Lookup for vulnerable packages by Package URL.

GET /api/packages/924566?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "gst-plugins-good1.0",
    "version": "1.28.1-1",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "1.28.2-1",
    "latest_non_vulnerable_version": "1.28.2-4",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64432?format=api",
            "vulnerability_id": "VCID-1g9u-gemh-83bw",
            "summary": "gstreamer: incomplete fix of CVE-2026-1940",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1940.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1940.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-1940",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04071",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04037",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04056",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04076",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04096",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04079",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04068",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04042",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04031",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04043",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04165",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04968",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0493",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04972",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12592",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12458",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-1940"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1940",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1940"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2436932",
                    "reference_id": "2436932",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-24T13:43:35Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2436932"
                },
                {
                    "reference_url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/4854",
                    "reference_id": "4854",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-24T13:43:35Z/"
                        }
                    ],
                    "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/4854"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2026-1940",
                    "reference_id": "CVE-2026-1940",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-24T13:43:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2026-1940"
                },
                {
                    "reference_url": "https://security-tracker.debian.org/tracker/CVE-2026-1940",
                    "reference_id": "CVE-2026-1940",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-24T13:43:35Z/"
                        }
                    ],
                    "url": "https://security-tracker.debian.org/tracker/CVE-2026-1940"
                },
                {
                    "reference_url": "https://gstreamer.freedesktop.org/security/sa-2026-0001.html",
                    "reference_id": "sa-2026-0001.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-24T13:43:35Z/"
                        }
                    ],
                    "url": "https://gstreamer.freedesktop.org/security/sa-2026-0001.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2026-1940"
            ],
            "risk_score": 2.3,
            "exploitability": "0.5",
            "weighted_severity": "4.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1g9u-gemh-83bw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58850?format=api",
            "vulnerability_id": "VCID-1kjc-6zdm-jkf3",
            "summary": "Multiple vulnerabilities have been discovered in gst-plugins-good, the worst of which could lead to denial of service or arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1922.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1922.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12955",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12901",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12903",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13003",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13023",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12992",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12887",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12803",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17595",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17495",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17499",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17548",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17662",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17708",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17428",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1752",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17581",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1922"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130955",
                    "reference_id": "2130955",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130955"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202409-13",
                    "reference_id": "GLSA-202409-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202409-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2260",
                    "reference_id": "RHSA-2023:2260",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2260"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5555-1/",
                    "reference_id": "USN-5555-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5555-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924571?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924570?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.20.3-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.20.3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-1922"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1kjc-6zdm-jkf3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60089?format=api",
            "vulnerability_id": "VCID-1z2g-dxzn-27d2",
            "summary": "Multiple vulnerabilities have been found in various GStreamer\n    plug-ins, the worst of which could lead to the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5845.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5845.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86758",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86903",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.03108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86861",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86884",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.03108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86769",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86787",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86785",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86805",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86813",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86827",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86823",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86819",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86835",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86839",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86838",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86855",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10198"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10199",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10199"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5840",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5840"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5841",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5841"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5845"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1419582",
                    "reference_id": "1419582",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1419582"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201702-3",
                    "reference_id": "ASA-201702-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201702-3"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-163",
                    "reference_id": "AVG-163",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-163"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201705-10",
                    "reference_id": "GLSA-201705-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201705-10"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2060",
                    "reference_id": "RHSA-2017:2060",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2060"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3245-1/",
                    "reference_id": "USN-3245-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3245-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924564?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.10.3-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.10.3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-5845"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1z2g-dxzn-27d2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36387?format=api",
            "vulnerability_id": "VCID-2nz4-ctek-zbfy",
            "summary": "Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47603.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47603.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47603",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00114",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30149",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00114",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30196",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41544",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41566",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41533",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41519",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41564",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41538",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41463",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41357",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41352",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41274",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41486",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41536",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5433",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54287",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47603"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47603",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47603"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331762",
                    "reference_id": "2331762",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331762"
                },
                {
                    "reference_url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch",
                    "reference_id": "8057.patch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T20:38:14Z/"
                        }
                    ],
                    "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch"
                },
                {
                    "reference_url": "https://securitylab.github.com/advisories/GHSL-2024-251_Gstreamer/",
                    "reference_id": "GHSL-2024-251_Gstreamer",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T20:38:14Z/"
                        }
                    ],
                    "url": "https://securitylab.github.com/advisories/GHSL-2024-251_Gstreamer/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202506-02",
                    "reference_id": "GLSA-202506-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202506-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:7242",
                    "reference_id": "RHSA-2025:7242",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:7242"
                },
                {
                    "reference_url": "https://gstreamer.freedesktop.org/security/sa-2024-0021.html",
                    "reference_id": "sa-2024-0021.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T20:38:14Z/"
                        }
                    ],
                    "url": "https://gstreamer.freedesktop.org/security/sa-2024-0021.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7176-1/",
                    "reference_id": "USN-7176-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7176-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924575?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924574?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924576?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.24.10-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.24.10-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-47603"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2nz4-ctek-zbfy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36368?format=api",
            "vulnerability_id": "VCID-358j-grsx-27fn",
            "summary": "Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47539.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47539.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47539",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3101",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31058",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42632",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42655",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42619",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42591",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4265",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42636",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4257",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42508",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42509",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42425",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42569",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42621",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63368",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63323",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47539"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47539",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47539"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331726",
                    "reference_id": "2331726",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331726"
                },
                {
                    "reference_url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch",
                    "reference_id": "8059.patch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:41:01Z/"
                        }
                    ],
                    "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch"
                },
                {
                    "reference_url": "https://securitylab.github.com/advisories/GHSL-2024-195_Gstreamer/",
                    "reference_id": "GHSL-2024-195_Gstreamer",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:41:01Z/"
                        }
                    ],
                    "url": "https://securitylab.github.com/advisories/GHSL-2024-195_Gstreamer/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202506-02",
                    "reference_id": "GLSA-202506-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202506-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11119",
                    "reference_id": "RHSA-2024:11119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11119"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11121",
                    "reference_id": "RHSA-2024:11121",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11121"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11122",
                    "reference_id": "RHSA-2024:11122",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11122"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11148",
                    "reference_id": "RHSA-2024:11148",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11148"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11149",
                    "reference_id": "RHSA-2024:11149",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11149"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11298",
                    "reference_id": "RHSA-2024:11298",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11298"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11299",
                    "reference_id": "RHSA-2024:11299",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11299"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11346",
                    "reference_id": "RHSA-2024:11346",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11346"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11348",
                    "reference_id": "RHSA-2024:11348",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11348"
                },
                {
                    "reference_url": "https://gstreamer.freedesktop.org/security/sa-2024-0007.html",
                    "reference_id": "sa-2024-0007.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:41:01Z/"
                        }
                    ],
                    "url": "https://gstreamer.freedesktop.org/security/sa-2024-0007.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7176-1/",
                    "reference_id": "USN-7176-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7176-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924575?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924574?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924576?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.24.10-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.24.10-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-47539"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-358j-grsx-27fn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36399?format=api",
            "vulnerability_id": "VCID-3qta-hpkg-hqad",
            "summary": "Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47834.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47834.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47834",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21348",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21403",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30766",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30769",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30726",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3068",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30704",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30686",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30653",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30476",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30362",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30281",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30675",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30734",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4884",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48903",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47834"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47834",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47834"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331749",
                    "reference_id": "2331749",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331749"
                },
                {
                    "reference_url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch",
                    "reference_id": "8057.patch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:15:13Z/"
                        }
                    ],
                    "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch"
                },
                {
                    "reference_url": "https://securitylab.github.com/advisories/GHSL-2024-280_Gstreamer/",
                    "reference_id": "GHSL-2024-280_Gstreamer",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:15:13Z/"
                        }
                    ],
                    "url": "https://securitylab.github.com/advisories/GHSL-2024-280_Gstreamer/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202506-02",
                    "reference_id": "GLSA-202506-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202506-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:7242",
                    "reference_id": "RHSA-2025:7242",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:7242"
                },
                {
                    "reference_url": "https://gstreamer.freedesktop.org/security/sa-2024-0030.html",
                    "reference_id": "sa-2024-0030.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:15:13Z/"
                        }
                    ],
                    "url": "https://gstreamer.freedesktop.org/security/sa-2024-0030.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7176-1/",
                    "reference_id": "USN-7176-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7176-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924575?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924574?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924576?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.24.10-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.24.10-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-47834"
            ],
            "risk_score": 2.3,
            "exploitability": "0.5",
            "weighted_severity": "4.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3qta-hpkg-hqad"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64265?format=api",
            "vulnerability_id": "VCID-4ka2-hbcv-8uh2",
