{"url":"http://public2.vulnerablecode.io/api/packages/91662?format=json","purl":"pkg:rpm/redhat/gstreamer1-plugins-good@1.22.1-3?arch=el9_4","type":"rpm","namespace":"redhat","name":"gstreamer1-plugins-good","version":"1.22.1-3","qualifiers":{"arch":"el9_4"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36368?format=json","vulnerability_id":"VCID-358j-grsx-27fn","summary":"Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47539.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47539.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47539","reference_id":"","reference_type":"","scores":[{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3101","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.31058","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42632","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42621","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42655","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42619","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42591","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.4265","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42636","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.4257","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42508","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42509","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42425","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42569","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63368","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63323","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.6342","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47539"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47539","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47539"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331726","reference_id":"2331726","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331726"},{"reference_url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch","reference_id":"8059.patch","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:41:01Z/"}],"url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch"},{"reference_url":"https://securitylab.github.com/advisories/GHSL-2024-195_Gstreamer/","reference_id":"GHSL-2024-195_Gstreamer","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:41:01Z/"}],"url":"https://securitylab.github.com/advisories/GHSL-2024-195_Gstreamer/"},{"reference_url":"https://security.gentoo.org/glsa/202506-02","reference_id":"GLSA-202506-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11119","reference_id":"RHSA-2024:11119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11119"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11121","reference_id":"RHSA-2024:11121","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11121"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11122","reference_id":"RHSA-2024:11122","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11122"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11148","reference_id":"RHSA-2024:11148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11149","reference_id":"RHSA-2024:11149","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11149"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11298","reference_id":"RHSA-2024:11298","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11298"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11299","reference_id":"RHSA-2024:11299","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11299"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11346","reference_id":"RHSA-2024:11346","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11346"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11348","reference_id":"RHSA-2024:11348","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11348"},{"reference_url":"https://gstreamer.freedesktop.org/security/sa-2024-0007.html","reference_id":"sa-2024-0007.html","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:41:01Z/"}],"url":"https://gstreamer.freedesktop.org/security/sa-2024-0007.html"},{"reference_url":"https://usn.ubuntu.com/7176-1/","reference_id":"USN-7176-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7176-1/"}],"fixed_packages":[],"aliases":["CVE-2024-47539"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-358j-grsx-27fn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36366?format=json","vulnerability_id":"VCID-6hjf-zva4-ekcv","summary":"Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47537.json","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47537.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47537","reference_id":"","reference_type":"","scores":[{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3101","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.31058","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42632","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42621","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42655","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42619","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42591","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.4265","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42636","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.4257","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42508","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42509","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42425","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42569","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63368","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63323","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.6342","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47537"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47537","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47537"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331722","reference_id":"2331722","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331722"},{"reference_url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch","reference_id":"8059.patch","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T19:15:39Z/"}],"url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch"},{"reference_url":"https://securitylab.github.com/advisories/GHSL-2024-094_Gstreamer/","reference_id":"GHSL-2024-094_Gstreamer","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T19:15:39Z/"}],"url":"https://securitylab.github.com/advisories/GHSL-2024-094_Gstreamer/"},{"reference_url":"https://security.gentoo.org/glsa/202506-02","reference_id":"GLSA-202506-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11119","reference_id":"RHSA-2024:11119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11119"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11121","reference_id":"RHSA-2024:11121","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11121"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11122","reference_id":"RHSA-2024:11122","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11122"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11148","reference_id":"RHSA-2024:11148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11149","reference_id":"RHSA-2024:11149","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11149"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11298","reference_id":"RHSA-2024:11298","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11298"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11299","reference_id":"RHSA-2024:11299","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11299"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11344","reference_id":"RHSA-2024:11344","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11344"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11346","reference_id":"RHSA-2024:11346","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11346"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11348","reference_id":"RHSA-2024:11348","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11348"},{"reference_url":"https://gstreamer.freedesktop.org/security/sa-2024-0005.html","reference_id":"sa-2024-0005.html","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T19:15:39Z/"}],"url":"https://gstreamer.freedesktop.org/security/sa-2024-0005.html"},{"reference_url":"https://usn.ubuntu.com/7176-1/","reference_id":"USN-7176-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7176-1/"}],"fixed_packages":[],"aliases":["CVE-2024-47537"],"risk_score":3.8,"exploitability":"0.5","weighted_severity":"7.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6hjf-zva4-ekcv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36390?format=json","vulnerability_id":"VCID-h2zj-j6va-v7hs","summary":"Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47613.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47613.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47613","reference_id":"","reference_type":"","scores":[{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23318","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23339","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23301","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23245","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.2326","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23254","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23235","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23042","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23035","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23032","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23366","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23407","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23195","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28206","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28285","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28262","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47613"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331753","reference_id":"2331753","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331753"},{"reference_url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8041.patch","reference_id":"8041.patch","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:17:34Z/"}],"url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8041.patch"},{"reference_url":"https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/","reference_id":"GHSL-2024-115_GHSL-2024-118_Gstreamer","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:17:34Z/"}],"url":"https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/"},{"reference_url":"https://security.gentoo.org/glsa/202506-02","reference_id":"GLSA-202506-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11119","reference_id":"RHSA-2024:11119