{"url":"http://public2.vulnerablecode.io/api/packages/583904?format=json","purl":"pkg:deb/debian/ffmpeg@7:3.2.2-1?distro=trixie","type":"deb","namespace":"debian","name":"ffmpeg","version":"7:3.2.2-1","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"7:3.2.4-1","latest_non_vulnerable_version":"7:8.1.1-3","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92834?format=json","vulnerability_id":"VCID-51s3-7aca-uudb","summary":"Heap-based buffer overflow in libavformat/rtmppkt.c in FFmpeg before 2.8.10, 3.0.x before 3.0.5, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 allows remote attackers to execute arbitrary code by leveraging failure to check for RTMP packet size mismatches.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10191","reference_id":"","reference_type":"","scores":[{"value":"0.08661","scoring_system":"epss","scoring_elements":"0.92416","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08661","scoring_system":"epss","scoring_elements":"0.92422","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08661","scoring_system":"epss","scoring_elements":"0.92431","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08661","scoring_system":"epss","scoring_elements":"0.92434","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08661","scoring_system":"epss","scoring_elements":"0.92445","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08661","scoring_system":"epss","scoring_elements":"0.9245","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08661","scoring_system":"epss","scoring_elements":"0.92456","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08661","scoring_system":"epss","scoring_elements":"0.92458","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08661","scoring_system":"epss","scoring_elements":"0.92467","published_at":"2026-04-16T12:55:00Z"},{"value":"0.08661","scoring_system":"epss","scoring_elements":"0.92466","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08661","scoring_system":"epss","scoring_elements":"0.9247","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08661","scoring_system":"epss","scoring_elements":"0.92472","published_at":"2026-04-24T12:55:00Z"},{"value":"0.08661","scoring_system":"epss","scoring_elements":"0.92473","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08661","scoring_system":"epss","scoring_elements":"0.92469","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08661","scoring_system":"epss","scoring_elements":"0.9248","published_at":"2026-05-05T12:55:00Z"},{"value":"0.08661","scoring_system":"epss","scoring_elements":"0.92489","published_at":"2026-05-07T12:55:00Z"},{"value":"0.08661","scoring_system":"epss","scoring_elements":"0.925","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10191"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10191","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10191"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583904?format=json","purl":"pkg:deb/debian/ffmpeg@7:3.2.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ffmpeg@7:3.2.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582177?format=json","purl":"pkg:deb/debian/ffmpeg@7:4.3.7-0%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2qje-t52h-fyfk"},{"vulnerability":"VCID-mun9-fyvn-8kfs"},{"vulnerability":"VCID-ujjc-ays1-gfc2"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ffmpeg@7:4.3.7-0%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582178?format=json","purl":"pkg:deb/debian/ffmpeg@7:5.1.8-0%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2qje-t52h-fyfk"},{"vulnerability":"VCID-352p-mxyy-k3bu"},{"vulnerability":"VCID-e9kf-tzg8-9bht"},{"vulnerability":"VCID-grh1-jxmf-dqdv"},{"vulnerability":"VCID-mun9-fyvn-8kfs"},{"vulnerability":"VCID-ns98-tu4j-sfd5"},{"vulnerability":"VCID-uakc-kpg5-2ug5"},{"vulnerability":"VCID-wrb6-w8ps-uuge"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ffmpeg@7:5.1.8-0%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582179?format=json","purl":"pkg:deb/debian/ffmpeg@7:7.1.3-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2qje-t52h-fyfk"},{"vulnerability":"VCID-352p-mxyy-k3bu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ffmpeg@7:7.1.3-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582180?format=json","purl":"pkg:deb/debian/ffmpeg@7:8.1-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ffmpeg@7:8.