            "summary": "GStreamer: GStreamer: Remote Code Execution via Heap-based Buffer Overflow in rtpqdm2depay",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3085.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3085.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-3085",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50739",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50817",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50765",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50721",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50777",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50774",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50793",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50778",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00298",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53196",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00298",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53171",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00298",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5318",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00298",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53234",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00298",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5324",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00298",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53222",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00298",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53209",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00298",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53129",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-3085"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3085",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3085"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447495",
                    "reference_id": "2447495",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447495"
                },
                {
                    "reference_url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/d60a94dee3c0a0942c9981491bf83e0de1900fbf",
                    "reference_id": "d60a94dee3c0a0942c9981491bf83e0de1900fbf",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-16T20:25:47Z/"
                        }
                    ],
                    "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/d60a94dee3c0a0942c9981491bf83e0de1900fbf"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:6259",
                    "reference_id": "RHSA-2026:6259",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:6259"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:6300",
                    "reference_id": "RHSA-2026:6300",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:6300"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:6750",
                    "reference_id": "RHSA-2026:6750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:6750"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7673",
                    "reference_id": "RHSA-2026:7673",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7673"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7850",
                    "reference_id": "RHSA-2026:7850",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7850"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8854",
                    "reference_id": "RHSA-2026:8854",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8854"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8857",
                    "reference_id": "RHSA-2026:8857",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8857"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8862",
                    "reference_id": "RHSA-2026:8862",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8862"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8874",
                    "reference_id": "RHSA-2026:8874",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8874"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8876",
                    "reference_id": "RHSA-2026:8876",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8876"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:9446",
                    "reference_id": "RHSA-2026:9446",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:9446"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:9447",
                    "reference_id": "RHSA-2026:9447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:9447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:9487",
                    "reference_id": "RHSA-2026:9487",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:9487"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:9488",
                    "reference_id": "RHSA-2026:9488",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:9488"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8131-1/",
                    "reference_id": "USN-8131-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8131-1/"
                },
                {
                    "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-26-167/",
                    "reference_id": "ZDI-26-167",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-16T20:25:47Z/"
                        }
                    ],
                    "url": "https://www.zerodayinitiative.com/advisories/ZDI-26-167/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2026-3085"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4ka2-hbcv-8uh2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58849?format=api",
            "vulnerability_id": "VCID-521g-8qbp-cfh3",
            "summary": "Multiple vulnerabilities have been discovered in gst-plugins-good, the worst of which could lead to denial of service or arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1921.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1921.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1921",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13137",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13109",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13203",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13208",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13179",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13079",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12986",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17749",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17722",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17671",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17681",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17767",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17843",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17897",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17599",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17688",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1921"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130949",
                    "reference_id": "2130949",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130949"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202409-13",
                    "reference_id": "GLSA-202409-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202409-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2260",
                    "reference_id": "RHSA-2023:2260",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2260"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5555-1/",
                    "reference_id": "USN-5555-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5555-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924571?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924570?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.20.3-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.20.3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-1921"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-521g-8qbp-cfh3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36372?format=api",
            "vulnerability_id": "VCID-528p-7av9-1kgv",
            "summary": "Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47543.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47543.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47543",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24637",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24674",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32793",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32829",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32852",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3281",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32528",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32445",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32643",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32835",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34776",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34704",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34748",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3478",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43382",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43458",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47543"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47543",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47543"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331723",
                    "reference_id": "2331723",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331723"
                },
                {
                    "reference_url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch",
                    "reference_id": "8059.patch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:29:43Z/"
                        }
                    ],
                    "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch"
                },
                {
                    "reference_url": "https://securitylab.github.com/advisories/GHSL-2024-236_Gstreamer/",
                    "reference_id": "GHSL-2024-236_Gstreamer",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:29:43Z/"
                        }
                    ],
                    "url": "https://securitylab.github.com/advisories/GHSL-2024-236_Gstreamer/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202506-02",
                    "reference_id": "GLSA-202506-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202506-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:7242",
                    "reference_id": "RHSA-2025:7242",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:7242"
                },
                {
                    "reference_url": "https://gstreamer.freedesktop.org/security/sa-2024-0009.html",
                    "reference_id": "sa-2024-0009.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:29:43Z/"
                        }
                    ],
                    "url": "https://gstreamer.freedesktop.org/security/sa-2024-0009.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7176-1/",
                    "reference_id": "USN-7176-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7176-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924575?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924574?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924576?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.24.10-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.24.10-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-47543"
            ],
            "risk_score": 2.3,
            "exploitability": "0.5",
            "weighted_severity": "4.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-528p-7av9-1kgv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36376?format=api",
            "vulnerability_id": "VCID-5ry6-b22q-37gy",
            "summary": "Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47596.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47596.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47596",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23224",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23268",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32873",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32874",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32835",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3281",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32852",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32829",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32793",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32643",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32528",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32445",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32796",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32844",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43458",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43382",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47596"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47596",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47596"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331747",
                    "reference_id": "2331747",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331747"
                },
                {
                    "reference_url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch",
                    "reference_id": "8059.patch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-13T17:41:58Z/"
                        }
                    ],
                    "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch"
                },
                {
                    "reference_url": "https://securitylab.github.com/advisories/GHSL-2024-244_Gstreamer/",
                    "reference_id": "GHSL-2024-244_Gstreamer",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-13T17:41:58Z/"
                        }
                    ],
                    "url": "https://securitylab.github.com/advisories/GHSL-2024-244_Gstreamer/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202506-02",
                    "reference_id": "GLSA-202506-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202506-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:7242",
                    "reference_id": "RHSA-2025:7242",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:7242"
                },
                {
                    "reference_url": "https://gstreamer.freedesktop.org/security/sa-2024-0015.html",
                    "reference_id": "sa-2024-0015.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-13T17:41:58Z/"
                        }
                    ],
                    "url": "https://gstreamer.freedesktop.org/security/sa-2024-0015.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7176-1/",
                    "reference_id": "USN-7176-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7176-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924575?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924574?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924576?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.24.10-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.24.10-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-47596"
            ],
            "risk_score": 2.3,
            "exploitability": "0.5",
            "weighted_severity": "4.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5ry6-b22q-37gy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60063?format=api",
            "vulnerability_id": "VCID-5vfg-uj1z-zudn",
            "summary": "Multiple vulnerabilities have been found in various GStreamer\n    plug-ins, the worst of which could lead to the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10199.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10199.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10199",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86792",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86936",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.03126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86896",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86918",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.03126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86803",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86822",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86815",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86835",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86844",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86857",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86852",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86848",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86865",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8687",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86871",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86887",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86894",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10199"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10198"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10199",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10199"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5840",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5840"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5841",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5841"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5845"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1419580",
                    "reference_id": "1419580",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1419580"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201702-3",
                    "reference_id": "ASA-201702-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201702-3"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-163",
                    "reference_id": "AVG-163",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-163"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201705-10",
                    "reference_id": "GLSA-201705-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201705-10"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2060",
                    "reference_id": "RHSA-2017:2060",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2060"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3245-1/",
                    "reference_id": "USN-3245-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3245-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924564?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.10.3-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.10.3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-10199"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5vfg-uj1z-zudn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58853?format=api",
            "vulnerability_id": "VCID-6aaz-buqb-zfcm",
            "summary": "Multiple vulnerabilities have been discovered in gst-plugins-good, the worst of which could lead to denial of service or arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1924.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1924.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12955",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12901",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12903",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13003",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13023",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12992",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12887",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12803",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17595",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17495",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17499",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17548",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17662",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17708",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17428",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1752",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17581",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1924"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2131003",
                    "reference_id": "2131003",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2131003"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202409-13",
                    "reference_id": "GLSA-202409-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202409-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2260",
                    "reference_id": "RHSA-2023:2260",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2260"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5555-1/",
                    "reference_id": "USN-5555-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5555-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924571?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924570?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.20.3-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.20.3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-1924"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6aaz-buqb-zfcm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36366?format=api",
            "vulnerability_id": "VCID-6hjf-zva4-ekcv",
            "summary": "Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47537.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47537.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3101",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31058",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42632",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42655",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42619",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42591",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4265",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42636",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4257",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42508",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42509",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42425",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42569",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42621",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63323",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63368",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47537"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331722",