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11119"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11121","reference_id":"RHSA-2024:11121","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11121"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11122","reference_id":"RHSA-2024:11122","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11122"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11148","reference_id":"RHSA-2024:11148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11149","reference_id":"RHSA-2024:11149","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11149"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11298","reference_id":"RHSA-2024:11298","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11298"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11299","reference_id":"RHSA-2024:11299","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11299"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11344","reference_id":"RHSA-2024:11344","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11344"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11346","reference_id":"RHSA-2024:11346","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11346"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11348","reference_id":"RHSA-2024:11348","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11348"},{"reference_url":"https://gstreamer.freedesktop.org/security/sa-2024-0025.html","reference_id":"sa-2024-0025.html","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:17:34Z/"}],"url":"https://gstreamer.freedesktop.org/security/sa-2024-0025.html"},{"reference_url":"https://usn.ubuntu.com/7176-1/","reference_id":"USN-7176-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7176-1/"}],"fixed_packages":[],"aliases":["CVE-2024-47613"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h2zj-j6va-v7hs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36388?format=json","vulnerability_id":"VCID-hxhp-4xdt-fqfp","summary":"Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47606.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47606.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47606","reference_id":"","reference_type":"","scores":[{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41556","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41584","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56399","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56343","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56394","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56409","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56385","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56367","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.564","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56369","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56291","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56311","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.5629","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00724","scoring_system":"epss","scoring_elements":"0.72675","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00724","scoring_system":"epss","scoring_elements":"0.72651","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00724","scoring_system":"epss","scoring_elements":"0.7262","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47606"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331760","reference_id":"2331760","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331760"},{"reference_url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8032.patch","reference_id":"8032.patch","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-12-11T20:43:34Z/"}],"url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8032.patch"},{"reference_url":"https://securitylab.github.com/advisories/GHSL-2024-166_Gstreamer/","reference_id":"GHSL-2024-166_Gstreamer","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-12-11T20:43:34Z/"}],"url":"https://securitylab.github.com/advisories/GHSL-2024-166_Gstreamer/"},{"reference_url":"https://security.gentoo.org/glsa/202506-02","reference_id":"GLSA-202506-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11119","reference_id":"RHSA-2024:11119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11119"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11121","reference_id":"RHSA-2024:11121","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11121"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11122","reference_id":"RHSA-2024:11122","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11122"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11148","reference_id":"RHSA-2024:11148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11149","reference_id":"RHSA-2024:11149","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11149"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11298","reference_id":"RHSA-2024:11298","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11298"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11299","reference_id":"RHSA-2024:11299","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11299"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11344","reference_id":"RHSA-2024:11344","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11344"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11346","reference_id":"RHSA-2024:11346","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11346"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11348","reference_id":"RHSA-2024:11348","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11348"},{"reference_url":"https://gstreamer.freedesktop.org/security/sa-2024-0014.html","reference_id":"sa-2024-0014.html","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-12-11T20:43:34Z/"}],"url":"https://gstreamer.freedesktop.org/security/sa-2024-0014.html"},{"reference_url":"https://usn.ubuntu.com/7174-1/","reference_id":"USN-7174-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7174-1/"},{"reference_url":"https://usn.ubuntu.com/7176-1/","reference_id":"USN-7176-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7176-1/"}],"fixed_packages":[],"aliases":["CVE-2024-47606"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hxhp-4xdt-fqfp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36369?format=json","vulnerability_id":"VCID-p46s-buwz-h3by","summary":"Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47540.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47540.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47540","reference_id":"","reference_type":"","scores":[{"value":"0.00418","scoring_system":"epss","scoring_elements":"0.61752","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00418","scoring_system":"epss","scoring_elements":"0.61782","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72322","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.7231","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72345","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72328","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72315","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72357","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72366","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72354","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72397","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72406","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72403","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72272","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01306","scoring_system":"epss","scoring_elements":"0.79887","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01306","scoring_system":"epss","scoring_elements":"0.79863","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01306","scoring_system":"epss","scoring_elements":"0.79903","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47540"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47540","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47540"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331719","reference_id":"2331719","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331719"},{"reference_url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch","reference_id":"8057.patch","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:34:42Z/"}],"url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch"},{"reference_url":"https://securitylab.github.com/advisories/GHSL-2024-197_GStreamer/","reference_id":"GHSL-2024-197_GStreamer","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:34:42Z/"}],"url":"https://securitylab.github.com/advisories/GHSL-2024-197_GStreamer/"},{"reference_url":"https://security.gentoo.org/glsa/202506-02","reference_id":"GLSA-202506-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11119","reference_id":"RHSA-2024:11119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11119"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11121","reference_id":"RHSA-2024:11121","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11121"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11122","reference_id":"RHSA-2024:11122","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11122"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11148","reference_id":"RHSA-2024:11148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11149","reference_id":"RHSA-2024:11149","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11149"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11298","reference_id":"RHSA-2024:11298","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11298"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11299","reference_id":"RHSA-2024:11299","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11299"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11344","reference_id":"RHSA-2024:11344","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11344"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11346","reference_id":"RHSA-2024:11346","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11346"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11348","reference_id":"RHSA-2024:11348","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11348"},{"reference_url":"https://gstreamer.freedesktop.org/security/sa-2024-0017.html","reference_id":"sa-2024-0017.html","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:34:42Z/"}],"url":"https://gstreamer.freedesktop.org/security/sa-2024-0017.html"},{"reference_url":"https://usn.ubuntu.com/7176-1/","reference_id":"USN-7176-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7176-1/"}],"fixed_packages":[],"aliases":["CVE-2024-47540"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p46s-buwz-h3by"}],"fixing_vulnerabilities":[],"risk_score":"4.4","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/gstreamer1-plugins-good@1.22.1-3%3Farch=el9_4"}