and CPU consumption) via a crafted mp4 file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9253
reference_id
reference_type
scores
0
value 0.00258
scoring_system epss
scoring_elements 0.49121
published_at 2026-05-07T12:55:00Z
1
value 0.00258
scoring_system epss
scoring_elements 0.49111
published_at 2026-04-01T12:55:00Z
2
value 0.00258
scoring_system epss
scoring_elements 0.49144
published_at 2026-04-02T12:55:00Z
3
value 0.00258
scoring_system epss
scoring_elements 0.49173
published_at 2026-04-04T12:55:00Z
4
value 0.00258
scoring_system epss
scoring_elements 0.49124
published_at 2026-04-07T12:55:00Z
5
value 0.00258
scoring_system epss
scoring_elements 0.49179
published_at 2026-04-08T12:55:00Z
6
value 0.00258
scoring_system epss
scoring_elements 0.49176
published_at 2026-04-24T12:55:00Z
7
value 0.00258
scoring_system epss
scoring_elements 0.49193
published_at 2026-04-11T12:55:00Z
8
value 0.00258
scoring_system epss
scoring_elements 0.49167
published_at 2026-04-12T12:55:00Z
9
value 0.00258
scoring_system epss
scoring_elements 0.49172
published_at 2026-04-13T12:55:00Z
10
value 0.00258
scoring_system epss
scoring_elements 0.49218
published_at 2026-04-16T12:55:00Z
11
value 0.00258
scoring_system epss
scoring_elements 0.49216
published_at 2026-04-18T12:55:00Z
12
value 0.00258
scoring_system epss
scoring_elements 0.49186
published_at 2026-04-21T12:55:00Z
13
value 0.00258
scoring_system epss
scoring_elements 0.49185
published_at 2026-04-26T12:55:00Z
14
value 0.00258
scoring_system epss
scoring_elements 0.49142
published_at 2026-04-29T12:55:00Z
15
value 0.00258
scoring_system epss
scoring_elements 0.49058
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9253
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9253
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9253
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867724
reference_id 867724
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867724
3
reference_url https://security.archlinux.org/AVG-328
reference_id AVG-328
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-328
fixed_packages
0
url pkg:deb/debian/faad2@2.8.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.8.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.8.1-1%3Fdistro=trixie
1
url pkg:deb/debian/faad2@2.10.0-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.0-1%3Fdistro=trixie
2
url pkg:deb/debian/faad2@2.10.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.1-1%3Fdistro=trixie
3
url pkg:deb/debian/faad2@2.11.2-1?distro=trixie
purl pkg:deb/debian/faad2@2.11.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.11.2-1%3Fdistro=trixie
aliases CVE-2017-9253
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b2jx-kqkj-t7a3
14
url VCID-b97n-ccje-pfbt
vulnerability_id VCID-b97n-ccje-pfbt
summary
Multiple vulnerabilities have been found in FAAD2, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-19504
reference_id
reference_type
scores
0
value 0.00322
scoring_system epss
scoring_elements 0.55172
published_at 2026-04-01T12:55:00Z
1
value 0.00322
scoring_system epss
scoring_elements 0.55272
published_at 2026-04-02T12:55:00Z
2
value 0.00322
scoring_system epss
scoring_elements 0.55296
published_at 2026-04-04T12:55:00Z
3
value 0.00322
scoring_system epss
scoring_elements 0.55277
published_at 2026-04-26T12:55:00Z
4
value 0.00322
scoring_system epss
scoring_elements 0.55328
published_at 2026-04-09T12:55:00Z
5
value 0.00322
scoring_system epss
scoring_elements 0.5534
published_at 2026-04-11T12:55:00Z
6
value 0.00322
scoring_system epss
scoring_elements 0.55318
published_at 2026-04-12T12:55:00Z
7
value 0.00322
scoring_system epss
scoring_elements 0.553
published_at 2026-04-13T12:55:00Z
8
value 0.00322
scoring_system epss
scoring_elements 0.55336
published_at 2026-04-16T12:55:00Z
9
value 0.00322
scoring_system epss
scoring_elements 0.55341
published_at 2026-04-18T12:55:00Z
10
value 0.00322
scoring_system epss
scoring_elements 0.55319
published_at 2026-04-21T12:55:00Z
11
value 0.00322
scoring_system epss
scoring_elements 0.55256
published_at 2026-04-24T12:55:00Z
12
value 0.00322
scoring_system epss
scoring_elements 0.5525
published_at 2026-04-29T12:55:00Z
13
value 0.00322
scoring_system epss
scoring_elements 0.55199
published_at 2026-05-05T12:55:00Z
14
value 0.00322
scoring_system epss
scoring_elements 0.55242
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-19504
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19502
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19503
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19504
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20194
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20195
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20197
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20198
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20357
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20358
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20359
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20361
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20362
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15296
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914641
reference_id 914641
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914641
16
reference_url https://security.gentoo.org/glsa/202006-17
reference_id GLSA-202006-17
reference_type
scores
url https://security.gentoo.org/glsa/202006-17
fixed_packages
0
url pkg:deb/debian/faad2@2.8.8-2?distro=trixie
purl pkg:deb/debian/faad2@2.8.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.8.8-2%3Fdistro=trixie
1
url pkg:deb/debian/faad2@2.10.0-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.0-1%3Fdistro=trixie
2
url pkg:deb/debian/faad2@2.10.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.1-1%3Fdistro=trixie
3
url pkg:deb/debian/faad2@2.11.2-1?distro=trixie
purl pkg:deb/debian/faad2@2.11.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.11.2-1%3Fdistro=trixie
aliases CVE-2018-19504
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b97n-ccje-pfbt
15
url VCID-chcg-rgqj-53bz
vulnerability_id VCID-chcg-rgqj-53bz
summary The mp4ff_read_mdhd function in common/mp4ff/mp4atom.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.7 allows remote attackers to cause a denial of service (invalid memory read and application crash) via a crafted mp4 file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9221
reference_id
reference_type
scores
0
value 0.00241
scoring_system epss
scoring_elements 0.47316
published_at 2026-05-07T12:55:00Z
1
value 0.00241
scoring_system epss
scoring_elements 0.47325
published_at 2026-04-01T12:55:00Z
2
value 0.00241
scoring_system epss
scoring_elements 0.47361
published_at 2026-04-02T12:55:00Z
3
value 0.00241
scoring_system epss
scoring_elements 0.47382
published_at 2026-04-12T12:55:00Z
4
value 0.00241
scoring_system epss
scoring_elements 0.47331
published_at 2026-04-07T12:55:00Z
5
value 0.00241
scoring_system epss
scoring_elements 0.47386
published_at 2026-04-08T12:55:00Z
6
value 0.00241
scoring_system epss
scoring_elements 0.47383
published_at 2026-04-09T12:55:00Z
7
value 0.00241
scoring_system epss
scoring_elements 0.47408
published_at 2026-04-11T12:55:00Z
8
value 0.00241
scoring_system epss
scoring_elements 0.47389
published_at 2026-04-13T12:55:00Z
9
value 0.00241
scoring_system epss
scoring_elements 0.47448
published_at 2026-04-16T12:55:00Z
10
value 0.00241
scoring_system epss
scoring_elements 0.47441
published_at 2026-04-18T12:55:00Z
11
value 0.00241
scoring_system epss
scoring_elements 0.47392
published_at 2026-04-21T12:55:00Z
12
value 0.00241
scoring_system epss
scoring_elements 0.47378
published_at 2026-04-24T12:55:00Z
13
value 0.00241
scoring_system epss
scoring_elements 0.47387
published_at 2026-04-26T12:55:00Z
14
value 0.00241
scoring_system epss
scoring_elements 0.47334
published_at 2026-04-29T12:55:00Z
15
value 0.00241
scoring_system epss
scoring_elements 0.47252
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9221
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9221
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9221
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867724
reference_id 867724
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867724
3
reference_url https://security.archlinux.org/AVG-328
reference_id AVG-328
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-328
fixed_packages
0
url pkg:deb/debian/faad2@2.8.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.8.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.8.1-1%3Fdistro=trixie
1
url pkg:deb/debian/faad2@2.10.0-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.0-1%3Fdistro=trixie
2
url pkg:deb/debian/faad2@2.10.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.1-1%3Fdistro=trixie
3
url pkg:deb/debian/faad2@2.11.2-1?distro=trixie
purl pkg:deb/debian/faad2@2.11.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.11.2-1%3Fdistro=trixie
aliases CVE-2017-9221
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-chcg-rgqj-53bz
16
url VCID-d1b3-e4zt-43hb
vulnerability_id VCID-d1b3-e4zt-43hb
summary
Multiple vulnerabilities have been found in FAAD2, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-6956
reference_id
reference_type
scores
0
value 0.00354
scoring_system epss
scoring_elements 0.57678
published_at 2026-05-05T12:55:00Z
1
value 0.00354
scoring_system epss
scoring_elements 0.57742
published_at 2026-04-26T12:55:00Z
2
value 0.00354
scoring_system epss
scoring_elements 0.57721
published_at 2026-04-29T12:55:00Z
3
value 0.00354
scoring_system epss
scoring_elements 0.57652
published_at 2026-04-01T12:55:00Z
4
value 0.00354
scoring_system epss
scoring_elements 0.57736
published_at 2026-04-02T12:55:00Z
5
value 0.00354
scoring_system epss
scoring_elements 0.57757
published_at 2026-04-04T12:55:00Z
6
value 0.00354
scoring_system epss
scoring_elements 0.57731
published_at 2026-04-07T12:55:00Z
7
value 0.00354
scoring_system epss
scoring_elements 0.57786
published_at 2026-04-08T12:55:00Z
8
value 0.00354
scoring_system epss
scoring_elements 0.57788
published_at 2026-04-18T12:55:00Z
9
value 0.00354
scoring_system epss
scoring_elements 0.57805
published_at 2026-04-11T12:55:00Z
10
value 0.00354
scoring_system epss
scoring_elements 0.57783
published_at 2026-04-12T12:55:00Z
11
value 0.00354
scoring_system epss
scoring_elements 0.57761
published_at 2026-04-13T12:55:00Z
12
value 0.00354
scoring_system epss
scoring_elements 0.5779
published_at 2026-04-16T12:55:00Z
13
value 0.00354
scoring_system epss
scoring_elements 0.57764
published_at 2026-04-21T12:55:00Z
14
value 0.00354
scoring_system epss
scoring_elements 0.57722
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-6956
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20199
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20360
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6956