                    "reference_id": "2331722",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331722"
                },
                {
                    "reference_url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch",
                    "reference_id": "8059.patch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T19:15:39Z/"
                        }
                    ],
                    "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch"
                },
                {
                    "reference_url": "https://securitylab.github.com/advisories/GHSL-2024-094_Gstreamer/",
                    "reference_id": "GHSL-2024-094_Gstreamer",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T19:15:39Z/"
                        }
                    ],
                    "url": "https://securitylab.github.com/advisories/GHSL-2024-094_Gstreamer/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202506-02",
                    "reference_id": "GLSA-202506-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202506-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11119",
                    "reference_id": "RHSA-2024:11119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11119"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11121",
                    "reference_id": "RHSA-2024:11121",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11121"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11122",
                    "reference_id": "RHSA-2024:11122",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11122"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11148",
                    "reference_id": "RHSA-2024:11148",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11148"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11149",
                    "reference_id": "RHSA-2024:11149",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11149"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11298",
                    "reference_id": "RHSA-2024:11298",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11298"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11299",
                    "reference_id": "RHSA-2024:11299",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11299"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11344",
                    "reference_id": "RHSA-2024:11344",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11344"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11346",
                    "reference_id": "RHSA-2024:11346",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11346"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11348",
                    "reference_id": "RHSA-2024:11348",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11348"
                },
                {
                    "reference_url": "https://gstreamer.freedesktop.org/security/sa-2024-0005.html",
                    "reference_id": "sa-2024-0005.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T19:15:39Z/"
                        }
                    ],
                    "url": "https://gstreamer.freedesktop.org/security/sa-2024-0005.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7176-1/",
                    "reference_id": "USN-7176-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7176-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924575?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924574?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924576?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.24.10-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.24.10-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-47537"
            ],
            "risk_score": 3.8,
            "exploitability": "0.5",
            "weighted_severity": "7.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6hjf-zva4-ekcv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68427?format=api",
            "vulnerability_id": "VCID-6rvw-7p62-rbdf",
            "summary": "gstreamer1-plugins-good: GStreamer MP4 Parser Heap Overflow",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47183.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47183.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-47183",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04027",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04068",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04046",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0406",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04066",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04085",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04223",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04199",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04169",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04178",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04306",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05852",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05888",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05898",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06631",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06503",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-47183"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47183",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47183"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2387141",
                    "reference_id": "2387141",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2387141"
                },
                {
                    "reference_url": "https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md",
                    "reference_id": "ATREDIS-2025-0003.md",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-11T19:44:07Z/"
                        }
                    ],
                    "url": "https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md"
                },
                {
                    "reference_url": "https://gstreamer.freedesktop.org/security/",
                    "reference_id": "security",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-11T19:44:07Z/"
                        }
                    ],
                    "url": "https://gstreamer.freedesktop.org/security/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7717-1/",
                    "reference_id": "USN-7717-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7717-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924577?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-47183"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6rvw-7p62-rbdf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35467?format=api",
            "vulnerability_id": "VCID-771b-5s45-hbhd",
            "summary": "Multiple vulnerabilities have been found in GStreamer and its plugins, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3497.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3497.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3497",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38999",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39186",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39207",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39127",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39181",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39198",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39209",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39172",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39153",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39206",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39177",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39089",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38879",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38857",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38774",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38648",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38722",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3497"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3497",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3497"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3498",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3498"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945339",
                    "reference_id": "1945339",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945339"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986910",
                    "reference_id": "986910",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986910"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202208-31",
                    "reference_id": "GLSA-202208-31",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202208-31"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7618",
                    "reference_id": "RHSA-2022:7618",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7618"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4928-1/",
                    "reference_id": "USN-4928-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4928-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924569?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-3497"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-771b-5s45-hbhd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35471?format=api",
            "vulnerability_id": "VCID-7nn4-cj6x-uff8",
            "summary": "Multiple vulnerabilities have been found in GStreamer and its plugins, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3498.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3498.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3498",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46817",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46855",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46872",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4682",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46875",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46874",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46897",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4687",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46877",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46933",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46929",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46878",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46862",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46873",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46823",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46732",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46796",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3498"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3497",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3497"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3498",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3498"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945342",
                    "reference_id": "1945342",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945342"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986911",
                    "reference_id": "986911",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986911"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202208-31",
                    "reference_id": "GLSA-202208-31",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202208-31"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4928-1/",
                    "reference_id": "USN-4928-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4928-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924569?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-3498"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7nn4-cj6x-uff8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36378?format=api",
            "vulnerability_id": "VCID-92kd-us53-qubg",
            "summary": "Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47598.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47598.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47598",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19956",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20013",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29199",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29239",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29245",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29147",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29174",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29151",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29102",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28981",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2887",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28798",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29135",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46354",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4642",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47598"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47598",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47598"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331761",
                    "reference_id": "2331761",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331761"
                },
                {
                    "reference_url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch",
                    "reference_id": "8059.patch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:40:02Z/"
                        }
                    ],
                    "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch"
                },
                {
                    "reference_url": "https://securitylab.github.com/advisories/GHSL-2024-246_Gstreamer/",
                    "reference_id": "GHSL-2024-246_Gstreamer",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:40:02Z/"
                        }
                    ],
                    "url": "https://securitylab.github.com/advisories/GHSL-2024-246_Gstreamer/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202506-02",
                    "reference_id": "GLSA-202506-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202506-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:7242",
                    "reference_id": "RHSA-2025:7242",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:7242"
                },
                {
                    "reference_url": "https://gstreamer.freedesktop.org/security/sa-2024-0006.html",
                    "reference_id": "sa-2024-0006.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:40:02Z/"
                        }
                    ],
                    "url": "https://gstreamer.freedesktop.org/security/sa-2024-0006.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7176-1/",
                    "reference_id": "USN-7176-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7176-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924575?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924574?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924576?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.24.10-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.24.10-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-47598"
            ],
            "risk_score": 2.3,
            "exploitability": "0.5",
            "weighted_severity": "4.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-92kd-us53-qubg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36394?format=api",
            "vulnerability_id": "VCID-a741-fvg4-h3at",
            "summary": "Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47775.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47775.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47775",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20224",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20283",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29518",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29522",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29477",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29425",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29445",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29418",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29372",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29255",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29143",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29076",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29415",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29478",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46907",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4697",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47775"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47775",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47775"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331744",
                    "reference_id": "2331744",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331744"
                },
                {
                    "reference_url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8042.patch",
                    "reference_id": "8042.patch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:06:26Z/"
                        }
                    ],
                    "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8042.patch"
                },
                {
                    "reference_url": "https://securitylab.github.com/advisories/GHSL-2024-261_Gstreamer/",
                    "reference_id": "GHSL-2024-261_Gstreamer",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:06:26Z/"
                        }
                    ],
                    "url": "https://securitylab.github.com/advisories/GHSL-2024-261_Gstreamer/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202506-02",
                    "reference_id": "GLSA-202506-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202506-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:7242",
                    "reference_id": "RHSA-2025:7242",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:7242"
                },
                {
                    "reference_url": "https://gstreamer.freedesktop.org/security/sa-2024-0027.html",
                    "reference_id": "sa-2024-0027.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:06:26Z/"
                        }
                    ],
                    "url": "https://gstreamer.freedesktop.org/security/sa-2024-0027.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7176-1/",
                    "reference_id": "USN-7176-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7176-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924575?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924574?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924576?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.24.10-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.24.10-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-47775"
            ],
            "risk_score": 2.3,
            "exploitability": "0.5",
            "weighted_severity": "4.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a741-fvg4-h3at"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60062?format=api",
            "vulnerability_id": "VCID-bk2h-q83z-43cn",
            "summary": "Multiple vulnerabilities have been found in various GStreamer\n    plug-ins, the worst of which could lead to the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10198.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10198.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73208",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73287",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7326",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73303",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73311",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73338",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73351",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73218",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73239",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73212",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73248",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73262",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73267",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01673",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82252",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01673",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82216",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01673",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82231",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10198"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10198"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10199",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10199"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5840",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5840"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5841",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5841"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5845"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1419558",
                    "reference_id": "1419558",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1419558"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201702-3",
                    "reference_id": "ASA-201702-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201702-3"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-163",
