Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
Typedeb
Namespacedebian
Namemplayer
Version2:1.5+svn38674-2
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2:1.5+svn38681-1
Latest_non_vulnerable_version2:1.5+svn38681-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1228-m28x-bkbm
vulnerability_id VCID-1228-m28x-bkbm
summary
Multiple vulnerabilities have been found in MPlayer and the bundled
    FFmpeg, the worst of which may lead to the execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4610
reference_id
reference_type
scores
0
value 0.04522
scoring_system epss
scoring_elements 0.89204
published_at 2026-05-05T12:55:00Z
1
value 0.04522
scoring_system epss
scoring_elements 0.89109
published_at 2026-04-01T12:55:00Z
2
value 0.04522
scoring_system epss
scoring_elements 0.89117
published_at 2026-04-02T12:55:00Z
3
value 0.04522
scoring_system epss
scoring_elements 0.89131
published_at 2026-04-04T12:55:00Z
4
value 0.04522
scoring_system epss
scoring_elements 0.89134
published_at 2026-04-07T12:55:00Z
5
value 0.04522
scoring_system epss
scoring_elements 0.89152
published_at 2026-04-08T12:55:00Z
6
value 0.04522
scoring_system epss
scoring_elements 0.89157
published_at 2026-04-09T12:55:00Z
7
value 0.04522
scoring_system epss
scoring_elements 0.89167
published_at 2026-04-11T12:55:00Z
8
value 0.04522
scoring_system epss
scoring_elements 0.89163
published_at 2026-04-12T12:55:00Z
9
value 0.04522
scoring_system epss
scoring_elements 0.8916
published_at 2026-04-13T12:55:00Z
10
value 0.04522
scoring_system epss
scoring_elements 0.89173
published_at 2026-04-18T12:55:00Z
11
value 0.04522
scoring_system epss
scoring_elements 0.89171
published_at 2026-04-21T12:55:00Z
12
value 0.04522
scoring_system epss
scoring_elements 0.89187
published_at 2026-04-24T12:55:00Z
13
value 0.04522
scoring_system epss
scoring_elements 0.89192
published_at 2026-04-26T12:55:00Z
14
value 0.04522
scoring_system epss
scoring_elements 0.89196
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4610
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4610
2
reference_url http://secunia.com/advisories/34296
reference_id
reference_type
scores
url http://secunia.com/advisories/34296
3
reference_url http://www.openwall.com/lists/oss-security/2008/10/07/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/10/07/1
4
reference_url http://www.ubuntu.com/usn/USN-734-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-734-1
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=407010
reference_id 407010
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=407010
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4610
reference_id CVE-2008-4610
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-4610
27
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/32856.txt
reference_id CVE-2008-4610;OSVDB-49423
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/32856.txt
28
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/32857.txt
reference_id CVE-2008-4610;OSVDB-49424
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/32857.txt
29
reference_url https://www.securityfocus.com/bid/34136/info
reference_id CVE-2008-4610;OSVDB-49424
reference_type exploit
scores
url https://www.securityfocus.com/bid/34136/info
30
reference_url https://security.gentoo.org/glsa/201310-13
reference_id GLSA-201310-13
reference_type
scores
url https://security.gentoo.org/glsa/201310-13
31
reference_url https://usn.ubuntu.com/734-1/
reference_id USN-734-1
reference_type
scores
url https://usn.ubuntu.com/734-1/
fixed_packages
0
url pkg:deb/debian/mplayer@1.0~rc2-20?distro=trixie
purl pkg:deb/debian/mplayer@1.0~rc2-20?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-20%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
4
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2008-4610
risk_score 9.0
exploitability 2.0
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1228-m28x-bkbm
1
url VCID-1dp9-jbnu-abcm
vulnerability_id VCID-1dp9-jbnu-abcm
summary
Multiple vulnerabilities in FFmpeg may lead to the remote execution of
    arbitrary code or a Denial of Service.