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32272
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32272
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32273
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32274
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32274
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32276
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32276
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32277
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32278
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32278
11
reference_url https://github.com/TeamSeri0us/pocs/blob/master/faad/global-buffer-overflow%40ps_mix_phase.md
reference_id
reference_type
scores
url https://github.com/TeamSeri0us/pocs/blob/master/faad/global-buffer-overflow%40ps_mix_phase.md
12
reference_url https://lists.debian.org/debian-lts-announce/2019/08/msg00033.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/08/msg00033.html
13
reference_url https://lists.debian.org/debian-lts-announce/2021/10/msg00020.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2021/10/msg00020.html
14
reference_url https://sourceforge.net/p/faac/bugs/240/
reference_id
reference_type
scores
url https://sourceforge.net/p/faac/bugs/240/
15
reference_url https://www.debian.org/security/2022/dsa-5109
reference_id
reference_type
scores
url https://www.debian.org/security/2022/dsa-5109
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914641
reference_id 914641
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914641
17
reference_url https://security.archlinux.org/AVG-2660
reference_id AVG-2660
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2660
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiocoding:freeware_advanced_audio_decoder_2:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:audiocoding:freeware_advanced_audio_decoder_2:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiocoding:freeware_advanced_audio_decoder_2:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-6956
reference_id CVE-2019-6956
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:P
1
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-6956
23
reference_url https://security.gentoo.org/glsa/202006-17
reference_id GLSA-202006-17
reference_type
scores
url https://security.gentoo.org/glsa/202006-17
fixed_packages
0
url pkg:deb/debian/faad2@2.8.8-3.1?distro=trixie
purl pkg:deb/debian/faad2@2.8.8-3.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.8.8-3.1%3Fdistro=trixie
1
url pkg:deb/debian/faad2@2.10.0-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.0-1%3Fdistro=trixie
2
url pkg:deb/debian/faad2@2.10.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.1-1%3Fdistro=trixie
3
url pkg:deb/debian/faad2@2.11.2-1?distro=trixie
purl pkg:deb/debian/faad2@2.11.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.11.2-1%3Fdistro=trixie
aliases CVE-2019-6956
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d1b3-e4zt-43hb
17
url VCID-ds21-j4p7-vuch
vulnerability_id VCID-ds21-j4p7-vuch
summary
Multiple vulnerabilities have been found in FAAD2, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20197
reference_id
reference_type
scores
0
value 0.00311
scoring_system epss
scoring_elements 0.54189
published_at 2026-04-01T12:55:00Z
1
value 0.00311
scoring_system epss
scoring_elements 0.54209
published_at 2026-04-02T12:55:00Z
2
value 0.00311
scoring_system epss
scoring_elements 0.54239
published_at 2026-04-04T12:55:00Z
3
value 0.00311
scoring_system epss
scoring_elements 0.54215
published_at 2026-04-07T12:55:00Z
4
value 0.00311
scoring_system epss
scoring_elements 0.54267
published_at 2026-04-08T12:55:00Z
5
value 0.00311
scoring_system epss
scoring_elements 0.54262
published_at 2026-04-09T12:55:00Z
6
value 0.00311
scoring_system epss
scoring_elements 0.54312
published_at 2026-04-11T12:55:00Z
7
value 0.00311
scoring_system epss
scoring_elements 0.54294
published_at 2026-04-12T12:55:00Z
8
value 0.00311
scoring_system epss
scoring_elements 0.54272
published_at 2026-04-13T12:55:00Z
9
value 0.00311
scoring_system epss
scoring_elements 0.54311
published_at 2026-04-16T12:55:00Z
10
value 0.00311
scoring_system epss
scoring_elements 0.54316
published_at 2026-04-18T12:55:00Z
11
value 0.00311
scoring_system epss
scoring_elements 0.54296
published_at 2026-04-21T12:55:00Z
12
value 0.00311
scoring_system epss
scoring_elements 0.54259
published_at 2026-04-24T12:55:00Z
13
value 0.00311
scoring_system epss
scoring_elements 0.54274
published_at 2026-04-26T12:55:00Z
14
value 0.00311
scoring_system epss
scoring_elements 0.5425
published_at 2026-04-29T12:55:00Z
15
value 0.00311
scoring_system epss
scoring_elements 0.542
published_at 2026-05-05T12:55:00Z
16
value 0.00311
scoring_system epss
scoring_elements 0.54243
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20197
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19502
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19503
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19504
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20194
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20195
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20197
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20198
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20357
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20358
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20359
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20361
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20362
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15296
15
reference_url https://security.gentoo.org/glsa/202006-17
reference_id GLSA-202006-17
reference_type
scores
url https://security.gentoo.org/glsa/202006-17
fixed_packages
0
url pkg:deb/debian/faad2@2.8.8-2?distro=trixie
purl pkg:deb/debian/faad2@2.8.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.8.8-2%3Fdistro=trixie
1
url pkg:deb/debian/faad2@2.10.0-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.0-1%3Fdistro=trixie
2
url pkg:deb/debian/faad2@2.10.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.1-1%3Fdistro=trixie
3
url pkg:deb/debian/faad2@2.11.2-1?distro=trixie
purl pkg:deb/debian/faad2@2.11.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.11.2-1%3Fdistro=trixie
aliases CVE-2018-20197
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ds21-j4p7-vuch
18
url VCID-efzv-dpsf-4bdj
vulnerability_id VCID-efzv-dpsf-4bdj
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-32272
reference_id
reference_type
scores
0
value 0.00275
scoring_system epss
scoring_elements 0.50882
published_at 2026-05-07T12:55:00Z
1
value 0.00275
scoring_system epss
scoring_elements 0.50863
published_at 2026-04-01T12:55:00Z
2
value 0.00275
scoring_system epss
scoring_elements 0.50921
published_at 2026-04-02T12:55:00Z
3
value 0.00275
scoring_system epss
scoring_elements 0.50947
published_at 2026-04-04T12:55:00Z
4
value 0.00275
scoring_system epss
scoring_elements 0.50905
published_at 2026-04-07T12:55:00Z
5
value 0.00275
scoring_system epss
scoring_elements 0.50962
published_at 2026-04-08T12:55:00Z
6
value 0.00275
scoring_system epss
scoring_elements 0.50959
published_at 2026-04-09T12:55:00Z
7
value 0.00275
scoring_system epss
scoring_elements 0.51001
published_at 2026-04-11T12:55:00Z
8
value 0.00275
scoring_system epss
scoring_elements 0.5098
published_at 2026-04-12T12:55:00Z
9
value 0.00275
scoring_system epss
scoring_elements 0.50964
published_at 2026-04-13T12:55:00Z
10
value 0.00275
scoring_system epss
scoring_elements 0.51002
published_at 2026-04-16T12:55:00Z
11
value 0.00275
scoring_system epss
scoring_elements 0.51008
published_at 2026-04-18T12:55:00Z
12
value 0.00275
scoring_system epss
scoring_elements 0.50987
published_at 2026-04-21T12:55:00Z
13
value 0.00275
scoring_system epss
scoring_elements 0.50933
published_at 2026-04-24T12:55:00Z
14
value 0.00275
scoring_system epss
scoring_elements 0.50941
published_at 2026-04-26T12:55:00Z
15
value 0.00275
scoring_system epss
scoring_elements 0.50903
published_at 2026-04-29T12:55:00Z
16
value 0.00275
scoring_system epss
scoring_elements 0.50829
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-32272
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20199
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20360
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6956
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32272
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32272
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32273
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32274
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32274
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32276
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32276
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32277
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32278
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32278
11
reference_url https://security.archlinux.org/AVG-2403
reference_id AVG-2403
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2403
12
reference_url https://usn.ubuntu.com/6313-1/
reference_id USN-6313-1
reference_type
scores
url https://usn.ubuntu.com/6313-1/
fixed_packages
0
url pkg:deb/debian/faad2@2.10.0-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.0-1%3Fdistro=trixie
1
url pkg:deb/debian/faad2@2.10.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.1-1%3Fdistro=trixie
2
url pkg:deb/debian/faad2@2.11.2-1?distro=trixie
purl pkg:deb/debian/faad2@2.11.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.11.2-1%3Fdistro=trixie
aliases CVE-2021-32272
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-efzv-dpsf-4bdj
19
url VCID-g81z-k4p8-kkfy
vulnerability_id VCID-g81z-k4p8-kkfy
summary The mp4ff_read_stsd function in common/mp4ff/mp4atom.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.7 allows remote attackers to cause a denial of service (invalid memory read and application crash) via a crafted mp4 file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9218
reference_id
reference_type
scores
0
value 0.00241
scoring_system epss
scoring_elements 0.47316
published_at 2026-05-07T12:55:00Z
1
value 0.00241
scoring_system epss
scoring_elements 0.47325
published_at 2026-04-01T12:55:00Z
2
value 0.00241
scoring_system epss
scoring_elements 0.47361
published_at 2026-04-02T12:55:00Z
3
value 0.00241
scoring_system epss
scoring_elements 0.47382
published_at 2026-04-12T12:55:00Z
4
value 0.00241
scoring_system epss
scoring_elements 0.47331
published_at 2026-04-07T12:55:00Z
5
value 0.00241
scoring_system epss
scoring_elements 0.47386
published_at 2026-04-08T12:55:00Z
6
value 0.00241
scoring_system epss
scoring_elements 0.47383
published_at 2026-04-09T12:55:00Z
7
value 0.00241
scoring_system epss
scoring_elements 0.47408
published_at 2026-04-11T12:55:00Z
8
value 0.00241
scoring_system epss
scoring_elements 0.47389