                    "reference_id": "AVG-163",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-163"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201705-10",
                    "reference_id": "GLSA-201705-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201705-10"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2060",
                    "reference_id": "RHSA-2017:2060",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2060"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3245-1/",
                    "reference_id": "USN-3245-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3245-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924564?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.10.3-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.10.3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-10198"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bk2h-q83z-43cn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68428?format=api",
            "vulnerability_id": "VCID-bpqa-ngtx-pbes",
            "summary": "gstreamer1-plugins-good: GStreamer MP4 Parser Heap Overflow",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47219.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47219.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-47219",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26095",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26031",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26135",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25901",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25969",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2602",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27982",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27924",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27874",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27917",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27935",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00137",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33336",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00137",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33254",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00137",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33356",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35502",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35572",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-47219"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47219",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47219"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2387142",
                    "reference_id": "2387142",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2387142"
                },
                {
                    "reference_url": "https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md",
                    "reference_id": "ATREDIS-2025-0003.md",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-08-08T15:54:29Z/"
                        }
                    ],
                    "url": "https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md"
                },
                {
                    "reference_url": "https://gstreamer.freedesktop.org/security/",
                    "reference_id": "security",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-08-08T15:54:29Z/"
                        }
                    ],
                    "url": "https://gstreamer.freedesktop.org/security/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7717-1/",
                    "reference_id": "USN-7717-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7717-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7837-1/",
                    "reference_id": "USN-7837-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7837-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924577?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-47219"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bpqa-ngtx-pbes"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60069?format=api",
            "vulnerability_id": "VCID-byg3-424m-w3gs",
            "summary": "Multiple vulnerabilities have been found in various GStreamer\n    plug-ins, the worst of which could lead to the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9634.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9634.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9634",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.16094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94755",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.16094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94764",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.16094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94768",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.16094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94769",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.16094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94779",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.16094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94783",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.16094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94787",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.16094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94791",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.16094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94792",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.16094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94799",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.16094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94803",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.16094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94806",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.16094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94807",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.16094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94808",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.16094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94809",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.16094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94817",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.16094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94825",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9634"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9634",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9634"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9635",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9635"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9636",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9636"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397441",
                    "reference_id": "1397441",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397441"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845375",
                    "reference_id": "845375",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845375"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201705-10",
                    "reference_id": "GLSA-201705-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201705-10"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2975",
                    "reference_id": "RHSA-2016:2975",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2975"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0019",
                    "reference_id": "RHSA-2017:0019",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0019"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0020",
                    "reference_id": "RHSA-2017:0020",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0020"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924568?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.10.1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.10.1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-9634"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-byg3-424m-w3gs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60073?format=api",
            "vulnerability_id": "VCID-cnza-7ar1-f7eh",
            "summary": "Multiple vulnerabilities have been found in various GStreamer\n    plug-ins, the worst of which could lead to the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9808.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9808.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9808",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90177",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9018",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90192",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90197",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90213",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90218",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90227",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90226",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90221",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90239",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.05492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90235",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.05492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90249",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.05492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90248",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.05492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90244",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.05492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90257",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.05492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90273",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9808"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9808",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9808"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397441",
                    "reference_id": "1397441",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397441"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201705-10",
                    "reference_id": "GLSA-201705-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201705-10"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2975",
                    "reference_id": "RHSA-2016:2975",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2975"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0019",
                    "reference_id": "RHSA-2017:0019",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0019"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0020",
                    "reference_id": "RHSA-2017:0020",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0020"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924568?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.10.1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.10.1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-9808"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cnza-7ar1-f7eh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58848?format=api",
            "vulnerability_id": "VCID-exgv-kz5w-w3bq",
            "summary": "Multiple vulnerabilities have been discovered in gst-plugins-good, the worst of which could lead to denial of service or arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1920.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1920.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1920",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21961",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2212",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22169",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21952",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22033",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22088",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22104",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22062",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22003",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22001",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21995",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21949",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21808",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21797",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21784",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21694",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21765",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1920"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130935",
                    "reference_id": "2130935",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130935"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202409-13",
                    "reference_id": "GLSA-202409-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202409-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2260",
                    "reference_id": "RHSA-2023:2260",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2260"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5555-1/",
                    "reference_id": "USN-5555-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5555-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924571?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924570?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.20.3-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.20.3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-1920"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-exgv-kz5w-w3bq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60072?format=api",
            "vulnerability_id": "VCID-f1k9-rdv3-nqen",
            "summary": "Multiple vulnerabilities have been found in various GStreamer\n    plug-ins, the worst of which could lead to the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9807.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9807.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9807",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73389",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73397",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7342",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73393",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7343",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73443",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73467",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73447",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73439",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73482",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7349",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73484",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73517",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73529",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73526",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7352",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73544",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9807"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9807",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9807"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401874",
                    "reference_id": "1401874",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401874"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201705-10",
                    "reference_id": "GLSA-201705-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201705-10"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2975",
                    "reference_id": "RHSA-2016:2975",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2975"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0019",
                    "reference_id": "RHSA-2017:0019",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0019"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0020",
                    "reference_id": "RHSA-2017:0020",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0020"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924568?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.10.1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.10.1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-9807"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f1k9-rdv3-nqen"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36384?format=api",
            "vulnerability_id": "VCID-f1qr-vrev-tbdc",
            "summary": "Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47601.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47601.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47601",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28716",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28764",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39668",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39677",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39642",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39625",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39676",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39647",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39563",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39383",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39368",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39286",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39599",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39654",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52093",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52143",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47601"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47601",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47601"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331752",
                    "reference_id": "2331752",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331752"
                },
                {
                    "reference_url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch",
                    "reference_id": "8057.patch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:25:58Z/"
                        }
                    ],
                    "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch"
                },
                {
                    "reference_url": "https://securitylab.github.com/advisories/GHSL-2024-249_Gstreamer/",
                    "reference_id": "GHSL-2024-249_Gstreamer",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:25:58Z/"
                        }
                    ],
                    "url": "https://securitylab.github.com/advisories/GHSL-2024-249_Gstreamer/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202506-02",
                    "reference_id": "GLSA-202506-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202506-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:7242",
                    "reference_id": "RHSA-2025:7242",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:7242"
                },
                {
                    "reference_url": "https://gstreamer.freedesktop.org/security/sa-2024-0020.html",
                    "reference_id": "sa-2024-0020.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:25:58Z/"
                        }
                    ],
                    "url": "https://gstreamer.freedesktop.org/security/sa-2024-0020.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7176-1/",
                    "reference_id": "USN-7176-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7176-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924575?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924574?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924576?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.24.10-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.24.10-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-47601"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f1qr-vrev-tbdc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36396?format=api",
            "vulnerability_id": "VCID-fp9x-81jx-fbhz",
            "summary": "Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47776.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47776.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20224",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20283",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29518",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29522",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29477",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29425",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29445",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29418",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29372",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29255",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29143",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29076",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29415",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29478",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46907",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4697",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47776"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47776"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331750",
                    "reference_id": "2331750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331750"
                },
                {
                    "reference_url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8042.patch",
                    "reference_id": "8042.patch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:06:46Z/"
                        }
                    ],
                    "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8042.patch"
                },
                {
                    "reference_url": "https://securitylab.github.com/advisories/GHSL-2024-260_Gstreamer/",