references
0
reference_url http://archives.neohapsis.com/archives/fulldisclosure/2008-09/0103.html
reference_id
reference_type
scores
url http://archives.neohapsis.com/archives/fulldisclosure/2008-09/0103.html
1
reference_url http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2008-August/016352.html
reference_id
reference_type
scores
url http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2008-August/016352.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4867
reference_id
reference_type
scores
0
value 0.02422
scoring_system epss
scoring_elements 0.85197
published_at 2026-05-05T12:55:00Z
1
value 0.02422
scoring_system epss
scoring_elements 0.8506
published_at 2026-04-01T12:55:00Z
2
value 0.02422
scoring_system epss
scoring_elements 0.85073
published_at 2026-04-02T12:55:00Z
3
value 0.02422
scoring_system epss
scoring_elements 0.85091
published_at 2026-04-04T12:55:00Z
4
value 0.02422
scoring_system epss
scoring_elements 0.85095
published_at 2026-04-07T12:55:00Z
5
value 0.02422
scoring_system epss
scoring_elements 0.85116
published_at 2026-04-08T12:55:00Z
6
value 0.02422
scoring_system epss
scoring_elements 0.85124
published_at 2026-04-09T12:55:00Z
7
value 0.02422
scoring_system epss
scoring_elements 0.85138
published_at 2026-04-11T12:55:00Z
8
value 0.02422
scoring_system epss
scoring_elements 0.85136
published_at 2026-04-12T12:55:00Z
9
value 0.02422
scoring_system epss
scoring_elements 0.85132
published_at 2026-04-13T12:55:00Z
10
value 0.02422
scoring_system epss
scoring_elements 0.85154
published_at 2026-04-16T12:55:00Z
11
value 0.02422
scoring_system epss
scoring_elements 0.85157
published_at 2026-04-18T12:55:00Z
12
value 0.02422
scoring_system epss
scoring_elements 0.85155
published_at 2026-04-21T12:55:00Z
13
value 0.02422
scoring_system epss
scoring_elements 0.85178
published_at 2026-04-24T12:55:00Z
14
value 0.02422
scoring_system epss
scoring_elements 0.85187
published_at 2026-04-26T12:55:00Z
15
value 0.02422
scoring_system epss
scoring_elements 0.85184
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4867
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4867
4
reference_url http://secunia.com/advisories/34296
reference_id
reference_type
scores
url http://secunia.com/advisories/34296
5
reference_url http://secunia.com/advisories/34385
reference_id
reference_type
scores
url http://secunia.com/advisories/34385
6
reference_url http://security.gentoo.org/glsa/glsa-200903-33.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200903-33.xml
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/46324
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/46324
8
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:013
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:013
9
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:014
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:014
10
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:015
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:015
11
reference_url http://www.openwall.com/lists/oss-security/2008/10/29/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/10/29/6
12
reference_url http://www.securityfocus.com/bid/33308
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/33308
13
reference_url http://www.ubuntu.com/usn/USN-734-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-734-1
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4867
reference_id CVE-2008-4867
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-4867
30
reference_url https://security.gentoo.org/glsa/200903-33
reference_id GLSA-200903-33
reference_type
scores
url https://security.gentoo.org/glsa/200903-33
31
reference_url https://usn.ubuntu.com/734-1/
reference_id USN-734-1
reference_type
scores
url https://usn.ubuntu.com/734-1/
fixed_packages
0
url pkg:deb/debian/mplayer@1.0~rc2-14?distro=trixie
purl pkg:deb/debian/mplayer@1.0~rc2-14?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-14%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
4
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2008-4867
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1dp9-jbnu-abcm
2
url VCID-1tfb-jxj1-h7gw
vulnerability_id VCID-1tfb-jxj1-h7gw
summary
When compiled with GUI support MPlayer is vulnerable to a remotely
    exploitable buffer overflow attack.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0659
reference_id
reference_type
scores
0
value 0.04453
scoring_system epss
scoring_elements 0.89014
published_at 2026-04-01T12:55:00Z
1
value 0.04453
scoring_system epss
scoring_elements 0.89022
published_at 2026-04-02T12:55:00Z
2
value 0.04453
scoring_system epss
scoring_elements 0.89037
published_at 2026-04-04T12:55:00Z
3
value 0.04453
scoring_system epss
scoring_elements 0.89039
published_at 2026-04-07T12:55:00Z
4
value 0.04453
scoring_system epss
scoring_elements 0.89057
published_at 2026-04-08T12:55:00Z
5
value 0.04453
scoring_system epss
scoring_elements 0.89062
published_at 2026-04-09T12:55:00Z
6
value 0.04453
scoring_system epss
scoring_elements 0.89073
published_at 2026-04-11T12:55:00Z
7
value 0.04453
scoring_system epss
scoring_elements 0.89069
published_at 2026-04-12T12:55:00Z
8
value 0.04453
scoring_system epss
scoring_elements 0.89067
published_at 2026-04-13T12:55:00Z
9
value 0.04453
scoring_system epss
scoring_elements 0.89081
published_at 2026-04-18T12:55:00Z
10
value 0.04453
scoring_system epss
scoring_elements 0.89078
published_at 2026-04-21T12:55:00Z
11
value 0.04453
scoring_system epss
scoring_elements 0.89096
published_at 2026-04-24T12:55:00Z
12
value 0.04453
scoring_system epss
scoring_elements 0.89103
published_at 2026-04-26T12:55:00Z
13
value 0.04453
scoring_system epss
scoring_elements 0.89106