published_at 2026-04-13T12:55:00Z
9
value 0.00241
scoring_system epss
scoring_elements 0.47448
published_at 2026-04-16T12:55:00Z
10
value 0.00241
scoring_system epss
scoring_elements 0.47441
published_at 2026-04-18T12:55:00Z
11
value 0.00241
scoring_system epss
scoring_elements 0.47392
published_at 2026-04-21T12:55:00Z
12
value 0.00241
scoring_system epss
scoring_elements 0.47378
published_at 2026-04-24T12:55:00Z
13
value 0.00241
scoring_system epss
scoring_elements 0.47387
published_at 2026-04-26T12:55:00Z
14
value 0.00241
scoring_system epss
scoring_elements 0.47334
published_at 2026-04-29T12:55:00Z
15
value 0.00241
scoring_system epss
scoring_elements 0.47252
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9218
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9218
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867724
reference_id 867724
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867724
3
reference_url https://security.archlinux.org/AVG-328
reference_id AVG-328
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-328
fixed_packages
0
url pkg:deb/debian/faad2@2.8.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.8.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.8.1-1%3Fdistro=trixie
1
url pkg:deb/debian/faad2@2.10.0-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.0-1%3Fdistro=trixie
2
url pkg:deb/debian/faad2@2.10.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.1-1%3Fdistro=trixie
3
url pkg:deb/debian/faad2@2.11.2-1?distro=trixie
purl pkg:deb/debian/faad2@2.11.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.11.2-1%3Fdistro=trixie
aliases CVE-2017-9218
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g81z-k4p8-kkfy
20
url VCID-g8jn-gecn-3kbh
vulnerability_id VCID-g8jn-gecn-3kbh
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-32277
reference_id
reference_type
scores
0
value 0.00166
scoring_system epss
scoring_elements 0.37213
published_at 2026-05-07T12:55:00Z
1
value 0.00166
scoring_system epss
scoring_elements 0.37541
published_at 2026-04-01T12:55:00Z
2
value 0.00166
scoring_system epss
scoring_elements 0.37722
published_at 2026-04-02T12:55:00Z
3
value 0.00166
scoring_system epss
scoring_elements 0.37747
published_at 2026-04-04T12:55:00Z
4
value 0.00166
scoring_system epss
scoring_elements 0.37625
published_at 2026-04-07T12:55:00Z
5
value 0.00166
scoring_system epss
scoring_elements 0.37676
published_at 2026-04-08T12:55:00Z
6
value 0.00166
scoring_system epss
scoring_elements 0.3769
published_at 2026-04-09T12:55:00Z
7
value 0.00166
scoring_system epss
scoring_elements 0.37703
published_at 2026-04-11T12:55:00Z
8
value 0.00166
scoring_system epss
scoring_elements 0.37669
published_at 2026-04-12T12:55:00Z
9
value 0.00166
scoring_system epss
scoring_elements 0.37641
published_at 2026-04-13T12:55:00Z
10
value 0.00166
scoring_system epss
scoring_elements 0.37688
published_at 2026-04-16T12:55:00Z
11
value 0.00166
scoring_system epss
scoring_elements 0.3767
published_at 2026-04-18T12:55:00Z
12
value 0.00166
scoring_system epss
scoring_elements 0.37608
published_at 2026-04-21T12:55:00Z
13
value 0.00166
scoring_system epss
scoring_elements 0.37371
published_at 2026-04-24T12:55:00Z
14
value 0.00166
scoring_system epss
scoring_elements 0.37352
published_at 2026-04-26T12:55:00Z
15
value 0.00166
scoring_system epss
scoring_elements 0.37263
published_at 2026-04-29T12:55:00Z
16
value 0.00166
scoring_system epss
scoring_elements 0.37146
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-32277
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20199
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20360
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6956
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32272
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32272
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32273
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32274
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32274
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32276
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32276
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32277
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32278
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32278
11
reference_url https://security.archlinux.org/AVG-2403
reference_id AVG-2403
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2403
12
reference_url https://usn.ubuntu.com/6313-1/
reference_id USN-6313-1
reference_type
scores
url https://usn.ubuntu.com/6313-1/
fixed_packages
0
url pkg:deb/debian/faad2@2.10.0-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.0-1%3Fdistro=trixie
1
url pkg:deb/debian/faad2@2.10.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.1-1%3Fdistro=trixie
2
url pkg:deb/debian/faad2@2.11.2-1?distro=trixie
purl pkg:deb/debian/faad2@2.11.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.11.2-1%3Fdistro=trixie
aliases CVE-2021-32277
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g8jn-gecn-3kbh
21
url VCID-hdpz-xtwf-pucb
vulnerability_id VCID-hdpz-xtwf-pucb
summary The mp4ff_read_stts function in common/mp4ff/mp4atom.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.7 allows remote attackers to cause a denial of service (invalid memory read and application crash) via a crafted mp4 file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9223
reference_id
reference_type
scores
0
value 0.00241
scoring_system epss
scoring_elements 0.47316
published_at 2026-05-07T12:55:00Z
1
value 0.00241
scoring_system epss
scoring_elements 0.47325
published_at 2026-04-01T12:55:00Z
2
value 0.00241
scoring_system epss
scoring_elements 0.47361
published_at 2026-04-02T12:55:00Z
3
value 0.00241
scoring_system epss
scoring_elements 0.47382
published_at 2026-04-12T12:55:00Z
4
value 0.00241
scoring_system epss
scoring_elements 0.47331
published_at 2026-04-07T12:55:00Z
5
value 0.00241
scoring_system epss
scoring_elements 0.47386
published_at 2026-04-08T12:55:00Z
6
value 0.00241
scoring_system epss
scoring_elements 0.47383
published_at 2026-04-09T12:55:00Z
7
value 0.00241
scoring_system epss
scoring_elements 0.47408
published_at 2026-04-11T12:55:00Z
8
value 0.00241
scoring_system epss
scoring_elements 0.47389
published_at 2026-04-13T12:55:00Z
9
value 0.00241
scoring_system epss
scoring_elements 0.47448
published_at 2026-04-16T12:55:00Z
10
value 0.00241
scoring_system epss
scoring_elements 0.47441
published_at 2026-04-18T12:55:00Z
11
value 0.00241
scoring_system epss
scoring_elements 0.47392
published_at 2026-04-21T12:55:00Z
12
value 0.00241
scoring_system epss
scoring_elements 0.47378
published_at 2026-04-24T12:55:00Z
13
value 0.00241
scoring_system epss
scoring_elements 0.47387
published_at 2026-04-26T12:55:00Z
14
value 0.00241
scoring_system epss
scoring_elements 0.47334
published_at 2026-04-29T12:55:00Z
15
value 0.00241
scoring_system epss
scoring_elements 0.47252
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9223
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9223
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867724
reference_id 867724
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867724
3
reference_url https://security.archlinux.org/AVG-328
reference_id AVG-328
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-328
fixed_packages
0
url pkg:deb/debian/faad2@2.8.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.8.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.8.1-1%3Fdistro=trixie
1
url pkg:deb/debian/faad2@2.10.0-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.0-1%3Fdistro=trixie
2
url pkg:deb/debian/faad2@2.10.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.1-1%3Fdistro=trixie
3
url pkg:deb/debian/faad2@2.11.2-1?distro=trixie
purl pkg:deb/debian/faad2@2.11.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.11.2-1%3Fdistro=trixie
aliases CVE-2017-9223
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hdpz-xtwf-pucb
22
url VCID-he5k-ga6q-tqch
vulnerability_id VCID-he5k-ga6q-tqch
summary The mp4ff_read_stts function in common/mp4ff/mp4atom.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.7 allows remote attackers to cause a denial of service (large loop and CPU consumption) via a crafted mp4 file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9254
reference_id
reference_type
scores
0
value 0.00258
scoring_system epss
scoring_elements 0.49121
published_at 2026-05-07T12:55:00Z
1
value 0.00258
scoring_system epss
scoring_elements 0.49111
published_at 2026-04-01T12:55:00Z
2
value 0.00258
scoring_system epss
scoring_elements 0.49144
published_at 2026-04-02T12:55:00Z
3
value 0.00258
scoring_system epss
scoring_elements 0.49173
published_at 2026-04-04T12:55:00Z
4
value 0.00258
scoring_system epss
scoring_elements 0.49124
published_at 2026-04-07T12:55:00Z
5
value 0.00258
scoring_system epss
scoring_elements 0.49179
published_at 2026-04-08T12:55:00Z
6
value 0.00258
scoring_system epss
scoring_elements 0.49176
published_at 2026-04-24T12:55:00Z
7
value 0.00258
scoring_system epss
scoring_elements 0.49193
published_at 2026-04-11T12:55:00Z
8
value 0.00258
scoring_system epss
scoring_elements 0.49167
published_at 2026-04-12T12:55:00Z
9
value 0.00258
scoring_system epss
scoring_elements 0.49172
published_at 2026-04-13T12:55:00Z
10
value 0.00258
scoring_system epss
scoring_elements 0.49218
published_at 2026-04-16T12:55:00Z
11
value 0.00258
scoring_system epss
scoring_elements 0.49216
published_at 2026-04-18T12:55:00Z
12
value 0.00258
scoring_system epss
scoring_elements 0.49186
published_at 2026-04-21T12:55:00Z
13
value 0.00258
scoring_system epss
scoring_elements 0.49185
published_at 2026-04-26T12:55:00Z
14
value 0.00258
scoring_system epss
scoring_elements 0.49142
published_at 2026-04-29T12:55:00Z
15
value 0.00258
scoring_system epss
scoring_elements 0.49058
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9254
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9254
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867724
reference_id 867724
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867724
3
reference_url https://security.archlinux.org/AVG-328
reference_id AVG-328
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-328
fixed_packages
0
url pkg:deb/debian/faad2@2.8.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.8.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.8.1-1%3Fdistro=trixie
1
url pkg:deb/debian/faad2@2.10.0-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.0-1%3Fdistro=trixie
2
url pkg:deb/debian/faad2@2.10.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.1-1%3Fdistro=trixie
3
url pkg:deb/debian/faad2@2.11.2-1?distro=trixie
purl pkg:deb/debian/faad2@2.11.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.11.2-1%3Fdistro=trixie
aliases CVE-2017-9254
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-he5k-ga6q-tqch
23
url VCID-j1wx-21jw-8qcb
vulnerability_id VCID-j1wx-21jw-8qcb
summary