                    "reference_id": "GHSL-2024-260_Gstreamer",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:06:46Z/"
                        }
                    ],
                    "url": "https://securitylab.github.com/advisories/GHSL-2024-260_Gstreamer/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202506-02",
                    "reference_id": "GLSA-202506-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202506-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:7242",
                    "reference_id": "RHSA-2025:7242",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:7242"
                },
                {
                    "reference_url": "https://gstreamer.freedesktop.org/security/sa-2024-0027.html",
                    "reference_id": "sa-2024-0027.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:06:46Z/"
                        }
                    ],
                    "url": "https://gstreamer.freedesktop.org/security/sa-2024-0027.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7176-1/",
                    "reference_id": "USN-7176-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7176-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924575?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924574?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924576?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.24.10-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.24.10-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-47776"
            ],
            "risk_score": 2.3,
            "exploitability": "0.5",
            "weighted_severity": "4.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fp9x-81jx-fbhz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36390?format=api",
            "vulnerability_id": "VCID-h2zj-j6va-v7hs",
            "summary": "Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47613.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47613.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47613",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23318",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23339",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23301",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23245",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2326",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23254",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23235",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23042",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23035",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23032",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23366",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23407",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23195",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28206",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28262",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47613"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47613",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47613"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331753",
                    "reference_id": "2331753",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331753"
                },
                {
                    "reference_url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8041.patch",
                    "reference_id": "8041.patch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:17:34Z/"
                        }
                    ],
                    "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8041.patch"
                },
                {
                    "reference_url": "https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/",
                    "reference_id": "GHSL-2024-115_GHSL-2024-118_Gstreamer",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:17:34Z/"
                        }
                    ],
                    "url": "https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202506-02",
                    "reference_id": "GLSA-202506-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202506-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11119",
                    "reference_id": "RHSA-2024:11119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11119"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11121",
                    "reference_id": "RHSA-2024:11121",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11121"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11122",
                    "reference_id": "RHSA-2024:11122",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11122"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11148",
                    "reference_id": "RHSA-2024:11148",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11148"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11149",
                    "reference_id": "RHSA-2024:11149",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11149"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11298",
                    "reference_id": "RHSA-2024:11298",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11298"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11299",
                    "reference_id": "RHSA-2024:11299",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11299"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11344",
                    "reference_id": "RHSA-2024:11344",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11344"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11346",
                    "reference_id": "RHSA-2024:11346",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11346"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11348",
                    "reference_id": "RHSA-2024:11348",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11348"
                },
                {
                    "reference_url": "https://gstreamer.freedesktop.org/security/sa-2024-0025.html",
                    "reference_id": "sa-2024-0025.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:17:34Z/"
                        }
                    ],
                    "url": "https://gstreamer.freedesktop.org/security/sa-2024-0025.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7176-1/",
                    "reference_id": "USN-7176-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7176-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924575?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924574?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924576?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.24.10-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.24.10-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-47613"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h2zj-j6va-v7hs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36393?format=api",
            "vulnerability_id": "VCID-hatr-ngra-qqb6",
            "summary": "Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47774.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47774.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17737",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17784",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26574",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26623",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26628",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26583",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26526",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26533",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26467",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26406",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.264",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26344",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26506",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42957",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4288",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47774"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47774"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/github/securitylab-vulnerabilities/issues/1826",
                    "reference_id": "1826",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:15:00Z/"
                        }
                    ],
                    "url": "https://github.com/github/securitylab-vulnerabilities/issues/1826"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331739",
                    "reference_id": "2331739",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331739"
                },
                {
                    "reference_url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8043.patch",
                    "reference_id": "8043.patch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:15:00Z/"
                        }
                    ],
                    "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8043.patch"
                },
                {
                    "reference_url": "https://securitylab.github.com/advisories/GHSL-2024-262_Gstreamer/",
                    "reference_id": "GHSL-2024-262_Gstreamer",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:15:00Z/"
                        }
                    ],
                    "url": "https://securitylab.github.com/advisories/GHSL-2024-262_Gstreamer/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202506-02",
                    "reference_id": "GLSA-202506-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202506-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:7242",
                    "reference_id": "RHSA-2025:7242",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:7242"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7176-1/",
                    "reference_id": "USN-7176-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7176-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924575?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924574?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924576?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.24.10-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.24.10-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-47774"
            ],
            "risk_score": 2.3,
            "exploitability": "0.5",
            "weighted_severity": "4.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hatr-ngra-qqb6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60075?format=api",
            "vulnerability_id": "VCID-hgch-q86h-4qcn",
            "summary": "Multiple vulnerabilities have been found in various GStreamer\n    plug-ins, the worst of which could lead to the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9810.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9810.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9810",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71162",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71171",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71188",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71163",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71205",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71219",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71241",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71227",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7121",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71257",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71264",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71294",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71301",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71305",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71291",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00665",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71327",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9810"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9810",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9810"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401913",
                    "reference_id": "1401913",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401913"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201705-10",
                    "reference_id": "GLSA-201705-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201705-10"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2060",
                    "reference_id": "RHSA-2017:2060",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2060"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924568?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.10.1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.10.1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-9810"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hgch-q86h-4qcn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36385?format=api",
            "vulnerability_id": "VCID-hmn3-mxh5-73fj",
            "summary": "Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47602.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47602.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23224",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23268",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32873",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32874",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32835",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3281",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32852",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32829",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32793",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32643",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32528",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32445",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32796",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32844",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43458",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43382",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47602"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47602"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331759",
                    "reference_id": "2331759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331759"
                },
                {
                    "reference_url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch",
                    "reference_id": "8057.patch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:24:18Z/"
                        }
                    ],
                    "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch"
                },
                {
                    "reference_url": "https://securitylab.github.com/advisories/GHSL-2024-250_Gstreamer/",
                    "reference_id": "GHSL-2024-250_Gstreamer",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:24:18Z/"
                        }
                    ],
                    "url": "https://securitylab.github.com/advisories/GHSL-2024-250_Gstreamer/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202506-02",
                    "reference_id": "GLSA-202506-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202506-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:7242",
                    "reference_id": "RHSA-2025:7242",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:7242"
                },
                {
                    "reference_url": "https://gstreamer.freedesktop.org/security/sa-2024-0019.html",
                    "reference_id": "sa-2024-0019.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:24:18Z/"
                        }
                    ],
                    "url": "https://gstreamer.freedesktop.org/security/sa-2024-0019.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7176-1/",
                    "reference_id": "USN-7176-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7176-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924575?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924574?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924576?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.24.10-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.24.10-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-47602"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hmn3-mxh5-73fj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36388?format=api",
            "vulnerability_id": "VCID-hxhp-4xdt-fqfp",
            "summary": "Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47606.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47606.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47606",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41556",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41584",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56394",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56399",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56409",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56385",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56367",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.564",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56369",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56291",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56311",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5629",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56343",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00724",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72651",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00724",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7262",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47606"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47606",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47606"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331760",
                    "reference_id": "2331760",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331760"
                },
                {
                    "reference_url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8032.patch",
                    "reference_id": "8032.patch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-12-11T20:43:34Z/"
                        }
                    ],
                    "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8032.patch"
                },
                {
                    "reference_url": "https://securitylab.github.com/advisories/GHSL-2024-166_Gstreamer/",
                    "reference_id": "GHSL-2024-166_Gstreamer",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-12-11T20:43:34Z/"
                        }
                    ],
                    "url": "https://securitylab.github.com/advisories/GHSL-2024-166_Gstreamer/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202506-02",
                    "reference_id": "GLSA-202506-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202506-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11119",
                    "reference_id": "RHSA-2024:11119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11119"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11121",
                    "reference_id": "RHSA-2024:11121",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11121"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11122",
                    "reference_id": "RHSA-2024:11122",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11122"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11148",
                    "reference_id": "RHSA-2024:11148",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11148"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11149",
                    "reference_id": "RHSA-2024:11149",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11149"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11298",
                    "reference_id": "RHSA-2024:11298",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11298"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11299",
                    "reference_id": "RHSA-2024:11299",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11299"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11344",
                    "reference_id": "RHSA-2024:11344",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11344"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11346",
                    "reference_id": "RHSA-2024:11346",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11346"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11348",
                    "reference_id": "RHSA-2024:11348",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11348"
                },
                {
                    "reference_url": "https://gstreamer.freedesktop.org/security/sa-2024-0014.html",
                    "reference_id": "sa-2024-0014.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-12-11T20:43:34Z/"
                        }
                    ],
                    "url": "https://gstreamer.freedesktop.org/security/sa-2024-0014.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7174-1/",
                    "reference_id": "USN-7174-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7174-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7176-1/",
                    "reference_id": "USN-7176-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7176-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924575?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924574?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924576?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.24.10-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.24.10-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-47606"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hxhp-4xdt-fqfp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60084?format=api",
            "vulnerability_id": "VCID-j1w1-4xvp-7bh8",