published_at 2026-04-29T12:55:00Z
14
value 0.04453
scoring_system epss
scoring_elements 0.89113
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0659
1
reference_url https://security.gentoo.org/glsa/200408-01
reference_id GLSA-200408-01
reference_type
scores
url https://security.gentoo.org/glsa/200408-01
2
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/308.c
reference_id OSVDB-7282;CVE-2004-0659
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/308.c
fixed_packages
0
url pkg:deb/debian/mplayer@0?distro=trixie
purl pkg:deb/debian/mplayer@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@0%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
4
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2004-0659
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1tfb-jxj1-h7gw
3
url VCID-2ddg-c99t-9ye1
vulnerability_id VCID-2ddg-c99t-9ye1
summary
Multiple vulnerabilities have been discovered in MPlayer, possibly allowing
    for the remote execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0629
reference_id
reference_type
scores
0
value 0.02652
scoring_system epss
scoring_elements 0.85688
published_at 2026-04-01T12:55:00Z
1
value 0.02652
scoring_system epss
scoring_elements 0.85701
published_at 2026-04-02T12:55:00Z
2
value 0.02652
scoring_system epss
scoring_elements 0.85719
published_at 2026-04-04T12:55:00Z
3
value 0.02652
scoring_system epss
scoring_elements 0.85725
published_at 2026-04-07T12:55:00Z
4
value 0.02652
scoring_system epss
scoring_elements 0.85744
published_at 2026-04-08T12:55:00Z
5
value 0.02652
scoring_system epss
scoring_elements 0.85755
published_at 2026-04-09T12:55:00Z
6
value 0.02652
scoring_system epss
scoring_elements 0.8577
published_at 2026-04-11T12:55:00Z
7
value 0.02652
scoring_system epss
scoring_elements 0.85767
published_at 2026-04-12T12:55:00Z
8
value 0.02652
scoring_system epss
scoring_elements 0.85763
published_at 2026-04-13T12:55:00Z
9
value 0.02652
scoring_system epss
scoring_elements 0.85781
published_at 2026-04-16T12:55:00Z
10
value 0.02652
scoring_system epss
scoring_elements 0.85786
published_at 2026-04-18T12:55:00Z
11
value 0.02652
scoring_system epss
scoring_elements 0.8578
published_at 2026-04-21T12:55:00Z
12
value 0.02827
scoring_system epss
scoring_elements 0.86206
published_at 2026-04-24T12:55:00Z
13
value 0.02827
scoring_system epss
scoring_elements 0.86215
published_at 2026-04-29T12:55:00Z
14
value 0.02827
scoring_system epss
scoring_elements 0.86234
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0629
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0629
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464533
reference_id 464533
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464533
3
reference_url https://security.gentoo.org/glsa/200803-16
reference_id GLSA-200803-16
reference_type
scores
url https://security.gentoo.org/glsa/200803-16
fixed_packages
0
url pkg:deb/debian/mplayer@1.0~rc2-8?distro=trixie
purl pkg:deb/debian/mplayer@1.0~rc2-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-8%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
4
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2008-0629
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2ddg-c99t-9ye1
4
url VCID-38xc-8rtk-qfes
vulnerability_id VCID-38xc-8rtk-qfes
summary
Multiple vulnerabilities have been discovered in MPlayer, possibly allowing
    for the remote execution of arbitrary code.
references
0
reference_url http://lists.mplayerhq.hu/pipermail/mplayer-announce/2007-June/000066.html
reference_id
reference_type
scores
url http://lists.mplayerhq.hu/pipermail/mplayer-announce/2007-June/000066.html
1
reference_url http://osvdb.org/36991
reference_id
reference_type
scores
url http://osvdb.org/36991
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-2948
reference_id
reference_type
scores
0
value 0.13236
scoring_system epss
scoring_elements 0.94176
published_at 2026-05-05T12:55:00Z
1
value 0.13236
scoring_system epss
scoring_elements 0.94104
published_at 2026-04-01T12:55:00Z
2
value 0.13236
scoring_system epss
scoring_elements 0.94113
published_at 2026-04-02T12:55:00Z
3
value 0.13236
scoring_system epss
scoring_elements 0.94125
published_at 2026-04-04T12:55:00Z
4
value 0.13236
scoring_system epss
scoring_elements 0.94129
published_at 2026-04-07T12:55:00Z
5
value 0.13236
scoring_system epss
scoring_elements 0.94138
published_at 2026-04-08T12:55:00Z
6
value 0.13236
scoring_system epss
scoring_elements 0.94142
published_at 2026-04-09T12:55:00Z
7
value 0.13236
scoring_system epss
scoring_elements 0.94147
published_at 2026-04-13T12:55:00Z
8
value 0.13236
scoring_system epss
scoring_elements 0.94163
published_at 2026-04-16T12:55:00Z
9
value 0.13236
scoring_system epss
scoring_elements 0.94168
published_at 2026-04-18T12:55:00Z
10
value 0.13236
scoring_system epss
scoring_elements 0.94167
published_at 2026-04-21T12:55:00Z
11
value 0.13236
scoring_system epss
scoring_elements 0.94169
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-2948
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2948
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2948
4
reference_url http://secunia.com/advisories/24302
reference_id
reference_type
scores
url http://secunia.com/advisories/24302
5
reference_url http://secunia.com/advisories/25713
reference_id
reference_type
scores
url http://secunia.com/advisories/25713
6
reference_url http://secunia.com/advisories/25940
reference_id
reference_type
scores
url http://secunia.com/advisories/25940
7
reference_url http://secunia.com/advisories/26083
reference_id
reference_type
scores
url http://secunia.com/advisories/26083
8
reference_url http://secunia.com/advisories/26207
reference_id
reference_type
scores