Multiple vulnerabilities have been found in FAAD2, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20360
reference_id
reference_type
scores
0
value 0.005
scoring_system epss
scoring_elements 0.66051
published_at 2026-05-07T12:55:00Z
1
value 0.005
scoring_system epss
scoring_elements 0.66029
published_at 2026-04-29T12:55:00Z
2
value 0.005
scoring_system epss
scoring_elements 0.66005
published_at 2026-05-05T12:55:00Z
3
value 0.005
scoring_system epss
scoring_elements 0.65887
published_at 2026-04-01T12:55:00Z
4
value 0.005
scoring_system epss
scoring_elements 0.65928
published_at 2026-04-02T12:55:00Z
5
value 0.005
scoring_system epss
scoring_elements 0.65958
published_at 2026-04-04T12:55:00Z
6
value 0.005
scoring_system epss
scoring_elements 0.65925
published_at 2026-04-07T12:55:00Z
7
value 0.005
scoring_system epss
scoring_elements 0.65976
published_at 2026-04-08T12:55:00Z
8
value 0.005
scoring_system epss
scoring_elements 0.65988
published_at 2026-04-09T12:55:00Z
9
value 0.005
scoring_system epss
scoring_elements 0.66007
published_at 2026-04-11T12:55:00Z
10
value 0.005
scoring_system epss
scoring_elements 0.65994
published_at 2026-04-12T12:55:00Z
11
value 0.005
scoring_system epss
scoring_elements 0.65964
published_at 2026-04-13T12:55:00Z
12
value 0.005
scoring_system epss
scoring_elements 0.65998
published_at 2026-04-16T12:55:00Z
13
value 0.005
scoring_system epss
scoring_elements 0.66012
published_at 2026-04-18T12:55:00Z
14
value 0.005
scoring_system epss
scoring_elements 0.66
published_at 2026-04-21T12:55:00Z
15
value 0.005
scoring_system epss
scoring_elements 0.66019
published_at 2026-04-24T12:55:00Z
16
value 0.005
scoring_system epss
scoring_elements 0.66031
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20360
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20199
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20360
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6956
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32272
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32272
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32273
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32274
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32274
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32276
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32276
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32277
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32278
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32278
11
reference_url https://github.com/knik0/faad2/issues/32
reference_id
reference_type
scores
url https://github.com/knik0/faad2/issues/32
12
reference_url https://lists.debian.org/debian-lts-announce/2019/08/msg00033.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/08/msg00033.html
13
reference_url https://lists.debian.org/debian-lts-announce/2021/10/msg00020.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2021/10/msg00020.html
14
reference_url https://www.debian.org/security/2022/dsa-5109
reference_id
reference_type
scores
url https://www.debian.org/security/2022/dsa-5109
15
reference_url https://security.archlinux.org/AVG-2660
reference_id AVG-2660
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2660
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiocoding:freeware_advanced_audio_decoder_2:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:audiocoding:freeware_advanced_audio_decoder_2:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiocoding:freeware_advanced_audio_decoder_2:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-20360
reference_id CVE-2018-20360
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-20360
21
reference_url https://security.gentoo.org/glsa/202006-17
reference_id GLSA-202006-17
reference_type
scores
url https://security.gentoo.org/glsa/202006-17
fixed_packages
0
url pkg:deb/debian/faad2@2.8.8-3.1?distro=trixie
purl pkg:deb/debian/faad2@2.8.8-3.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.8.8-3.1%3Fdistro=trixie
1
url pkg:deb/debian/faad2@2.10.0-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.0-1%3Fdistro=trixie
2
url pkg:deb/debian/faad2@2.10.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.1-1%3Fdistro=trixie
3
url pkg:deb/debian/faad2@2.11.2-1?distro=trixie
purl pkg:deb/debian/faad2@2.11.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.11.2-1%3Fdistro=trixie
aliases CVE-2018-20360
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j1wx-21jw-8qcb
24
url VCID-j7wp-941h-p3fc
vulnerability_id VCID-j7wp-941h-p3fc
summary
Multiple vulnerabilities in xine-lib might result in the remote execution
    of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5244
reference_id
reference_type
scores
0
value 0.00435
scoring_system epss
scoring_elements 0.62991
published_at 2026-05-07T12:55:00Z
1
value 0.00435
scoring_system epss
scoring_elements 0.62825
published_at 2026-04-01T12:55:00Z
2
value 0.00435
scoring_system epss
scoring_elements 0.62883
published_at 2026-04-02T12:55:00Z
3
value 0.00435
scoring_system epss
scoring_elements 0.62913
published_at 2026-04-04T12:55:00Z
4
value 0.00435
scoring_system epss
scoring_elements 0.62876
published_at 2026-04-07T12:55:00Z
5
value 0.00435
scoring_system epss
scoring_elements 0.62927
published_at 2026-04-08T12:55:00Z
6
value 0.00435
scoring_system epss
scoring_elements 0.62943
published_at 2026-04-09T12:55:00Z
7
value 0.00435
scoring_system epss
scoring_elements 0.62962
published_at 2026-04-11T12:55:00Z
8
value 0.00435
scoring_system epss
scoring_elements 0.6295
published_at 2026-04-12T12:55:00Z
9
value 0.00435
scoring_system epss
scoring_elements 0.62928
published_at 2026-04-13T12:55:00Z
10
value 0.00435
scoring_system epss
scoring_elements 0.62968
published_at 2026-04-16T12:55:00Z
11
value 0.00435
scoring_system epss
scoring_elements 0.62976
published_at 2026-04-18T12:55:00Z
12
value 0.00435
scoring_system epss
scoring_elements 0.62955
published_at 2026-04-21T12:55:00Z
13
value 0.00435
scoring_system epss
scoring_elements 0.62975
published_at 2026-04-24T12:55:00Z
14
value 0.00435
scoring_system epss
scoring_elements 0.6299
published_at 2026-04-29T12:55:00Z
15
value 0.00435
scoring_system epss
scoring_elements 0.62945
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5244
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5244
3
reference_url http://securitytracker.com/id?1020703
reference_id
reference_type
scores
url http://securitytracker.com/id?1020703
4
reference_url http://sourceforge.net/project/shownotes.php?release_id=619869
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?release_id=619869
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=407010
reference_id 407010
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=407010
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.14:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5244
reference_id CVE-2008-5244
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-5244
56
reference_url https://security.gentoo.org/glsa/201006-04
reference_id GLSA-201006-04
reference_type
scores
url https://security.gentoo.org/glsa/201006-04
57
reference_url https://usn.ubuntu.com/710-1/
reference_id USN-710-1
reference_type
scores
url https://usn.ubuntu.com/710-1/
fixed_packages
0
url pkg:deb/debian/faad2@2.6.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.6.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.6.1-1%3Fdistro=trixie
1
url pkg:deb/debian/faad2@2.10.0-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.0-1%3Fdistro=trixie
2
url pkg:deb/debian/faad2@2.10.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.1-1%3Fdistro=trixie
3
url pkg:deb/debian/faad2@2.11.2-1?distro=trixie
purl pkg:deb/debian/faad2@2.11.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.11.2-1%3Fdistro=trixie
aliases CVE-2008-5244
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j7wp-941h-p3fc
25
url VCID-rjqt-nghm-euab
vulnerability_id VCID-rjqt-nghm-euab
summary The mp4ff_parse_tag function in common/mp4ff/mp4meta.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.7 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted mp4 file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9222
reference_id
reference_type
scores
0
value 0.00258
scoring_system epss
scoring_elements 0.49121
published_at 2026-05-07T12:55:00Z
1
value 0.00258
scoring_system epss
scoring_elements 0.49111
published_at 2026-04-01T12:55:00Z
2
value 0.00258
scoring_system epss
scoring_elements 0.49144
published_at 2026-04-02T12:55:00Z
3
value 0.00258
scoring_system epss
scoring_elements 0.49173
published_at 2026-04-04T12:55:00Z
4
value 0.00258
scoring_system epss
scoring_elements 0.49124
published_at 2026-04-07T12:55:00Z
5
value 0.00258
scoring_system epss
scoring_elements 0.49179
published_at 2026-04-08T12:55:00Z
6
value 0.00258
scoring_system epss
scoring_elements 0.49176
published_at 2026-04-24T12:55:00Z
7
value 0.00258
scoring_system epss
scoring_elements 0.49193
published_at 2026-04-11T12:55:00Z
8
value 0.00258
scoring_system epss
scoring_elements 0.49167
published_at 2026-04-12T12:55:00Z
9
value 0.00258
scoring_system epss
scoring_elements 0.49172
published_at 2026-04-13T12:55:00Z
10
value 0.00258
scoring_system epss
scoring_elements 0.49218
published_at 2026-04-16T12:55:00Z
11
value 0.00258
scoring_system epss
scoring_elements 0.49216
published_at 2026-04-18T12:55:00Z
12
value 0.00258
scoring_system epss
scoring_elements 0.49186
published_at 2026-04-21T12:55:00Z
13
value 0.00258
scoring_system epss
scoring_elements 0.49185
published_at 2026-04-26T12:55:00Z
14
value 0.00258
scoring_system epss
scoring_elements 0.49142
published_at 2026-04-29T12:55:00Z
15
value 0.00258
scoring_system epss
scoring_elements 0.49058
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9222
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9222
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867724
reference_id 867724
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867724
3
reference_url https://security.archlinux.org/AVG-328
reference_id AVG-328
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-328
fixed_packages
0
url pkg:deb/debian/faad2@2.8.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.8.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.8.1-1%3Fdistro=trixie
1
url pkg:deb/debian/faad2@2.10.0-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.0-1%3Fdistro=trixie
2
url pkg:deb/debian/faad2@2.10.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.1-1%3Fdistro=trixie
3
url pkg:deb/debian/faad2@2.11.2-1?distro=trixie
purl pkg:deb/debian/faad2@2.11.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.11.2-1%3Fdistro=trixie
aliases CVE-2017-9222
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rjqt-nghm-euab
26
url VCID-sqeu-hewu-h3ex
vulnerability_id VCID-sqeu-hewu-h3ex
summary
A buffer overflow in FAAD2 might lead to user-assisted execution of
    arbitrary code via an MP4 file.
