Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/media-video/mplayer@1.0_rc1-r2
Typeebuild
Namespacemedia-video
Namemplayer
Version1.0_rc1-r2
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.0_rc2_p25993
Latest_non_vulnerable_version1.5
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-sar3-93je-n7e9
vulnerability_id VCID-sar3-93je-n7e9
summary
A buffer overflow was found in MPlayer's RTSP plugin that could lead to a
    Denial of Service or arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-6172
reference_id
reference_type
scores
0
value 0.04458
scoring_system epss
scoring_elements 0.8912
published_at 2026-05-05T12:55:00Z
1
value 0.04458
scoring_system epss
scoring_elements 0.89021
published_at 2026-04-01T12:55:00Z
2
value 0.04458
scoring_system epss
scoring_elements 0.89029
published_at 2026-04-02T12:55:00Z
3
value 0.04458
scoring_system epss
scoring_elements 0.89044
published_at 2026-04-04T12:55:00Z
4
value 0.04458
scoring_system epss
scoring_elements 0.89046
published_at 2026-04-07T12:55:00Z
5
value 0.04458
scoring_system epss
scoring_elements 0.89064
published_at 2026-04-08T12:55:00Z
6
value 0.04458
scoring_system epss
scoring_elements 0.89068
published_at 2026-04-09T12:55:00Z
7
value 0.04458
scoring_system epss
scoring_elements 0.8908
published_at 2026-04-11T12:55:00Z
8
value 0.04458
scoring_system epss
scoring_elements 0.89076
published_at 2026-04-12T12:55:00Z
9
value 0.04458
scoring_system epss
scoring_elements 0.89074
published_at 2026-04-13T12:55:00Z
10
value 0.04458
scoring_system epss
scoring_elements 0.89088
published_at 2026-04-18T12:55:00Z
11
value 0.04458
scoring_system epss
scoring_elements 0.89084
published_at 2026-04-21T12:55:00Z
12
value 0.04458
scoring_system epss
scoring_elements 0.89102
published_at 2026-04-24T12:55:00Z
13
value 0.04458
scoring_system epss
scoring_elements 0.89109
published_at 2026-04-26T12:55:00Z
14
value 0.04458
scoring_system epss
scoring_elements 0.89113
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-6172
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6172
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6172
2
reference_url http://secunia.com/advisories/23218
reference_id
reference_type
scores
url http://secunia.com/advisories/23218
3
reference_url http://secunia.com/advisories/23242
reference_id
reference_type
scores
url http://secunia.com/advisories/23242
4
reference_url http://secunia.com/advisories/23249
reference_id
reference_type
scores
url http://secunia.com/advisories/23249
5
reference_url http://secunia.com/advisories/23301
reference_id
reference_type
scores
url http://secunia.com/advisories/23301
6
reference_url http://secunia.com/advisories/23335
reference_id
reference_type
scores
url http://secunia.com/advisories/23335
7
reference_url http://secunia.com/advisories/23512
reference_id
reference_type
scores
url http://secunia.com/advisories/23512
8
reference_url http://secunia.com/advisories/23567
reference_id
reference_type
scores
url http://secunia.com/advisories/23567
9
reference_url http://secunia.com/advisories/24336
reference_id
reference_type
scores
url http://secunia.com/advisories/24336
10
reference_url http://secunia.com/advisories/24339
reference_id
reference_type
scores
url http://secunia.com/advisories/24339
11
reference_url http://secunia.com/advisories/25555
reference_id
reference_type
scores
url http://secunia.com/advisories/25555
12
reference_url http://security.gentoo.org/glsa/glsa-200612-02.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200612-02.xml
13
reference_url http://security.gentoo.org/glsa/glsa-200702-11.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200702-11.xml
14
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.433842
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.433842
15
reference_url http://sourceforge.net/project/shownotes.php?release_id=468432
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?release_id=468432
16
reference_url https://sourceforge.net/tracker/index.php?func=detail&aid=1603458&group_id=9655&atid=109655
reference_id
reference_type
scores
url https://sourceforge.net/tracker/index.php?func=detail&aid=1603458&group_id=9655&atid=109655
17
reference_url http://www.debian.org/security/2006/dsa-1244
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-1244
18
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:224
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:224
19
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:112
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:112
20
reference_url http://www.mplayerhq.hu/design7/news.html#vuln14
reference_id
reference_type
scores
url http://www.mplayerhq.hu/design7/news.html#vuln14
21
reference_url http://www.mplayerhq.hu/MPlayer/patches/asmrules_fix_20061231.diff
reference_id
reference_type
scores
url http://www.mplayerhq.hu/MPlayer/patches/asmrules_fix_20061231.diff
22
reference_url http://www.novell.com/linux/security/advisories/2006_28_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2006_28_sr.html
23
reference_url http://www.securityfocus.com/bid/21435
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/21435
24
reference_url http://www.ubuntu.com/usn/usn-392-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-392-1
25
reference_url http://www.vupen.com/english/advisories/2006/4824
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/4824
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:real_media_input_plugin:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:real_media_input_plugin:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:real_media_input_plugin:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2006-6172
reference_id CVE-2006-6172
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2006-6172
29
reference_url https://security.gentoo.org/glsa/200612-02
reference_id GLSA-200612-02
reference_type
scores
url https://security.gentoo.org/glsa/200612-02
30
reference_url https://security.gentoo.org/glsa/200702-11
reference_id GLSA-200702-11
reference_type
scores
url https://security.gentoo.org/glsa/200702-11
31
reference_url https://usn.ubuntu.com/392-1/
reference_id USN-392-1
reference_type
scores
url https://usn.ubuntu.com/392-1/
fixed_packages
0
url pkg:ebuild/media-video/mplayer@1.0_rc1-r2
purl pkg:ebuild/media-video/mplayer@1.0_rc1-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/media-video/mplayer@1.0_rc1-r2
aliases CVE-2006-6172
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sar3-93je-n7e9
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/media-video/mplayer@1.0_rc1-r2