url http://secunia.com/advisories/26207
9
reference_url http://secunia.com/secunia_research/2007-55/
reference_id
reference_type
scores
url http://secunia.com/secunia_research/2007-55/
10
reference_url http://security.gentoo.org/glsa/glsa-200707-07.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200707-07.xml
11
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/34749
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/34749
12
reference_url http://svn.mplayerhq.hu/mplayer/trunk/stream/stream_cddb.c?r1=23287&r2=23470&diff_format=u
reference_id
reference_type
scores
url http://svn.mplayerhq.hu/mplayer/trunk/stream/stream_cddb.c?r1=23287&r2=23470&diff_format=u
13
reference_url http://www.debian.org/security/2007/dsa-1313
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1313
14
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:143
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:143
15
reference_url http://www.mplayerhq.hu/design7/news.html
reference_id
reference_type
scores
url http://www.mplayerhq.hu/design7/news.html
16
reference_url http://www.novell.com/linux/security/advisories/2007_14_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_14_sr.html
17
reference_url http://www.securityfocus.com/bid/24339
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24339
18
reference_url http://www.vupen.com/english/advisories/2007/2080
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2080
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_rc1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_rc1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_rc1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-2948
reference_id CVE-2007-2948
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-2948
21
reference_url https://security.gentoo.org/glsa/200707-07
reference_id GLSA-200707-07
reference_type
scores
url https://security.gentoo.org/glsa/200707-07
fixed_packages
0
url pkg:deb/debian/mplayer@1.0~rc1-14?distro=trixie
purl pkg:deb/debian/mplayer@1.0~rc1-14?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc1-14%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
4
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2007-2948
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-38xc-8rtk-qfes
5
url VCID-4f83-6dmk-rybu
vulnerability_id VCID-4f83-6dmk-rybu
summary Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-38853
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09439
published_at 2026-04-02T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09488
published_at 2026-04-04T12:55:00Z
2
value 0.00033
scoring_system epss
scoring_elements 0.094
published_at 2026-04-07T12:55:00Z
3
value 0.00033
scoring_system epss
scoring_elements 0.09474
published_at 2026-04-08T12:55:00Z
4
value 0.00033
scoring_system epss
scoring_elements 0.09522
published_at 2026-04-09T12:55:00Z
5
value 0.00033
scoring_system epss
scoring_elements 0.09535
published_at 2026-04-11T12:55:00Z
6
value 0.00033
scoring_system epss
scoring_elements 0.09506
published_at 2026-04-12T12:55:00Z
7
value 0.00033
scoring_system epss
scoring_elements 0.09489
published_at 2026-04-13T12:55:00Z
8
value 0.00033
scoring_system epss
scoring_elements 0.09382
published_at 2026-04-16T12:55:00Z
9
value 0.00033
scoring_system epss
scoring_elements 0.09383
published_at 2026-04-18T12:55:00Z
10
value 0.00033
scoring_system epss
scoring_elements 0.09533
published_at 2026-04-21T12:55:00Z
11
value 0.00033
scoring_system epss
scoring_elements 0.09579
published_at 2026-04-24T12:55:00Z
12
value 0.00033
scoring_system epss
scoring_elements 0.09546
published_at 2026-04-26T12:55:00Z
13
value 0.00033
scoring_system epss
scoring_elements 0.09504
published_at 2026-04-29T12:55:00Z
14
value 0.00033
scoring_system epss
scoring_elements 0.09415
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-38853
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38853
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38853
2
reference_url https://security.gentoo.org/glsa/202405-05
reference_id GLSA-202405-05
reference_type
scores
url https://security.gentoo.org/glsa/202405-05
fixed_packages
0
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2022-38853
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4f83-6dmk-rybu
6
url VCID-4jd9-pt54-1bag
vulnerability_id VCID-4jd9-pt54-1bag
summary Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-38851
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.18492
published_at 2026-04-02T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18546
published_at 2026-04-04T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18254
published_at 2026-04-07T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.18337
published_at 2026-04-08T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.1839
published_at 2026-04-11T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18342
published_at 2026-04-12T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.1829
published_at 2026-04-13T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18234
published_at 2026-04-16T12:55:00Z
8
value 0.00058
scoring_system epss
scoring_elements 0.18246
published_at 2026-04-18T12:55:00Z
9
value 0.00058
scoring_system epss
scoring_elements 0.18273
published_at 2026-04-21T12:55:00Z
10
value 0.00058
scoring_system epss
scoring_elements 0.18172
published_at 2026-04-24T12:55:00Z
11
value 0.00058
scoring_system epss
scoring_elements 0.18155
published_at 2026-04-26T12:55:00Z
12
value 0.00058
scoring_system epss
scoring_elements 0.18119
published_at 2026-04-29T12:55:00Z
13
value 0.00058
scoring_system epss
scoring_elements 0.1798
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-38851
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38851