references
0
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=499899
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=499899
1
reference_url http://bugs.gentoo.org/attachment.cgi?id=166174&action=view
reference_id
reference_type
scores
url http://bugs.gentoo.org/attachment.cgi?id=166174&action=view
2
reference_url http://bugs.gentoo.org/show_bug.cgi?id=238445
reference_id
reference_type
scores
url http://bugs.gentoo.org/show_bug.cgi?id=238445
3
reference_url http://osvdb.org/48349
reference_id
reference_type
scores
url http://osvdb.org/48349
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4201
reference_id
reference_type
scores
0
value 0.0655
scoring_system epss
scoring_elements 0.912
published_at 2026-05-07T12:55:00Z
1
value 0.0655
scoring_system epss
scoring_elements 0.91087
published_at 2026-04-01T12:55:00Z
2
value 0.0655
scoring_system epss
scoring_elements 0.91092
published_at 2026-04-02T12:55:00Z
3
value 0.0655
scoring_system epss
scoring_elements 0.91101
published_at 2026-04-04T12:55:00Z
4
value 0.0655
scoring_system epss
scoring_elements 0.91109
published_at 2026-04-07T12:55:00Z
5
value 0.0655
scoring_system epss
scoring_elements 0.91122
published_at 2026-04-08T12:55:00Z
6
value 0.0655
scoring_system epss
scoring_elements 0.91128
published_at 2026-04-09T12:55:00Z
7
value 0.0655
scoring_system epss
scoring_elements 0.91135
published_at 2026-04-11T12:55:00Z
8
value 0.0655
scoring_system epss
scoring_elements 0.91137
published_at 2026-04-12T12:55:00Z
9
value 0.0655
scoring_system epss
scoring_elements 0.91136
published_at 2026-04-13T12:55:00Z
10
value 0.0655
scoring_system epss
scoring_elements 0.9116
published_at 2026-04-18T12:55:00Z
11
value 0.0655
scoring_system epss
scoring_elements 0.91164
published_at 2026-04-21T12:55:00Z
12
value 0.0655
scoring_system epss
scoring_elements 0.91178
published_at 2026-04-24T12:55:00Z
13
value 0.0655
scoring_system epss
scoring_elements 0.91175
published_at 2026-04-26T12:55:00Z
14
value 0.0655
scoring_system epss
scoring_elements 0.91171
published_at 2026-04-29T12:55:00Z
15
value 0.0655
scoring_system epss
scoring_elements 0.91184
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4201
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4201
6
reference_url http://secunia.com/advisories/32006
reference_id
reference_type
scores
url http://secunia.com/advisories/32006
7
reference_url http://secunia.com/advisories/32661
reference_id
reference_type
scores
url http://secunia.com/advisories/32661
8
reference_url http://security.gentoo.org/glsa/glsa-200811-03.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200811-03.xml
9
reference_url http://www.audiocoding.com/archive.html
reference_id
reference_type
scores
url http://www.audiocoding.com/archive.html
10
reference_url http://www.audiocoding.com/patch/main_overflow.diff
reference_id
reference_type
scores
url http://www.audiocoding.com/patch/main_overflow.diff
11
reference_url http://www.openwall.com/lists/oss-security/2008/09/24/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/09/24/6
12
reference_url http://www.securityfocus.com/bid/31219
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/31219
13
reference_url http://www.vupen.com/english/advisories/2008/2601
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2601
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=499899
reference_id 499899
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=499899
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiocoding:faad2:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:audiocoding:faad2:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiocoding:faad2:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiocoding:faad2:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:audiocoding:faad2:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiocoding:faad2:1.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiocoding:faad2:2.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:audiocoding:faad2:2.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiocoding:faad2:2.0:rc1:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiocoding:faad2:2.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:audiocoding:faad2:2.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiocoding:faad2:2.0:rc2:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiocoding:faad2:2.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:audiocoding:faad2:2.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiocoding:faad2:2.0:rc3:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiocoding:faad2:2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:audiocoding:faad2:2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiocoding:faad2:2.5:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4201
reference_id CVE-2008-4201
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-4201
22
reference_url https://security.gentoo.org/glsa/200811-03
reference_id GLSA-200811-03
reference_type
scores
url https://security.gentoo.org/glsa/200811-03
fixed_packages
0
url pkg:deb/debian/faad2@2.6.1-3.1?distro=trixie
purl pkg:deb/debian/faad2@2.6.1-3.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.6.1-3.1%3Fdistro=trixie
1
url pkg:deb/debian/faad2@2.10.0-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.0-1%3Fdistro=trixie
2
url pkg:deb/debian/faad2@2.10.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.1-1%3Fdistro=trixie
3
url pkg:deb/debian/faad2@2.11.2-1?distro=trixie
purl pkg:deb/debian/faad2@2.11.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.11.2-1%3Fdistro=trixie
aliases CVE-2008-4201
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sqeu-hewu-h3ex
27
url VCID-srqt-j35t-23gx
vulnerability_id VCID-srqt-j35t-23gx
summary
Multiple vulnerabilities have been found in FAAD2, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-19502
reference_id
reference_type
scores
0
value 0.00298
scoring_system epss
scoring_elements 0.53133
published_at 2026-04-01T12:55:00Z
1
value 0.00298
scoring_system epss
scoring_elements 0.53157
published_at 2026-04-02T12:55:00Z
2
value 0.00298
scoring_system epss
scoring_elements 0.53181
published_at 2026-04-04T12:55:00Z
3
value 0.00298
scoring_system epss
scoring_elements 0.5315
published_at 2026-04-07T12:55:00Z
4
value 0.00298
scoring_system epss
scoring_elements 0.53203
published_at 2026-04-08T12:55:00Z
5
value 0.00298
scoring_system epss
scoring_elements 0.53197
published_at 2026-04-09T12:55:00Z
6
value 0.00298
scoring_system epss
scoring_elements 0.53248
published_at 2026-04-11T12:55:00Z
7
value 0.00298
scoring_system epss
scoring_elements 0.53234
published_at 2026-04-12T12:55:00Z
8
value 0.00298
scoring_system epss
scoring_elements 0.53217
published_at 2026-04-13T12:55:00Z
9
value 0.00298
scoring_system epss
scoring_elements 0.53254
published_at 2026-04-16T12:55:00Z
10
value 0.00298
scoring_system epss
scoring_elements 0.53261
published_at 2026-04-18T12:55:00Z
11
value 0.00298
scoring_system epss
scoring_elements 0.53241
published_at 2026-04-21T12:55:00Z
12
value 0.00298
scoring_system epss
scoring_elements 0.53212
published_at 2026-04-24T12:55:00Z
13
value 0.00298
scoring_system epss
scoring_elements 0.53224
published_at 2026-04-26T12:55:00Z
14
value 0.00298
scoring_system epss
scoring_elements 0.53187
published_at 2026-04-29T12:55:00Z
15
value 0.00298
scoring_system epss
scoring_elements 0.53144
published_at 2026-05-05T12:55:00Z
16
value 0.00298
scoring_system epss
scoring_elements 0.53196
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-19502
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19502
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19503
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19504
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20194
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20195
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20197
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20198
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20357
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20358
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20359
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20361
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20362
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15296
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914641
reference_id 914641
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914641
16
reference_url https://security.gentoo.org/glsa/202006-17
reference_id GLSA-202006-17
reference_type
scores
url https://security.gentoo.org/glsa/202006-17
fixed_packages
0
url pkg:deb/debian/faad2@2.8.8-3?distro=trixie
purl pkg:deb/debian/faad2@2.8.8-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.8.8-3%3Fdistro=trixie
1
url pkg:deb/debian/faad2@2.10.0-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.0-1%3Fdistro=trixie
2
url pkg:deb/debian/faad2@2.10.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.1-1%3Fdistro=trixie
3
url pkg:deb/debian/faad2@2.11.2-1?distro=trixie
purl pkg:deb/debian/faad2@2.11.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.11.2-1%3Fdistro=trixie
aliases CVE-2018-19502
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-srqt-j35t-23gx
28
url VCID-susc-yxw7-nuhq
vulnerability_id VCID-susc-yxw7-nuhq
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-32276
reference_id
reference_type
scores
0
value 0.00106
scoring_system epss
scoring_elements 0.2833
published_at 2026-05-07T12:55:00Z
1
value 0.00106
scoring_system epss
scoring_elements 0.28828
published_at 2026-04-01T12:55:00Z
2
value 0.00106
scoring_system epss
scoring_elements 0.28909
published_at 2026-04-02T12:55:00Z
3
value 0.00106
scoring_system epss
scoring_elements 0.28959
published_at 2026-04-04T12:55:00Z
4
value 0.00106
scoring_system epss
scoring_elements 0.28766
published_at 2026-04-07T12:55:00Z
5
value 0.00106
scoring_system epss
scoring_elements 0.28832
published_at 2026-04-08T12:55:00Z
6
value 0.00106
scoring_system epss
scoring_elements 0.28873
published_at 2026-04-09T12:55:00Z
7
value 0.00106
scoring_system epss
scoring_elements 0.28879
published_at 2026-04-11T12:55:00Z
8
value 0.00106
scoring_system epss
scoring_elements 0.28834
published_at 2026-04-12T12:55:00Z
9
value 0.00106
scoring_system epss
scoring_elements 0.28784
published_at 2026-04-13T12:55:00Z
10
value 0.00106
scoring_system epss
scoring_elements 0.28804
published_at 2026-04-16T12:55:00Z
11
value 0.00106
scoring_system epss
scoring_elements 0.28781
published_at 2026-04-18T12:55:00Z
12
value 0.00106
scoring_system epss
scoring_elements 0.28731
published_at 2026-04-21T12:55:00Z
13
value 0.00106
scoring_system epss
scoring_elements 0.28617
published_at 2026-04-24T12:55:00Z
14
value 0.00106
scoring_system epss
scoring_elements 0.28504
published_at 2026-04-26T12:55:00Z
15
value 0.00106
scoring_system epss
scoring_elements 0.28431
published_at 2026-04-29T12:55:00Z
16
value 0.00106
scoring_system epss
scoring_elements 0.28273
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-32276