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1108316?format=json","purl":"pkg:deb/debian/ffmpeg@7:8.1.1-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ffmpeg@7:8.1.1-3%3Fdistro=trixie"}],"aliases":["CVE-2016-10191"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-51s3-7aca-uudb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92833?format=json","vulnerability_id":"VCID-tsrj-t3se-2fbw","summary":"Heap-based buffer overflow in libavformat/http.c in FFmpeg before 2.8.10, 3.0.x before 3.0.5, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 allows remote web servers to execute arbitrary code via a negative chunk size in an HTTP response.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10190","reference_id":"","reference_type":"","scores":[{"value":"0.10189","scoring_system":"epss","scoring_elements":"0.93097","published_at":"2026-04-01T12:55:00Z"},{"value":"0.10189","scoring_system":"epss","scoring_elements":"0.93107","published_at":"2026-04-02T12:55:00Z"},{"value":"0.10189","scoring_system":"epss","scoring_elements":"0.9311","published_at":"2026-04-04T12:55:00Z"},{"value":"0.10189","scoring_system":"epss","scoring_elements":"0.93109","published_at":"2026-04-07T12:55:00Z"},{"value":"0.10189","scoring_system":"epss","scoring_elements":"0.93118","published_at":"2026-04-08T12:55:00Z"},{"value":"0.10189","scoring_system":"epss","scoring_elements":"0.93122","published_at":"2026-04-09T12:55:00Z"},{"value":"0.10189","scoring_system":"epss","scoring_elements":"0.93128","published_at":"2026-04-11T12:55:00Z"},{"value":"0.10189","scoring_system":"epss","scoring_elements":"0.93125","published_at":"2026-04-12T12:55:00Z"},{"value":"0.10189","scoring_system":"epss","scoring_elements":"0.93127","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10189","scoring_system":"epss","scoring_elements":"0.93144","published_at":"2026-04-16T12:55:00Z"},{"value":"0.10189","scoring_system":"epss","scoring_elements":"0.93148","published_at":"2026-04-18T12:55:00Z"},{"value":"0.10189","scoring_system":"epss","scoring_elements":"0.93155","published_at":"2026-04-21T12:55:00Z"},{"value":"0.10189","scoring_system":"epss","scoring_elements":"0.93161","published_at":"2026-04-24T12:55:00Z"},{"value":"0.10189","scoring_system":"epss","scoring_elements":"0.9316","published_at":"2026-04-26T12:55:00Z"},{"value":"0.10189","scoring_system":"epss","scoring_elements":"0.93157","published_at":"2026-04-29T12:55:00Z"},{"value":"0.10189","scoring_system":"epss","scoring_elements":"0.93163","published_at":"2026-05-05T12:55:00Z"},{"value":"0.10189","scoring_system":"epss","scoring_elements":"0.93177","published_at":"2026-05-07T12:55:00Z"},{"value":"0.10189","scoring_system":"epss","scoring_elements":"0.93187","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10190"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10190","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10190"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583904?format=json","purl":"pkg:deb/debian/ffmpeg@7:3.2.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ffmpeg@7:3.2.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582177?format=json","purl":"pkg:deb/debian/ffmpeg@7:4.3.7-0%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2qje-t52h-fyfk"},{"vulnerability":"VCID-mun9-fyvn-8kfs"},{"vulnerability":"VCID-ujjc-ays1-gfc2"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ffmpeg@7:4.3.7-0%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582178?format=json","purl":"pkg:deb/debian/ffmpeg@7:5.1.8-0%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2qje-t52h-fyfk"},{"vulnerability":"VCID-352p-mxyy-k3bu"},{"vulnerability":"VCID-e9kf-tzg8-9bht"},{"vulnerability":"VCID-grh1-jxmf-dqdv"},{"vulnerability":"VCID-mun9-fyvn-8kfs"},{"vulnerability":"VCID-ns98-tu4j-sfd5"},{"vulnerability":"VCID-uakc-kpg5-2ug5"},{"vulnerability":"VCID-wrb6-w8ps-uuge"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ffmpeg@7:5.1.8-0%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582179?format=json","purl":"pkg:deb/debian/ffmpeg@7:7.1.3-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2qje-t52h-fyfk"},{"vulnerability":"VCID-352p-mxyy-k3bu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ffmpeg@7:7.1.3-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582180?format=json","purl":"pkg:deb/debian/ffmpeg@7:8.1-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ffmpeg@7:8.