2
reference_url https://security.gentoo.org/glsa/202405-05
reference_id GLSA-202405-05
reference_type
scores
url https://security.gentoo.org/glsa/202405-05
3
reference_url https://usn.ubuntu.com/5895-1/
reference_id USN-5895-1
reference_type
scores
url https://usn.ubuntu.com/5895-1/
fixed_packages
0
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2022-38851
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4jd9-pt54-1bag
7
url VCID-75p5-9stz-dffu
vulnerability_id VCID-75p5-9stz-dffu
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could lead to user-assisted execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6934
reference_id
reference_type
scores
0
value 0.03978
scoring_system epss
scoring_elements 0.88343
published_at 2026-04-01T12:55:00Z
1
value 0.03978
scoring_system epss
scoring_elements 0.88352
published_at 2026-04-02T12:55:00Z
2
value 0.03978
scoring_system epss
scoring_elements 0.88366
published_at 2026-04-04T12:55:00Z
3
value 0.03978
scoring_system epss
scoring_elements 0.88371
published_at 2026-04-07T12:55:00Z
4
value 0.03978
scoring_system epss
scoring_elements 0.8839
published_at 2026-04-08T12:55:00Z
5
value 0.03978
scoring_system epss
scoring_elements 0.88396
published_at 2026-04-09T12:55:00Z
6
value 0.03978
scoring_system epss
scoring_elements 0.88406
published_at 2026-04-11T12:55:00Z
7
value 0.03978
scoring_system epss
scoring_elements 0.88399
published_at 2026-04-13T12:55:00Z
8
value 0.03978
scoring_system epss
scoring_elements 0.88413
published_at 2026-04-16T12:55:00Z
9
value 0.03978
scoring_system epss
scoring_elements 0.88409
published_at 2026-04-21T12:55:00Z
10
value 0.03978
scoring_system epss
scoring_elements 0.88425
published_at 2026-04-24T12:55:00Z
11
value 0.03978
scoring_system epss
scoring_elements 0.8843
published_at 2026-04-26T12:55:00Z
12
value 0.03978
scoring_system epss
scoring_elements 0.88431
published_at 2026-04-29T12:55:00Z
13
value 0.03978
scoring_system epss
scoring_elements 0.88442
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6934
1
reference_url https://security.gentoo.org/glsa/201411-01
reference_id GLSA-201411-01
reference_type
scores
url https://security.gentoo.org/glsa/201411-01
fixed_packages
0
url pkg:deb/debian/mplayer@0?distro=trixie
purl pkg:deb/debian/mplayer@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@0%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
4
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2013-6934
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-75p5-9stz-dffu
8
url VCID-8uk8-jxh7-k7aa
vulnerability_id VCID-8uk8-jxh7-k7aa
summary Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-38863
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.19364
published_at 2026-04-02T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.19415
published_at 2026-04-04T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19132
published_at 2026-04-07T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.19212
published_at 2026-04-08T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.19264
published_at 2026-04-09T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.1927
published_at 2026-04-11T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.19224
published_at 2026-04-12T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.19169
published_at 2026-04-13T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.1913
published_at 2026-04-16T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.19139
published_at 2026-04-18T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.19147
published_at 2026-04-21T12:55:00Z
11
value 0.00061
scoring_system epss
scoring_elements 0.19039
published_at 2026-04-24T12:55:00Z
12
value 0.00061
scoring_system epss
scoring_elements 0.19028
published_at 2026-04-26T12:55:00Z
13
value 0.00061
scoring_system epss
scoring_elements 0.18984
published_at 2026-04-29T12:55:00Z
14
value 0.00061
scoring_system epss
scoring_elements 0.18863
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-38863
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38863
2
reference_url https://security.gentoo.org/glsa/202405-05
reference_id GLSA-202405-05
reference_type
scores
url https://security.gentoo.org/glsa/202405-05
3
reference_url https://usn.ubuntu.com/5895-1/
reference_id USN-5895-1
reference_type
scores
url https://usn.ubuntu.com/5895-1/
fixed_packages
0
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2022-38863
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8uk8-jxh7-k7aa
9
url VCID-9tg7-9r5m-dkgn
vulnerability_id VCID-9tg7-9r5m-dkgn
summary Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-38861
reference_id
reference_type
scores
0
value 0.00069
scoring_system epss
scoring_elements 0.21284
published_at 2026-04-02T12:55:00Z
1
value 0.00069
scoring_system epss
scoring_elements 0.21337
published_at 2026-04-04T12:55:00Z
2
value 0.00069
scoring_system epss
scoring_elements 0.2109
published_at 2026-04-07T12:55:00Z
3
value 0.00069
scoring_system epss
scoring_elements 0.2117
published_at 2026-04-08T12:55:00Z
4
value 0.00069
scoring_system epss
scoring_elements 0.2123
published_at 2026-04-09T12:55:00Z
5
value 0.00069
scoring_system epss
scoring_elements 0.21241
published_at 2026-04-11T12:55:00Z
6
value 0.00069
scoring_system epss
scoring_elements 0.21199
published_at 2026-04-12T12:55:00Z
7
value 0.00069
scoring_system epss
scoring_elements 0.21147
published_at 2026-04-13T12:55:00Z
8
value 0.00069
scoring_system epss
scoring_elements 0.2114
published_at 2026-04-16T12:55:00Z
9
value 0.00069
scoring_system epss
scoring_elements 0.2115
published_at 2026-04-18T12:55:00Z
10
value 0.00069
scoring_system epss
scoring_elements 0.21127
published_at 2026-04-21T12:55:00Z
11
value 0.00069