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20199
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20360
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6956
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32272
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32272
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32273
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32274
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32274
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32276
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32276
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32277
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32278
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32278
11
reference_url https://security.archlinux.org/AVG-2403
reference_id AVG-2403
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2403
12
reference_url https://usn.ubuntu.com/6313-1/
reference_id USN-6313-1
reference_type
scores
url https://usn.ubuntu.com/6313-1/
fixed_packages
0
url pkg:deb/debian/faad2@2.10.0-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.0-1%3Fdistro=trixie
1
url pkg:deb/debian/faad2@2.10.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.1-1%3Fdistro=trixie
2
url pkg:deb/debian/faad2@2.11.2-1?distro=trixie
purl pkg:deb/debian/faad2@2.11.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.11.2-1%3Fdistro=trixie
aliases CVE-2021-32276
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-susc-yxw7-nuhq
29
url VCID-suvg-gvkm-guhk
vulnerability_id VCID-suvg-gvkm-guhk
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-32273
reference_id
reference_type
scores
0
value 0.00147
scoring_system epss
scoring_elements 0.34764
published_at 2026-05-07T12:55:00Z
1
value 0.00147
scoring_system epss
scoring_elements 0.35061
published_at 2026-04-01T12:55:00Z
2
value 0.00147
scoring_system epss
scoring_elements 0.35261
published_at 2026-04-02T12:55:00Z
3
value 0.00147
scoring_system epss
scoring_elements 0.35289
published_at 2026-04-04T12:55:00Z
4
value 0.00147
scoring_system epss
scoring_elements 0.3517
published_at 2026-04-07T12:55:00Z
5
value 0.00147
scoring_system epss
scoring_elements 0.35215
published_at 2026-04-08T12:55:00Z
6
value 0.00147
scoring_system epss
scoring_elements 0.3524
published_at 2026-04-09T12:55:00Z
7
value 0.00147
scoring_system epss
scoring_elements 0.35244
published_at 2026-04-11T12:55:00Z
8
value 0.00147
scoring_system epss
scoring_elements 0.35209
published_at 2026-04-12T12:55:00Z
9
value 0.00147
scoring_system epss
scoring_elements 0.35185
published_at 2026-04-13T12:55:00Z
10
value 0.00147
scoring_system epss
scoring_elements 0.35224
published_at 2026-04-16T12:55:00Z
11
value 0.00147
scoring_system epss
scoring_elements 0.3521
published_at 2026-04-18T12:55:00Z
12
value 0.00147
scoring_system epss
scoring_elements 0.35161
published_at 2026-04-21T12:55:00Z
13
value 0.00147
scoring_system epss
scoring_elements 0.34927
published_at 2026-04-24T12:55:00Z
14
value 0.00147
scoring_system epss
scoring_elements 0.34909
published_at 2026-04-26T12:55:00Z
15
value 0.00147
scoring_system epss
scoring_elements 0.34819
published_at 2026-04-29T12:55:00Z
16
value 0.00147
scoring_system epss
scoring_elements 0.34692
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-32273
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20199
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20360
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6956
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32272
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32272
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32273
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32274
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32274
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32276
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32276
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32277
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32278
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32278
11
reference_url https://security.archlinux.org/AVG-2403
reference_id AVG-2403
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2403
12
reference_url https://usn.ubuntu.com/6313-1/
reference_id USN-6313-1
reference_type
scores
url https://usn.ubuntu.com/6313-1/
fixed_packages
0
url pkg:deb/debian/faad2@2.10.0-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.0-1%3Fdistro=trixie
1
url pkg:deb/debian/faad2@2.10.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.1-1%3Fdistro=trixie
2
url pkg:deb/debian/faad2@2.11.2-1?distro=trixie
purl pkg:deb/debian/faad2@2.11.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.11.2-1%3Fdistro=trixie
aliases CVE-2021-32273
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-suvg-gvkm-guhk
30
url VCID-tjyx-zh49-pufn
vulnerability_id VCID-tjyx-zh49-pufn
summary
Multiple vulnerabilities have been found in FAAD2, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20196
reference_id
reference_type
scores
0
value 0.00333
scoring_system epss
scoring_elements 0.56123
published_at 2026-05-07T12:55:00Z
1
value 0.00333
scoring_system epss
scoring_elements 0.5606
published_at 2026-04-01T12:55:00Z
2
value 0.00333
scoring_system epss
scoring_elements 0.5617
published_at 2026-04-07T12:55:00Z
3
value 0.00333
scoring_system epss
scoring_elements 0.5619
published_at 2026-04-04T12:55:00Z
4
value 0.00333
scoring_system epss
scoring_elements 0.56221
published_at 2026-04-08T12:55:00Z
5
value 0.00333
scoring_system epss
scoring_elements 0.56227
published_at 2026-04-09T12:55:00Z
6
value 0.00333
scoring_system epss
scoring_elements 0.56237
published_at 2026-04-11T12:55:00Z
7
value 0.00333
scoring_system epss
scoring_elements 0.56213
published_at 2026-04-12T12:55:00Z
8
value 0.00333
scoring_system epss
scoring_elements 0.56196
published_at 2026-04-13T12:55:00Z
9
value 0.00333
scoring_system epss
scoring_elements 0.56229
published_at 2026-04-16T12:55:00Z
10
value 0.00333
scoring_system epss
scoring_elements 0.56231
published_at 2026-04-18T12:55:00Z
11
value 0.00333
scoring_system epss
scoring_elements 0.56199
published_at 2026-04-21T12:55:00Z
12
value 0.00333
scoring_system epss
scoring_elements 0.56124
published_at 2026-04-24T12:55:00Z
13
value 0.00333
scoring_system epss
scoring_elements 0.56146
published_at 2026-04-26T12:55:00Z
14
value 0.00333
scoring_system epss
scoring_elements 0.56121
published_at 2026-04-29T12:55:00Z
15
value 0.00333
scoring_system epss
scoring_elements 0.56074
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20196
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19502
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19503
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19504
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20194
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20195
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20197
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20198
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20199
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20357
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20358
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20359
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20360
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20361
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20362
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15296
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6956
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32272
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32272
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32273
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32274
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32274
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32276
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32276
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32277
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32278
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32278
24
reference_url https://security.archlinux.org/AVG-2660
reference_id AVG-2660
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2660
25
reference_url https://security.gentoo.org/glsa/202006-17
reference_id GLSA-202006-17
reference_type
scores
url https://security.gentoo.org/glsa/202006-17
fixed_packages
0
url pkg:deb/debian/faad2@2.8.8-3.1?distro=trixie
purl pkg:deb/debian/faad2@2.8.8-3.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.8.8-3.1%3Fdistro=trixie
1
url pkg:deb/debian/faad2@2.10.0-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.0-1%3Fdistro=trixie
2
url pkg:deb/debian/faad2@2.10.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.1-1%3Fdistro=trixie
3
url pkg:deb/debian/faad2@2.11.2-1?distro=trixie
purl pkg:deb/debian/faad2@2.11.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.11.2-1%3Fdistro=trixie
aliases CVE-2018-20196
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tjyx-zh49-pufn
31
url VCID-vbv2-cdkz-7qe8
vulnerability_id VCID-vbv2-cdkz-7qe8
summary The mp4ff_read_stco function in common/mp4ff/mp4atom.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.7 allows remote attackers to cause a denial of service (memory allocation error) via a crafted mp4 file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9220
reference_id
reference_type
scores
0
value 0.00241
scoring_system epss
scoring_elements 0.47316
published_at 2026-05-07T12:55:00Z
1
value 0.00241
scoring_system epss
scoring_elements 0.47325
published_at 2026-04-01T12:55:00Z
2
value 0.00241
scoring_system epss
scoring_elements 0.47361
published_at 2026-04-02T12:55:00Z
3
value 0.00241
scoring_system epss
scoring_elements 0.47382
published_at 2026-04-12T12:55:00Z
4
value 0.00241
scoring_system epss
scoring_elements 0.47331
published_at 2026-04-07T12:55:00Z
5
value 0.00241
scoring_system epss
scoring_elements 0.47386
published_at 2026-04-08T12:55:00Z
6
value 0.00241
scoring_system epss
scoring_elements 0.47383
published_at 2026-04-09T12:55:00Z
7
value 0.00241
scoring_system epss
scoring_elements 0.47408
published_at 2026-04-11T12:55:00Z
8
value 0.00241
scoring_system epss
scoring_elements 0.47389
published_at 2026-04-13T12:55:00Z
9
value 0.00241
scoring_system epss
scoring_elements 0.47448
published_at 2026-04-16T12:55:00Z
10
value 0.00241
scoring_system epss
scoring_elements 0.47441
published_at 2026-04-18T12:55:00Z
11
value 0.00241
scoring_system epss
scoring_elements 0.47392
published_at 2026-04-21T12:55:00Z
12
value 0.00241
scoring_system epss
scoring_elements 0.47378
published_at 2026-04-24T12:55:00Z
13
value 0.00241
scoring_system epss
scoring_elements 0.47387
published_at 2026-04-26T12:55:00Z
14
value 0.00241
scoring_system epss
scoring_elements 0.47334
published_at 2026-04-29T12:55:00Z
15
value 0.00241
scoring_system epss
scoring_elements 0.47252
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9220
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9220