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1108316?format=json","purl":"pkg:deb/debian/ffmpeg@7:8.1.1-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ffmpeg@7:8.1.1-3%3Fdistro=trixie"}],"aliases":["CVE-2016-10190"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tsrj-t3se-2fbw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92835?format=json","vulnerability_id":"VCID-vka8-kexr-g7ej","summary":"Heap-based buffer overflow in ffserver.c in FFmpeg before 2.8.10, 3.0.x before 3.0.5, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 allows remote attackers to execute arbitrary code by leveraging failure to check chunk size.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10192","reference_id":"","reference_type":"","scores":[{"value":"0.04839","scoring_system":"epss","scoring_elements":"0.89539","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04839","scoring_system":"epss","scoring_elements":"0.89536","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04839","scoring_system":"epss","scoring_elements":"0.89551","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04839","scoring_system":"epss","scoring_elements":"0.89555","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04839","scoring_system":"epss","scoring_elements":"0.89563","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04839","scoring_system":"epss","scoring_elements":"0.89582","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04839","scoring_system":"epss","scoring_elements":"0.89596","published_at":"2026-05-09T12:55:00Z"},{"value":"0.05544","scoring_system":"epss","scoring_elements":"0.90273","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05544","scoring_system":"epss","scoring_elements":"0.90223","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05544","scoring_system":"epss","scoring_elements":"0.90284","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05544","scoring_system":"epss","scoring_elements":"0.90267","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05544","scoring_system":"epss","scoring_elements":"0.90226","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05544","scoring_system":"epss","scoring_elements":"0.90239","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05544","scoring_system":"epss","scoring_elements":"0.90243","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05544","scoring_system":"epss","scoring_elements":"0.90259","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05544","scoring_system":"epss","scoring_elements":"0.90265","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05544","scoring_system":"epss","scoring_elements":"0.90274","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10192"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10192","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10192"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583904?format=json","purl":"pkg:deb/debian/ffmpeg@7:3.2.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ffmpeg@7:3.2.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582177?format=json","purl":"pkg:deb/debian/ffmpeg@7:4.3.7-0%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2qje-t52h-fyfk"},{"vulnerability":"VCID-mun9-fyvn-8kfs"},{"vulnerability":"VCID-ujjc-ays1-gfc2"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ffmpeg@7:4.3.7-0%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582178?format=json","purl":"pkg:deb/debian/ffmpeg@7:5.1.8-0%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2qje-t52h-fyfk"},{"vulnerability":"VCID-352p-mxyy-k3bu"},{"vulnerability":"VCID-e9kf-tzg8-9bht"},{"vulnerability":"VCID-grh1-jxmf-dqdv"},{"vulnerability":"VCID-mun9-fyvn-8kfs"},{"vulnerability":"VCID-ns98-tu4j-sfd5"},{"vulnerability":"VCID-uakc-kpg5-2ug5"},{"vulnerability":"VCID-wrb6-w8ps-uuge"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ffmpeg@7:5.1.8-0%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582179?format=json","purl":"pkg:deb/debian/ffmpeg@7:7.1.3-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2qje-t52h-fyfk"},{"vulnerability":"VCID-352p-mxyy-k3bu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ffmpeg@7:7.1.3-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582180?format=json","purl":"pkg:deb/debian/ffmpeg@7:8.1-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ffmpeg@7:8.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1108316?format=json","purl":"pkg:deb/debian/ffmpeg@7:8.1.1-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ffmpeg@7:8.1.1-3%3Fdistro=trixie"}],"aliases":["CVE-2016-10192"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vka8-kexr-g7ej"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ffmpeg@7:3.2.2-1%3Fdistro=trixie"}