scoring_system epss
scoring_elements 0.20998
published_at 2026-04-24T12:55:00Z
12
value 0.00069
scoring_system epss
scoring_elements 0.21003
published_at 2026-04-26T12:55:00Z
13
value 0.00069
scoring_system epss
scoring_elements 0.20974
published_at 2026-04-29T12:55:00Z
14
value 0.00069
scoring_system epss
scoring_elements 0.20872
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-38861
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38861
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021013
reference_id 1021013
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021013
3
reference_url https://security.gentoo.org/glsa/202405-05
reference_id GLSA-202405-05
reference_type
scores
url https://security.gentoo.org/glsa/202405-05
4
reference_url https://usn.ubuntu.com/5895-1/
reference_id USN-5895-1
reference_type
scores
url https://usn.ubuntu.com/5895-1/
fixed_packages
0
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2022-38861
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9tg7-9r5m-dkgn
10
url VCID-9vx1-3zb9-5bf1
vulnerability_id VCID-9vx1-3zb9-5bf1
summary Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-38866
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20954
published_at 2026-04-02T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.21012
published_at 2026-04-04T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20729
published_at 2026-04-07T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20807
published_at 2026-04-08T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20868
published_at 2026-04-09T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20883
published_at 2026-04-11T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.2084
published_at 2026-04-12T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20788
published_at 2026-04-13T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20778
published_at 2026-04-16T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.2077
published_at 2026-04-18T12:55:00Z
10
value 0.00067
scoring_system epss
scoring_elements 0.20756
published_at 2026-04-21T12:55:00Z
11
value 0.00067
scoring_system epss
scoring_elements 0.20638
published_at 2026-04-24T12:55:00Z
12
value 0.00067
scoring_system epss
scoring_elements 0.20634
published_at 2026-04-26T12:55:00Z
13
value 0.00067
scoring_system epss
scoring_elements 0.206
published_at 2026-04-29T12:55:00Z
14
value 0.00067
scoring_system epss
scoring_elements 0.20494
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-38866
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38866
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38866
2
reference_url https://security.gentoo.org/glsa/202405-05
reference_id GLSA-202405-05
reference_type
scores
url https://security.gentoo.org/glsa/202405-05
3
reference_url https://usn.ubuntu.com/5895-1/
reference_id USN-5895-1
reference_type
scores
url https://usn.ubuntu.com/5895-1/
fixed_packages
0
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2022-38866
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9vx1-3zb9-5bf1
11
url VCID-aphu-dez9-ryc2
vulnerability_id VCID-aphu-dez9-ryc2
summary Multiple buffer overflows in the Real-Time Streaming Protocol (RTSP) client for (1) MPlayer before 1.0pre4 and (2) xine lib (xine-lib) before 1-rc4, when playing Real RTSP (realrtsp) streams, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (a) long URLs, (b) long Real server responses, or (c) long Real Data Transport (RDT) packets.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0433
reference_id
reference_type
scores
0
value 0.03088
scoring_system epss
scoring_elements 0.86722
published_at 2026-04-01T12:55:00Z
1
value 0.03088
scoring_system epss
scoring_elements 0.86732
published_at 2026-04-02T12:55:00Z
2
value 0.03088
scoring_system epss
scoring_elements 0.86752
published_at 2026-04-04T12:55:00Z
3
value 0.03088
scoring_system epss
scoring_elements 0.8675
published_at 2026-04-07T12:55:00Z
4
value 0.03088
scoring_system epss
scoring_elements 0.8677
published_at 2026-04-08T12:55:00Z
5
value 0.03088
scoring_system epss
scoring_elements 0.86779
published_at 2026-04-09T12:55:00Z
6
value 0.03088
scoring_system epss
scoring_elements 0.86792
published_at 2026-04-11T12:55:00Z
7
value 0.03088
scoring_system epss
scoring_elements 0.86789
published_at 2026-04-12T12:55:00Z
8
value 0.03088
scoring_system epss
scoring_elements 0.86784
published_at 2026-04-13T12:55:00Z
9
value 0.03088
scoring_system epss
scoring_elements 0.86799
published_at 2026-04-16T12:55:00Z
10
value 0.03088
scoring_system epss
scoring_elements 0.86804
published_at 2026-04-18T12:55:00Z
11
value 0.03088
scoring_system epss
scoring_elements 0.86802
published_at 2026-04-21T12:55:00Z
12
value 0.03088
scoring_system epss
scoring_elements 0.86817
published_at 2026-04-24T12:55:00Z
13
value 0.03088
scoring_system epss
scoring_elements 0.86824
published_at 2026-04-26T12:55:00Z
14
value 0.03088
scoring_system epss
scoring_elements 0.86825
published_at 2026-04-29T12:55:00Z
15
value 0.03088
scoring_system epss
scoring_elements 0.86848
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0433
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0433
fixed_packages
0
url pkg:deb/debian/mplayer@1.0~pre6a-1?distro=trixie
purl pkg:deb/debian/mplayer@1.0~pre6a-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~pre6a-1%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
4
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2004-0433
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aphu-dez9-ryc2
12
url VCID-bv1x-tr6m-qke1
vulnerability_id VCID-bv1x-tr6m-qke1
summary
Multiple vulnerabilities in FFmpeg may lead to the remote execution of
    arbitrary code or a Denial of Service.