            "summary": "Multiple vulnerabilities have been found in various GStreamer\n    plug-ins, the worst of which could lead to the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5840.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5840.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5840",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91316",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91428",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.06856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91399",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.06856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91413",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.06856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91321",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91331",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91338",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91351",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91358",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91364",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.06856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91367",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91392",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.06856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9139",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.06856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91401",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5840"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10198"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10199",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10199"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5840",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5840"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5841",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5841"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5845"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1419588",
                    "reference_id": "1419588",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1419588"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201702-3",
                    "reference_id": "ASA-201702-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201702-3"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-163",
                    "reference_id": "AVG-163",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-163"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201705-10",
                    "reference_id": "GLSA-201705-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201705-10"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2060",
                    "reference_id": "RHSA-2017:2060",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2060"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3245-1/",
                    "reference_id": "USN-3245-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3245-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924564?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.10.3-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.10.3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-5840"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j1w1-4xvp-7bh8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36380?format=api",
            "vulnerability_id": "VCID-jzft-takg-afb4",
            "summary": "Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47599.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47599.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47599",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21862",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22098",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22092",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22046",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21905",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21894",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21882",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21789",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22212",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2226",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22043",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22124",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22178",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22198",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22158",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47599"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47599",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47599"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331748",
                    "reference_id": "2331748",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331748"
                },
                {
                    "reference_url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8040.patch",
                    "reference_id": "8040.patch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:37:52Z/"
                        }
                    ],
                    "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8040.patch"
                },
                {
                    "reference_url": "https://securitylab.github.com/advisories/GHSL-2024-247_Gstreamer/",
                    "reference_id": "GHSL-2024-247_Gstreamer",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:37:52Z/"
                        }
                    ],
                    "url": "https://securitylab.github.com/advisories/GHSL-2024-247_Gstreamer/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202506-02",
                    "reference_id": "GLSA-202506-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202506-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:7242",
                    "reference_id": "RHSA-2025:7242",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:7242"
                },
                {
                    "reference_url": "https://gstreamer.freedesktop.org/security/sa-2024-0016.html",
                    "reference_id": "sa-2024-0016.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:37:52Z/"
                        }
                    ],
                    "url": "https://gstreamer.freedesktop.org/security/sa-2024-0016.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7176-1/",
                    "reference_id": "USN-7176-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7176-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924575?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924574?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924576?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.24.10-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.24.10-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-47599"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jzft-takg-afb4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60070?format=api",
            "vulnerability_id": "VCID-k1t8-1fq9-m3gg",
            "summary": "Multiple vulnerabilities have been found in various GStreamer\n    plug-ins, the worst of which could lead to the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9635.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9635.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9635",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.16094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94755",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.16094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94764",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.16094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94768",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.16094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94769",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.16094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94779",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.16094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94783",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.16094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94787",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.16094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94791",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.16094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94792",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.16094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94799",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.16094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94803",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.16094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94806",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.16094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94807",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.16094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94808",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.16094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94809",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.16094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94817",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.16094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94825",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9635"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9634",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9634"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9635",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9635"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9636",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9636"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397441",
                    "reference_id": "1397441",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397441"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845375",
                    "reference_id": "845375",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845375"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201705-10",
                    "reference_id": "GLSA-201705-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201705-10"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2975",
                    "reference_id": "RHSA-2016:2975",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2975"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0019",
                    "reference_id": "RHSA-2017:0019",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0019"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0020",
                    "reference_id": "RHSA-2017:0020",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0020"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924568?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.10.1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.10.1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-9635"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k1t8-1fq9-m3gg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36398?format=api",
            "vulnerability_id": "VCID-kfe8-dy9e-ryc5",
            "summary": "Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47778.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47778.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47778",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24622",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24659",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34751",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3468",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34723",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34755",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34716",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34691",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34726",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34711",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00266",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50024",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00266",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50078",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00266",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50065",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00266",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5007",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62199",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6215",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47778"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47778",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47778"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331743",
                    "reference_id": "2331743",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331743"
                },
                {
                    "reference_url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8042.patch",
                    "reference_id": "8042.patch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:12:16Z/"
                        }
                    ],
                    "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8042.patch"
                },
                {
                    "reference_url": "https://securitylab.github.com/advisories/GHSL-2024-258_Gstreamer/",
                    "reference_id": "GHSL-2024-258_Gstreamer",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:12:16Z/"
                        }
                    ],
                    "url": "https://securitylab.github.com/advisories/GHSL-2024-258_Gstreamer/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202506-02",
                    "reference_id": "GLSA-202506-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202506-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:7242",
                    "reference_id": "RHSA-2025:7242",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:7242"
                },
                {
                    "reference_url": "https://gstreamer.freedesktop.org/security/sa-2024-0027.html",
                    "reference_id": "sa-2024-0027.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:12:16Z/"
                        }
                    ],
                    "url": "https://gstreamer.freedesktop.org/security/sa-2024-0027.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7176-1/",
                    "reference_id": "USN-7176-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7176-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924575?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924574?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924576?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.24.10-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.24.10-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-47778"
            ],
            "risk_score": 2.3,
            "exploitability": "0.5",
            "weighted_severity": "4.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kfe8-dy9e-ryc5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58852?format=api",
            "vulnerability_id": "VCID-m2g4-ecf6-sufy",
            "summary": "Multiple vulnerabilities have been discovered in gst-plugins-good, the worst of which could lead to denial of service or arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1923.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1923.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1923",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13044",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13137",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13191",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12989",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13068",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13118",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13088",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1305",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12999",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12901",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12903",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13003",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13023",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12992",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12887",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12803",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12955",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1923"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130959",
                    "reference_id": "2130959",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130959"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202409-13",
                    "reference_id": "GLSA-202409-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202409-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2260",
                    "reference_id": "RHSA-2023:2260",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2260"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5555-1/",
                    "reference_id": "USN-5555-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5555-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924571?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924570?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.20.3-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.20.3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-1923"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m2g4-ecf6-sufy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60085?format=api",
            "vulnerability_id": "VCID-mcdu-z138-vkgv",
            "summary": "Multiple vulnerabilities have been found in various GStreamer\n    plug-ins, the worst of which could lead to the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5841.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5841.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5841",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86758",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86903",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.03108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86861",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86884",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.03108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86769",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86787",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86785",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86805",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86813",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86827",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86823",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86819",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86835",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86839",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86838",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86855",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5841"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10198"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10199",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10199"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5840",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5840"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5841",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5841"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5845"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1419589",
                    "reference_id": "1419589",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1419589"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201702-3",
                    "reference_id": "ASA-201702-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201702-3"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-163",
                    "reference_id": "AVG-163",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-163"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201705-10",
                    "reference_id": "GLSA-201705-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201705-10"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2060",
                    "reference_id": "RHSA-2017:2060",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2060"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3245-1/",
                    "reference_id": "USN-3245-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3245-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924564?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.10.3-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.10.3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-5841"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mcdu-z138-vkgv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60071?format=api",
            "vulnerability_id": "VCID-n1tt-vu7b-skew",
            "summary": "Multiple vulnerabilities have been found in various GStreamer\n    plug-ins, the worst of which could lead to the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9636.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9636.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9636",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.1664",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94893",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.1664",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94902",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.1664",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94905",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.1664",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94907",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.1664",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94916",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.1664",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94919",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.1664",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94924",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.1664",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94927",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.1664",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94929",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.1664",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94937",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.1664",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9494",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.1664",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94944",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.1664",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94945",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.1664",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94951",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.1664",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94958",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9636"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9634",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9634"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9635",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9635"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9636",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9636"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397441",