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867724
reference_id 867724
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867724
3
reference_url https://security.archlinux.org/AVG-328
reference_id AVG-328
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-328
fixed_packages
0
url pkg:deb/debian/faad2@2.8.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.8.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.8.1-1%3Fdistro=trixie
1
url pkg:deb/debian/faad2@2.10.0-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.0-1%3Fdistro=trixie
2
url pkg:deb/debian/faad2@2.10.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.1-1%3Fdistro=trixie
3
url pkg:deb/debian/faad2@2.11.2-1?distro=trixie
purl pkg:deb/debian/faad2@2.11.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.11.2-1%3Fdistro=trixie
aliases CVE-2017-9220
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vbv2-cdkz-7qe8
32
url VCID-vhp5-hmgq-ebgd
vulnerability_id VCID-vhp5-hmgq-ebgd
summary
Multiple vulnerabilities have been found in FAAD2, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20358
reference_id
reference_type
scores
0
value 0.00323
scoring_system epss
scoring_elements 0.55335
published_at 2026-05-07T12:55:00Z
1
value 0.00323
scoring_system epss
scoring_elements 0.55293
published_at 2026-05-05T12:55:00Z
2
value 0.00323
scoring_system epss
scoring_elements 0.5527
published_at 2026-04-01T12:55:00Z
3
value 0.00323
scoring_system epss
scoring_elements 0.55369
published_at 2026-04-02T12:55:00Z
4
value 0.00323
scoring_system epss
scoring_elements 0.55393
published_at 2026-04-13T12:55:00Z
5
value 0.00323
scoring_system epss
scoring_elements 0.55371
published_at 2026-04-26T12:55:00Z
6
value 0.00323
scoring_system epss
scoring_elements 0.55422
published_at 2026-04-09T12:55:00Z
7
value 0.00323
scoring_system epss
scoring_elements 0.55433
published_at 2026-04-18T12:55:00Z
8
value 0.00323
scoring_system epss
scoring_elements 0.55411
published_at 2026-04-21T12:55:00Z
9
value 0.00323
scoring_system epss
scoring_elements 0.55429
published_at 2026-04-16T12:55:00Z
10
value 0.00323
scoring_system epss
scoring_elements 0.5535
published_at 2026-04-24T12:55:00Z
11
value 0.00323
scoring_system epss
scoring_elements 0.55344
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20358
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19502
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19503
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19504
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20194
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20195
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20197
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20198
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20357
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20358
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20359
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20361
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20362
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15296
15
reference_url https://github.com/knik0/faad2/issues/31
reference_id
reference_type
scores
url https://github.com/knik0/faad2/issues/31
16
reference_url https://seclists.org/bugtraq/2019/Sep/28
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Sep/28
17
reference_url https://www.debian.org/security/2019/dsa-4522
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4522
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiocoding:freeware_advanced_audio_decoder_2:2.8.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:audiocoding:freeware_advanced_audio_decoder_2:2.8.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiocoding:freeware_advanced_audio_decoder_2:2.8.8:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-20358
reference_id CVE-2018-20358
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-20358
20
reference_url https://security.gentoo.org/glsa/202006-17
reference_id GLSA-202006-17
reference_type
scores
url https://security.gentoo.org/glsa/202006-17
fixed_packages
0
url pkg:deb/debian/faad2@2.8.8-2?distro=trixie
purl pkg:deb/debian/faad2@2.8.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.8.8-2%3Fdistro=trixie
1
url pkg:deb/debian/faad2@2.10.0-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.0-1%3Fdistro=trixie
2
url pkg:deb/debian/faad2@2.10.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.1-1%3Fdistro=trixie
3
url pkg:deb/debian/faad2@2.11.2-1?distro=trixie
purl pkg:deb/debian/faad2@2.11.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.11.2-1%3Fdistro=trixie
aliases CVE-2018-20358
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vhp5-hmgq-ebgd
33
url VCID-ygzc-6m9h-cqgp
vulnerability_id VCID-ygzc-6m9h-cqgp
summary Multiple denial of service vulnerabilities have been found in FAAD2.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38858
reference_id
reference_type
scores
0
value 0.00671
scoring_system epss
scoring_elements 0.71308
published_at 2026-04-02T12:55:00Z
1
value 0.00671
scoring_system epss
scoring_elements 0.71326
published_at 2026-04-04T12:55:00Z
2
value 0.00671
scoring_system epss
scoring_elements 0.71301
published_at 2026-04-07T12:55:00Z
3
value 0.00671
scoring_system epss
scoring_elements 0.71342
published_at 2026-04-08T12:55:00Z
4
value 0.00671
scoring_system epss
scoring_elements 0.71355
published_at 2026-04-09T12:55:00Z
5
value 0.00671
scoring_system epss
scoring_elements 0.71378
published_at 2026-04-21T12:55:00Z
6
value 0.00671
scoring_system epss
scoring_elements 0.71363
published_at 2026-04-12T12:55:00Z
7
value 0.00671
scoring_system epss
scoring_elements 0.71346
published_at 2026-04-13T12:55:00Z
8
value 0.00671
scoring_system epss
scoring_elements 0.71392
published_at 2026-04-16T12:55:00Z
9
value 0.00671
scoring_system epss
scoring_elements 0.71398
published_at 2026-04-18T12:55:00Z
10
value 0.00671
scoring_system epss
scoring_elements 0.7143
published_at 2026-04-24T12:55:00Z
11
value 0.00671
scoring_system epss
scoring_elements 0.71437
published_at 2026-04-26T12:55:00Z
12
value 0.00671
scoring_system epss
scoring_elements 0.71442
published_at 2026-04-29T12:55:00Z
13
value 0.00671
scoring_system epss
scoring_elements 0.71429
published_at 2026-05-05T12:55:00Z
14
value 0.00671
scoring_system epss
scoring_elements 0.71464
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38858
1
reference_url https://security.gentoo.org/glsa/202401-13
reference_id GLSA-202401-13
reference_type
scores
url https://security.gentoo.org/glsa/202401-13
2
reference_url https://usn.ubuntu.com/6313-1/
reference_id USN-6313-1
reference_type
scores
url https://usn.ubuntu.com/6313-1/
fixed_packages
0
url pkg:deb/debian/faad2@0?distro=trixie
purl pkg:deb/debian/faad2@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@0%3Fdistro=trixie
1
url pkg:deb/debian/faad2@2.10.0-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.0-1%3Fdistro=trixie
2
url pkg:deb/debian/faad2@2.10.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.1-1%3Fdistro=trixie
3
url pkg:deb/debian/faad2@2.11.2-1?distro=trixie
purl pkg:deb/debian/faad2@2.11.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.11.2-1%3Fdistro=trixie
aliases CVE-2023-38858
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ygzc-6m9h-cqgp
34
url VCID-yyc2-dvcb-x7bp
vulnerability_id VCID-yyc2-dvcb-x7bp
summary
Multiple vulnerabilities have been found in FAAD2, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20199
reference_id
reference_type
scores
0
value 0.00479
scoring_system epss
scoring_elements 0.65089
published_at 2026-05-07T12:55:00Z
1
value 0.00479
scoring_system epss
scoring_elements 0.64917
published_at 2026-04-01T12:55:00Z
2
value 0.00479
scoring_system epss
scoring_elements 0.64967
published_at 2026-04-02T12:55:00Z
3
value 0.00479
scoring_system epss
scoring_elements 0.64994
published_at 2026-04-04T12:55:00Z
4
value 0.00479
scoring_system epss
scoring_elements 0.64957
published_at 2026-04-07T12:55:00Z
5
value 0.00479
scoring_system epss
scoring_elements 0.65006
published_at 2026-04-08T12:55:00Z
6
value 0.00479
scoring_system epss
scoring_elements 0.65021
published_at 2026-04-09T12:55:00Z
7
value 0.00479
scoring_system epss
scoring_elements 0.65038
published_at 2026-04-11T12:55:00Z
8
value 0.00479
scoring_system epss
scoring_elements 0.65028
published_at 2026-04-12T12:55:00Z
9
value 0.00479
scoring_system epss
scoring_elements 0.65
published_at 2026-04-13T12:55:00Z
10
value 0.00479
scoring_system epss
scoring_elements 0.65037
published_at 2026-04-16T12:55:00Z
11
value 0.00479
scoring_system epss
scoring_elements 0.65047
published_at 2026-04-18T12:55:00Z
12
value 0.00479
scoring_system epss
scoring_elements 0.65032
published_at 2026-04-21T12:55:00Z
13
value 0.00479
scoring_system epss
scoring_elements 0.6505
published_at 2026-04-24T12:55:00Z
14
value 0.00479
scoring_system epss
scoring_elements 0.65063
published_at 2026-04-26T12:55:00Z
15
value 0.00479
scoring_system epss
scoring_elements 0.6506
published_at 2026-04-29T12:55:00Z
16
value 0.00479
scoring_system epss
scoring_elements 0.65042
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20199
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20199
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20360
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6956
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32272
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32272
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32273
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32274
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32274
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32276
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32276
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32277
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32278
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32278
11
reference_url https://security.archlinux.org/AVG-2660
reference_id AVG-2660
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2660
12
reference_url https://security.gentoo.org/glsa/202006-17
reference_id GLSA-202006-17
reference_type
scores
url https://security.gentoo.org/glsa/202006-17
fixed_packages
0
url pkg:deb/debian/faad2@2.8.8-3.1?distro=trixie
purl pkg:deb/debian/faad2@2.8.8-3.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.8.8-3.1%3Fdistro=trixie
1
url pkg:deb/debian/faad2@2.10.0-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.0-1%3Fdistro=trixie
2
url pkg:deb/debian/faad2@2.10.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.1-1%3Fdistro=trixie
3
url pkg:deb/debian/faad2@2.11.2-1?distro=trixie
purl pkg:deb/debian/faad2@2.11.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.11.2-1%3Fdistro=trixie
aliases CVE-2018-20199
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yyc2-dvcb-x7bp
35
url VCID-z5mf-w8ny-rfcn
vulnerability_id VCID-z5mf-w8ny-rfcn
summary
Multiple vulnerabilities have been found in FAAD2, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20195
reference_id
reference_type
scores
0
value 0.00323