references
0
reference_url http://archives.neohapsis.com/archives/fulldisclosure/2008-09/0103.html
reference_id
reference_type
scores
url http://archives.neohapsis.com/archives/fulldisclosure/2008-09/0103.html
1
reference_url http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2008-August/016136.html
reference_id
reference_type
scores
url http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2008-August/016136.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4868
reference_id
reference_type
scores
0
value 0.00728
scoring_system epss
scoring_elements 0.72707
published_at 2026-05-05T12:55:00Z
1
value 0.00728
scoring_system epss
scoring_elements 0.72577
published_at 2026-04-07T12:55:00Z
2
value 0.00728
scoring_system epss
scoring_elements 0.72584
published_at 2026-04-02T12:55:00Z
3
value 0.00728
scoring_system epss
scoring_elements 0.72601
published_at 2026-04-04T12:55:00Z
4
value 0.00728
scoring_system epss
scoring_elements 0.72616
published_at 2026-04-08T12:55:00Z
5
value 0.00728
scoring_system epss
scoring_elements 0.72628
published_at 2026-04-09T12:55:00Z
6
value 0.00728
scoring_system epss
scoring_elements 0.72651
published_at 2026-04-11T12:55:00Z
7
value 0.00728
scoring_system epss
scoring_elements 0.72634
published_at 2026-04-12T12:55:00Z
8
value 0.00728
scoring_system epss
scoring_elements 0.72624
published_at 2026-04-13T12:55:00Z
9
value 0.00728
scoring_system epss
scoring_elements 0.72666
published_at 2026-04-16T12:55:00Z
10
value 0.00728
scoring_system epss
scoring_elements 0.72676
published_at 2026-04-18T12:55:00Z
11
value 0.00728
scoring_system epss
scoring_elements 0.72668
published_at 2026-04-21T12:55:00Z
12
value 0.00728
scoring_system epss
scoring_elements 0.72709
published_at 2026-04-24T12:55:00Z
13
value 0.00728
scoring_system epss
scoring_elements 0.72719
published_at 2026-04-26T12:55:00Z
14
value 0.00728
scoring_system epss
scoring_elements 0.72715
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4868
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4868
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4868
4
reference_url http://secunia.com/advisories/34385
reference_id
reference_type
scores
url http://secunia.com/advisories/34385
5
reference_url http://security.gentoo.org/glsa/glsa-200903-33.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200903-33.xml
6
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/46325
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/46325
7
reference_url http://www.openwall.com/lists/oss-security/2008/10/29/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/10/29/6
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4868
reference_id CVE-2008-4868
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-4868
24
reference_url https://security.gentoo.org/glsa/200903-33
reference_id GLSA-200903-33
reference_type
scores
url https://security.gentoo.org/glsa/200903-33
fixed_packages
0
url pkg:deb/debian/mplayer@1.0~rc2-14?distro=trixie
purl pkg:deb/debian/mplayer@1.0~rc2-14?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-14%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
4
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2008-4868
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bv1x-tr6m-qke1
13
url VCID-e178-xa31-h3c4
vulnerability_id VCID-e178-xa31-h3c4
summary Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-38850
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.12332
published_at 2026-04-02T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.12379
published_at 2026-04-04T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.1218
published_at 2026-04-07T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.1226
published_at 2026-04-08T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.1231
published_at 2026-04-09T12:55:00Z
5
value 0.0004
scoring_system epss
scoring_elements 0.12318
published_at 2026-04-11T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.12282
published_at 2026-04-12T12:55:00Z
7
value 0.0004
scoring_system epss
scoring_elements 0.12245
published_at 2026-04-13T12:55:00Z
8
value 0.0004
scoring_system epss
scoring_elements 0.12134
published_at 2026-04-16T12:55:00Z
9
value 0.0004
scoring_system epss
scoring_elements 0.12136
published_at 2026-04-18T12:55:00Z
10
value 0.0004
scoring_system epss
scoring_elements 0.12246
published_at 2026-04-21T12:55:00Z
11
value 0.0004
scoring_system epss
scoring_elements 0.12226
published_at 2026-04-24T12:55:00Z
12
value 0.0004
scoring_system epss
scoring_elements 0.12191
published_at 2026-04-26T12:55:00Z
13
value 0.0004
scoring_system epss
scoring_elements 0.12081
published_at 2026-04-29T12:55:00Z
14
value 0.0004
scoring_system epss
scoring_elements 0.11994
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-38850
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38850
2
reference_url https://security.gentoo.org/glsa/202405-05
reference_id GLSA-202405-05
reference_type
scores
url https://security.gentoo.org/glsa/202405-05
3
reference_url https://usn.ubuntu.com/5895-1/
reference_id USN-5895-1
reference_type
scores
url https://usn.ubuntu.com/5895-1/
fixed_packages
0
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2022-38850
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e178-xa31-h3c4
14
url VCID-equb-e7sz-d7ev
vulnerability_id VCID-equb-e7sz-d7ev
summary
Two vulnerabilities have been found in MPlayer which could lead to the
    remote execution of arbitrary code.