                    "reference_id": "1397441",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397441"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845375",
                    "reference_id": "845375",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845375"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201705-10",
                    "reference_id": "GLSA-201705-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201705-10"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2975",
                    "reference_id": "RHSA-2016:2975",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2975"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0019",
                    "reference_id": "RHSA-2017:0019",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0019"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0020",
                    "reference_id": "RHSA-2017:0020",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0020"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924568?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.10.1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.10.1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-9636"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n1tt-vu7b-skew"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36374?format=api",
            "vulnerability_id": "VCID-n1x7-a5e5-ckec",
            "summary": "Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47545.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47545.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47545",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32652",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32688",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42755",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42533",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42705",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42722",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42767",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42615",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42692",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00223",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45028",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00223",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44976",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00223",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45029",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00223",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45051",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00328",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55589",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00328",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55636",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47545"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47545",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47545"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331763",
                    "reference_id": "2331763",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331763"
                },
                {
                    "reference_url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch",
                    "reference_id": "8059.patch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-13T17:44:03Z/"
                        }
                    ],
                    "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch"
                },
                {
                    "reference_url": "https://securitylab.github.com/advisories/GHSL-2024-242_Gstreamer/",
                    "reference_id": "GHSL-2024-242_Gstreamer",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-13T17:44:03Z/"
                        }
                    ],
                    "url": "https://securitylab.github.com/advisories/GHSL-2024-242_Gstreamer/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202506-02",
                    "reference_id": "GLSA-202506-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202506-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:7242",
                    "reference_id": "RHSA-2025:7242",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:7242"
                },
                {
                    "reference_url": "https://gstreamer.freedesktop.org/security/sa-2024-0010.html",
                    "reference_id": "sa-2024-0010.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-13T17:44:03Z/"
                        }
                    ],
                    "url": "https://gstreamer.freedesktop.org/security/sa-2024-0010.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7176-1/",
                    "reference_id": "USN-7176-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7176-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924575?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924574?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924576?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.24.10-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.24.10-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-47545"
            ],
            "risk_score": 2.8,
            "exploitability": "0.5",
            "weighted_severity": "5.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n1x7-a5e5-ckec"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36369?format=api",
            "vulnerability_id": "VCID-p46s-buwz-h3by",
            "summary": "Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47540.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47540.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47540",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61752",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61782",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00713",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72322",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00713",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72345",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00713",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72328",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00713",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72315",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00713",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72357",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00713",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72366",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00713",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72354",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00713",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72397",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00713",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72406",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00713",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72403",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00713",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72272",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00713",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7231",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79863",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79887",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47540"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47540",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47540"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331719",
                    "reference_id": "2331719",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331719"
                },
                {
                    "reference_url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch",
                    "reference_id": "8057.patch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:34:42Z/"
                        }
                    ],
                    "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch"
                },
                {
                    "reference_url": "https://securitylab.github.com/advisories/GHSL-2024-197_GStreamer/",
                    "reference_id": "GHSL-2024-197_GStreamer",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:34:42Z/"
                        }
                    ],
                    "url": "https://securitylab.github.com/advisories/GHSL-2024-197_GStreamer/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202506-02",
                    "reference_id": "GLSA-202506-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202506-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11119",
                    "reference_id": "RHSA-2024:11119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11119"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11121",
                    "reference_id": "RHSA-2024:11121",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11121"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11122",
                    "reference_id": "RHSA-2024:11122",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11122"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11148",
                    "reference_id": "RHSA-2024:11148",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11148"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11149",
                    "reference_id": "RHSA-2024:11149",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11149"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11298",
                    "reference_id": "RHSA-2024:11298",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11298"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11299",
                    "reference_id": "RHSA-2024:11299",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11299"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11344",
                    "reference_id": "RHSA-2024:11344",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11344"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11346",
                    "reference_id": "RHSA-2024:11346",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11346"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11348",
                    "reference_id": "RHSA-2024:11348",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11348"
                },
                {
                    "reference_url": "https://gstreamer.freedesktop.org/security/sa-2024-0017.html",
                    "reference_id": "sa-2024-0017.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T14:34:42Z/"
                        }
                    ],
                    "url": "https://gstreamer.freedesktop.org/security/sa-2024-0017.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7176-1/",
                    "reference_id": "USN-7176-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7176-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924575?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924574?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924576?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.24.10-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.24.10-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-47540"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p46s-buwz-h3by"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36397?format=api",
            "vulnerability_id": "VCID-t93h-vv13-4bck",
            "summary": "Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47777.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47777.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47777",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21348",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21403",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30766",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30769",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30726",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3068",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30704",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30686",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30653",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30476",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30362",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30281",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30675",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30734",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4884",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48903",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47777"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47777",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47777"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331741",
                    "reference_id": "2331741",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331741"
                },
                {
                    "reference_url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8042.patch",
                    "reference_id": "8042.patch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:07:19Z/"
                        }
                    ],
                    "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8042.patch"
                },
                {
                    "reference_url": "https://securitylab.github.com/advisories/GHSL-2024-259_Gstreamer/",
                    "reference_id": "GHSL-2024-259_Gstreamer",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:07:19Z/"
                        }
                    ],
                    "url": "https://securitylab.github.com/advisories/GHSL-2024-259_Gstreamer/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202506-02",
                    "reference_id": "GLSA-202506-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202506-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:7242",
                    "reference_id": "RHSA-2025:7242",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:7242"
                },
                {
                    "reference_url": "https://gstreamer.freedesktop.org/security/sa-2024-0027.html",
                    "reference_id": "sa-2024-0027.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:07:19Z/"
                        }
                    ],
                    "url": "https://gstreamer.freedesktop.org/security/sa-2024-0027.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7176-1/",
                    "reference_id": "USN-7176-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7176-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924575?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924574?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924576?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.24.10-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.24.10-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-47777"
            ],
            "risk_score": 2.3,
            "exploitability": "0.5",
            "weighted_severity": "4.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t93h-vv13-4bck"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58854?format=api",
            "vulnerability_id": "VCID-tf3v-37zu-pkaf",
            "summary": "Multiple vulnerabilities have been discovered in gst-plugins-good, the worst of which could lead to denial of service or arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1925.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1925.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1925",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13771",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13865",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13922",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13724",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13806",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13857",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13825",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13789",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13741",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13649",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13646",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13718",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1373",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13699",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13606",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1351",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13665",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1925"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2131007",
                    "reference_id": "2131007",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2131007"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202409-13",
                    "reference_id": "GLSA-202409-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202409-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2260",
                    "reference_id": "RHSA-2023:2260",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2260"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5555-1/",
                    "reference_id": "USN-5555-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5555-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924571?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924570?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.20.3-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.20.3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-1925"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tf3v-37zu-pkaf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36375?format=api",
            "vulnerability_id": "VCID-uj8y-np9h-8qg6",
            "summary": "Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47546.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47546.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00114",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30166",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00114",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30213",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39563",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39647",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39676",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39625",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39368",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39286",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39383",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39642",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41569",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4151",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4156",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4159",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52093",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52143",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47546"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47546"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331756",
                    "reference_id": "2331756",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331756"
                },
                {
                    "reference_url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch",
                    "reference_id": "8059.patch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-13T17:42:31Z/"
                        }
                    ],
                    "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch"
                },
                {
                    "reference_url": "https://securitylab.github.com/advisories/GHSL-2024-243_Gstreamer/",
                    "reference_id": "GHSL-2024-243_Gstreamer",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-13T17:42:31Z/"
                        }
                    ],
                    "url": "https://securitylab.github.com/advisories/GHSL-2024-243_Gstreamer/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202506-02",
                    "reference_id": "GLSA-202506-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202506-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:7242",
                    "reference_id": "RHSA-2025:7242",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:7242"
                },
                {
                    "reference_url": "https://gstreamer.freedesktop.org/security/sa-2024-0013.html",
                    "reference_id": "sa-2024-0013.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-13T17:42:31Z/"
                        }
                    ],
                    "url": "https://gstreamer.freedesktop.org/security/sa-2024-0013.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7176-1/",
                    "reference_id": "USN-7176-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7176-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924575?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924574?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924576?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.24.10-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.24.10-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-47546"