scoring_system epss
scoring_elements 0.5527
published_at 2026-04-01T12:55:00Z
1
value 0.00323
scoring_system epss
scoring_elements 0.55369
published_at 2026-04-02T12:55:00Z
2
value 0.00323
scoring_system epss
scoring_elements 0.55393
published_at 2026-04-13T12:55:00Z
3
value 0.00323
scoring_system epss
scoring_elements 0.55371
published_at 2026-04-26T12:55:00Z
4
value 0.00323
scoring_system epss
scoring_elements 0.55422
published_at 2026-04-09T12:55:00Z
5
value 0.00323
scoring_system epss
scoring_elements 0.55433
published_at 2026-04-18T12:55:00Z
6
value 0.00323
scoring_system epss
scoring_elements 0.55411
published_at 2026-04-21T12:55:00Z
7
value 0.00323
scoring_system epss
scoring_elements 0.55429
published_at 2026-04-16T12:55:00Z
8
value 0.00323
scoring_system epss
scoring_elements 0.5535
published_at 2026-04-24T12:55:00Z
9
value 0.00323
scoring_system epss
scoring_elements 0.55344
published_at 2026-04-29T12:55:00Z
10
value 0.00323
scoring_system epss
scoring_elements 0.55293
published_at 2026-05-05T12:55:00Z
11
value 0.00323
scoring_system epss
scoring_elements 0.55335
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20195
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19502
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19503
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19504
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20194
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20195
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20197
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20198
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20357
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20358
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20359
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20361
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20362
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15296
15
reference_url https://security.gentoo.org/glsa/202006-17
reference_id GLSA-202006-17
reference_type
scores
url https://security.gentoo.org/glsa/202006-17
fixed_packages
0
url pkg:deb/debian/faad2@2.8.8-2?distro=trixie
purl pkg:deb/debian/faad2@2.8.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.8.8-2%3Fdistro=trixie
1
url pkg:deb/debian/faad2@2.10.0-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.0-1%3Fdistro=trixie
2
url pkg:deb/debian/faad2@2.10.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.1-1%3Fdistro=trixie
3
url pkg:deb/debian/faad2@2.11.2-1?distro=trixie
purl pkg:deb/debian/faad2@2.11.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.11.2-1%3Fdistro=trixie
aliases CVE-2018-20195
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z5mf-w8ny-rfcn
36
url VCID-z9wm-y8q6-2fc5
vulnerability_id VCID-z9wm-y8q6-2fc5
summary
Multiple vulnerabilities have been found in FAAD2, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20357
reference_id
reference_type
scores
0
value 0.00323
scoring_system epss
scoring_elements 0.55335
published_at 2026-05-07T12:55:00Z
1
value 0.00323
scoring_system epss
scoring_elements 0.55293
published_at 2026-05-05T12:55:00Z
2
value 0.00323
scoring_system epss
scoring_elements 0.5527
published_at 2026-04-01T12:55:00Z
3
value 0.00323
scoring_system epss
scoring_elements 0.55369
published_at 2026-04-02T12:55:00Z
4
value 0.00323
scoring_system epss
scoring_elements 0.55393
published_at 2026-04-13T12:55:00Z
5
value 0.00323
scoring_system epss
scoring_elements 0.55371
published_at 2026-04-26T12:55:00Z
6
value 0.00323
scoring_system epss
scoring_elements 0.55422
published_at 2026-04-09T12:55:00Z
7
value 0.00323
scoring_system epss
scoring_elements 0.55433
published_at 2026-04-18T12:55:00Z
8
value 0.00323
scoring_system epss
scoring_elements 0.55411
published_at 2026-04-21T12:55:00Z
9
value 0.00323
scoring_system epss
scoring_elements 0.55429
published_at 2026-04-16T12:55:00Z
10
value 0.00323
scoring_system epss
scoring_elements 0.5535
published_at 2026-04-24T12:55:00Z
11
value 0.00323
scoring_system epss
scoring_elements 0.55344
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20357
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19502
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19503
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19504
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20194
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20195
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20197
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20198
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20357
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20358
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20359
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20361
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20362
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15296
15
reference_url https://github.com/knik0/faad2/issues/28
reference_id
reference_type
scores
url https://github.com/knik0/faad2/issues/28
16
reference_url https://seclists.org/bugtraq/2019/Sep/28
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Sep/28
17
reference_url https://www.debian.org/security/2019/dsa-4522
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4522
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiocoding:freeware_advanced_audio_decoder_2:2.8.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:audiocoding:freeware_advanced_audio_decoder_2:2.8.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiocoding:freeware_advanced_audio_decoder_2:2.8.8:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-20357
reference_id CVE-2018-20357
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-20357
20
reference_url https://security.gentoo.org/glsa/202006-17
reference_id GLSA-202006-17
reference_type
scores
url https://security.gentoo.org/glsa/202006-17
fixed_packages
0
url pkg:deb/debian/faad2@2.8.8-2?distro=trixie
purl pkg:deb/debian/faad2@2.8.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.8.8-2%3Fdistro=trixie
1
url pkg:deb/debian/faad2@2.10.0-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.0-1%3Fdistro=trixie
2
url pkg:deb/debian/faad2@2.10.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.1-1%3Fdistro=trixie
3
url pkg:deb/debian/faad2@2.11.2-1?distro=trixie
purl pkg:deb/debian/faad2@2.11.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.11.2-1%3Fdistro=trixie
aliases CVE-2018-20357
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z9wm-y8q6-2fc5
37
url VCID-za4y-a3ry-8ycw
vulnerability_id VCID-za4y-a3ry-8ycw
summary
Multiple vulnerabilities have been found in FAAD2, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-15296
reference_id
reference_type
scores
0
value 0.00421
scoring_system epss
scoring_elements 0.61991
published_at 2026-05-05T12:55:00Z
1
value 0.00421
scoring_system epss
scoring_elements 0.62045
published_at 2026-04-29T12:55:00Z
2
value 0.00421
scoring_system epss
scoring_elements 0.61877
published_at 2026-04-01T12:55:00Z
3
value 0.00421
scoring_system epss
scoring_elements 0.6195
published_at 2026-04-02T12:55:00Z
4
value 0.00421
scoring_system epss
scoring_elements 0.61982
published_at 2026-04-04T12:55:00Z
5
value 0.00421
scoring_system epss
scoring_elements 0.61952
published_at 2026-04-07T12:55:00Z
6
value 0.00421
scoring_system epss
scoring_elements 0.62001
published_at 2026-04-08T12:55:00Z
7
value 0.00421
scoring_system epss
scoring_elements 0.62018
published_at 2026-04-09T12:55:00Z
8
value 0.00421
scoring_system epss
scoring_elements 0.6204
published_at 2026-05-07T12:55:00Z
9
value 0.00421
scoring_system epss
scoring_elements 0.62029
published_at 2026-04-12T12:55:00Z
10
value 0.00421
scoring_system epss
scoring_elements 0.62008
published_at 2026-04-13T12:55:00Z
11
value 0.00421
scoring_system epss
scoring_elements 0.6205
published_at 2026-04-16T12:55:00Z
12
value 0.00421
scoring_system epss
scoring_elements 0.62055
published_at 2026-04-18T12:55:00Z
13
value 0.00421
scoring_system epss
scoring_elements 0.62038
published_at 2026-04-21T12:55:00Z
14
value 0.00421
scoring_system epss
scoring_elements 0.62035
published_at 2026-04-24T12:55:00Z
15
value 0.00421
scoring_system epss
scoring_elements 0.62052
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-15296
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19502
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19503
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19504
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20194
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20195
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20196
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20197
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20198
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20357
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20358
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20359
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20361
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20362
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15296
15
reference_url https://github.com/knik0/faad2/commit/942c3e0aee748ea6fe97cb2c1aa5893225316174
reference_id
reference_type
scores
url https://github.com/knik0/faad2/commit/942c3e0aee748ea6fe97cb2c1aa5893225316174
16
reference_url https://lists.debian.org/debian-lts-announce/2019/08/msg00033.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/08/msg00033.html
17
reference_url https://seclists.org/bugtraq/2019/Sep/28
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Sep/28
18
reference_url https://www.debian.org/security/2019/dsa-4522
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4522
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiocoding:freeware_advanced_audio_decoder_2:2.8.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:audiocoding:freeware_advanced_audio_decoder_2:2.8.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiocoding:freeware_advanced_audio_decoder_2:2.8.8:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-15296
reference_id CVE-2019-15296
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-15296
22
reference_url https://security.gentoo.org/glsa/202006-17
reference_id GLSA-202006-17
reference_type
scores
url https://security.gentoo.org/glsa/202006-17
fixed_packages
0
url pkg:deb/debian/faad2@2.8.8-3?distro=trixie
purl pkg:deb/debian/faad2@2.8.8-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.8.8-3%3Fdistro=trixie
1
url pkg:deb/debian/faad2@2.10.0-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.0-1%3Fdistro=trixie
2
url pkg:deb/debian/faad2@2.10.1-1?distro=trixie
purl pkg:deb/debian/faad2@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.1-1%3Fdistro=trixie
3
url pkg:deb/debian/faad2@2.11.2-1?distro=trixie
purl pkg:deb/debian/faad2@2.11.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.11.2-1%3Fdistro=trixie
aliases CVE-2019-15296
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-za4y-a3ry-8ycw
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/faad2@2.10.1-1%3Fdistro=trixie