            ],
            "risk_score": 2.8,
            "exploitability": "0.5",
            "weighted_severity": "5.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uj8y-np9h-8qg6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64263?format=api",
            "vulnerability_id": "VCID-upbh-pvqc-4ubn",
            "summary": "GStreamer: GStreamer: Remote Code Execution via Out-Of-Bounds Write in rtpqdm2depay",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3083.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3083.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-3083",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00497",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65814",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00497",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65873",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00497",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65844",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00497",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65809",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00497",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65862",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00497",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65892",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00497",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6588",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00497",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6585",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67743",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67723",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67765",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67719",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67732",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67713",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67746",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-3083"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3083",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3083"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447498",
                    "reference_id": "2447498",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447498"
                },
                {
                    "reference_url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/d60a94dee3c0a0942c9981491bf83e0de1900fbf",
                    "reference_id": "d60a94dee3c0a0942c9981491bf83e0de1900fbf",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-16T15:25:51Z/"
                        }
                    ],
                    "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/d60a94dee3c0a0942c9981491bf83e0de1900fbf"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:6259",
                    "reference_id": "RHSA-2026:6259",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:6259"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:6300",
                    "reference_id": "RHSA-2026:6300",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:6300"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:6750",
                    "reference_id": "RHSA-2026:6750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:6750"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7673",
                    "reference_id": "RHSA-2026:7673",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7673"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7850",
                    "reference_id": "RHSA-2026:7850",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7850"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8854",
                    "reference_id": "RHSA-2026:8854",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8854"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8857",
                    "reference_id": "RHSA-2026:8857",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8857"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8862",
                    "reference_id": "RHSA-2026:8862",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8862"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8874",
                    "reference_id": "RHSA-2026:8874",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8874"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8876",
                    "reference_id": "RHSA-2026:8876",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8876"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:9446",
                    "reference_id": "RHSA-2026:9446",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:9446"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:9447",
                    "reference_id": "RHSA-2026:9447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:9447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:9487",
                    "reference_id": "RHSA-2026:9487",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:9487"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:9488",
                    "reference_id": "RHSA-2026:9488",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:9488"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8131-1/",
                    "reference_id": "USN-8131-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8131-1/"
                },
                {
                    "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-26-166/",
                    "reference_id": "ZDI-26-166",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-16T15:25:51Z/"
                        }
                    ],
                    "url": "https://www.zerodayinitiative.com/advisories/ZDI-26-166/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2026-3083"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-upbh-pvqc-4ubn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36377?format=api",
            "vulnerability_id": "VCID-v4u8-zktd-cfaq",
            "summary": "Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47597.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47597.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47597",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23502",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23539",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31578",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3161",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31632",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31598",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31274",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31194",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.314",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31634",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00135",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33216",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00135",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3314",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00135",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33183",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00135",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33219",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50225",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50278",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47597"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47597",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47597"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331755",
                    "reference_id": "2331755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331755"
                },
                {
                    "reference_url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch",
                    "reference_id": "8059.patch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:50:51Z/"
                        }
                    ],
                    "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch"
                },
                {
                    "reference_url": "https://securitylab.github.com/advisories/GHSL-2024-245_Gstreamer/",
                    "reference_id": "GHSL-2024-245_Gstreamer",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:50:51Z/"
                        }
                    ],
                    "url": "https://securitylab.github.com/advisories/GHSL-2024-245_Gstreamer/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202506-02",
                    "reference_id": "GLSA-202506-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202506-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:7242",
                    "reference_id": "RHSA-2025:7242",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:7242"
                },
                {
                    "reference_url": "https://gstreamer.freedesktop.org/security/sa-2024-0012.html",
                    "reference_id": "sa-2024-0012.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T21:50:51Z/"
                        }
                    ],
                    "url": "https://gstreamer.freedesktop.org/security/sa-2024-0012.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7176-1/",
                    "reference_id": "USN-7176-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7176-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924575?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924574?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924576?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.24.10-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.24.10-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-47597"
            ],
            "risk_score": 2.3,
            "exploitability": "0.5",
            "weighted_severity": "4.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v4u8-zktd-cfaq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36373?format=api",
            "vulnerability_id": "VCID-wxcy-bnsr-qkdn",
            "summary": "Multiple vulnerabilities have been discovered in GStreamer and GStreamer Plugins, the worst of which could lead to code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47544.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47544.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47544",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28716",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28764",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39668",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39677",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39642",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39625",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39676",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39647",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39563",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39383",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39368",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39286",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39599",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39654",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52093",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52143",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47544"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47544",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47544"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331751",
                    "reference_id": "2331751",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331751"
                },
                {
                    "reference_url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch",
                    "reference_id": "8059.patch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T16:37:30Z/"
                        }
                    ],
                    "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch"
                },
                {
                    "reference_url": "https://securitylab.github.com/advisories/GHSL-2024-238_Gstreamer/",
                    "reference_id": "GHSL-2024-238_Gstreamer",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T16:37:30Z/"
                        }
                    ],
                    "url": "https://securitylab.github.com/advisories/GHSL-2024-238_Gstreamer/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202506-02",
                    "reference_id": "GLSA-202506-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202506-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:7242",
                    "reference_id": "RHSA-2025:7242",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:7242"
                },
                {
                    "reference_url": "https://gstreamer.freedesktop.org/security/sa-2024-0011.html",
                    "reference_id": "sa-2024-0011.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T16:37:30Z/"
                        }
                    ],
                    "url": "https://gstreamer.freedesktop.org/security/sa-2024-0011.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7176-1/",
                    "reference_id": "USN-7176-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7176-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924575?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924574?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924576?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.24.10-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.24.10-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-47544"
            ],
            "risk_score": 2.8,
            "exploitability": "0.5",
            "weighted_severity": "5.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wxcy-bnsr-qkdn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78300?format=api",
            "vulnerability_id": "VCID-zup8-xngn-7bh7",
            "summary": "gstreamer-plugins-good: integer overflow leading to heap overwrite in FLAC image tag handling",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37327.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37327.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37327",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05336",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90016",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05336",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90112",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.05336",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90072",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.05336",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90069",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.05336",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90087",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.05336",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90085",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.05336",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90097",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.05336",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90028",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05336",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90033",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05336",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90048",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05336",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90053",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05336",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90063",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05336",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90061",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05336",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90055",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37327"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37327",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37327"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254539",
                    "reference_id": "2254539",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254539"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2303",
                    "reference_id": "RHSA-2024:2303",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2303"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3089",
                    "reference_id": "RHSA-2024:3089",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3089"
                },
                {
                    "reference_url": "https://gstreamer.freedesktop.org/security/sa-2023-0001.html",
                    "reference_id": "sa-2023-0001.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-05T18:28:13Z/"
                        }
                    ],
                    "url": "https://gstreamer.freedesktop.org/security/sa-2023-0001.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6268-1/",
                    "reference_id": "USN-6268-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6268-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6269-1/",
                    "reference_id": "USN-6269-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6269-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7807-1/",
                    "reference_id": "USN-7807-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7807-1/"
                },
                {
                    "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-23-903/",
                    "reference_id": "ZDI-23-903",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-05T18:28:13Z/"
                        }
                    ],
                    "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-903/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924572?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924573?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.4-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.4-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-37327"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zup8-xngn-7bh7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58855?format=api",
            "vulnerability_id": "VCID-zz2u-cmgw-k3c1",
            "summary": "Multiple vulnerabilities have been discovered in gst-plugins-good, the worst of which could lead to denial of service or arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2122.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2122.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2122",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14212",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14176",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14173",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14244",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14271",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14246",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14181",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14058",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19013",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18961",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19151",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19203",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18919",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18999",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19053",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19059",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2122"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2131018",
                    "reference_id": "2131018",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2131018"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202409-13",
                    "reference_id": "GLSA-202409-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202409-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2260",
                    "reference_id": "RHSA-2023:2260",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2260"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5555-1/",
                    "reference_id": "USN-5555-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5555-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924571?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924565?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.18.4-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924570?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.20.3-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.20.3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924563?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-6rvw-7p62-rbdf"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.22.0-5%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924567?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.26.2-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1g9u-gemh-83bw"
                        },
                        {
                            "vulnerability": "VCID-4ka2-hbcv-8uh2"
                        },
                        {
                            "vulnerability": "VCID-7q23-vqfb-mfh8"
                        },
                        {
                            "vulnerability": "VCID-upbh-pvqc-4ubn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.26.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924566?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059624?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062476?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072626?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088682?format=api",
                    "purl": "pkg:deb/debian/gst-plugins-good1.0@1.28.2-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.2-4%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-2122"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zz2u-cmgw-k3c1"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gst-plugins-good1.0@1.28.1-1%3Fdistro=trixie"
}