references
0
reference_url http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/librtsp/rtsp.c?r1=1.18&r2=1.19&diff_format=u
reference_id
reference_type
scores
url http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/librtsp/rtsp.c?r1=1.18&r2=1.19&diff_format=u
1
reference_url http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/mms.c?r1=1.55&r2=1.56&diff_format=u
reference_id
reference_type
scores
url http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/mms.c?r1=1.55&r2=1.56&diff_format=u
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-1195
reference_id
reference_type
scores
0
value 0.02154
scoring_system epss
scoring_elements 0.84343
published_at 2026-05-05T12:55:00Z
1
value 0.02154
scoring_system epss
scoring_elements 0.8419
published_at 2026-04-01T12:55:00Z
2
value 0.02154
scoring_system epss
scoring_elements 0.84203
published_at 2026-04-02T12:55:00Z
3
value 0.02154
scoring_system epss
scoring_elements 0.84221
published_at 2026-04-04T12:55:00Z
4
value 0.02154
scoring_system epss
scoring_elements 0.84222
published_at 2026-04-07T12:55:00Z
5
value 0.02154
scoring_system epss
scoring_elements 0.84244
published_at 2026-04-08T12:55:00Z
6
value 0.02154
scoring_system epss
scoring_elements 0.84251
published_at 2026-04-09T12:55:00Z
7
value 0.02154
scoring_system epss
scoring_elements 0.84269
published_at 2026-04-11T12:55:00Z
8
value 0.02154
scoring_system epss
scoring_elements 0.84263
published_at 2026-04-12T12:55:00Z
9
value 0.02154
scoring_system epss
scoring_elements 0.8426
published_at 2026-04-13T12:55:00Z
10
value 0.02154
scoring_system epss
scoring_elements 0.84281
published_at 2026-04-16T12:55:00Z
11
value 0.02154
scoring_system epss
scoring_elements 0.84283
published_at 2026-04-18T12:55:00Z
12
value 0.02154
scoring_system epss
scoring_elements 0.84286
published_at 2026-04-21T12:55:00Z
13
value 0.02154
scoring_system epss
scoring_elements 0.84311
published_at 2026-04-24T12:55:00Z
14
value 0.02154
scoring_system epss
scoring_elements 0.8432
published_at 2026-04-26T12:55:00Z
15
value 0.02154
scoring_system epss
scoring_elements 0.84325
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-1195
3
reference_url http://seclists.org/lists/bugtraq/2005/Apr/0337.html
reference_id
reference_type
scores
url http://seclists.org/lists/bugtraq/2005/Apr/0337.html
4
reference_url http://secunia.com/advisories/15014
reference_id
reference_type
scores
url http://secunia.com/advisories/15014
5
reference_url http://securitytracker.com/id?1013771
reference_id
reference_type
scores
url http://securitytracker.com/id?1013771
6
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/20171
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/20171
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/20175
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/20175
8
reference_url http://www.gentoo.org/security/en/glsa/glsa-200504-19.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200504-19.xml
9
reference_url http://www.mplayerhq.hu/homepage/design7/news.html#vuln10
reference_id
reference_type
scores
url http://www.mplayerhq.hu/homepage/design7/news.html#vuln10
10
reference_url http://www.mplayerhq.hu/homepage/design7/news.html#vuln11
reference_id
reference_type
scores
url http://www.mplayerhq.hu/homepage/design7/news.html#vuln11
11
reference_url http://www.osvdb.org/15711
reference_id
reference_type
scores
url http://www.osvdb.org/15711
12
reference_url http://www.osvdb.org/15712
reference_id
reference_type
scores
url http://www.osvdb.org/15712
13
reference_url http://www.securityfocus.com/archive/1/396703
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/396703
14
reference_url http://www.securityfocus.com/bid/13271
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/13271
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_rc2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_rc3a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3a:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_rc3b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3b:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_rc3c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3c:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-1195
reference_id CVE-2005-1195
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-1195
32
reference_url https://security.gentoo.org/glsa/200504-19
reference_id GLSA-200504-19
reference_type
scores
url https://security.gentoo.org/glsa/200504-19
33
reference_url https://usn.ubuntu.com/123-1/
reference_id USN-123-1
reference_type
scores
url https://usn.ubuntu.com/123-1/
fixed_packages
0
url pkg:deb/debian/mplayer@0?distro=trixie
purl pkg:deb/debian/mplayer@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@0%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
4
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2005-1195
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-equb-e7sz-d7ev
15
url VCID-evnt-mtjq-mueg
vulnerability_id VCID-evnt-mtjq-mueg
summary Heap-based buffer overflow in the demux_open_bmp function in demux_bmp.c for Unix MPlayer 1.0pre5 allows remote attackers to execute arbitrary code via a bitmap (BMP) file containing a large biClrUsed field.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-1309
reference_id
reference_type
scores
0
value 0.05476
scoring_system epss
scoring_elements 0.90242
published_at 2026-05-05T12:55:00Z
1
value 0.05476
scoring_system epss
scoring_elements 0.90161
published_at 2026-04-01T12:55:00Z
2
value 0.05476
scoring_system epss
scoring_elements 0.90164
published_at 2026-04-02T12:55:00Z
3
value 0.05476
scoring_system epss
scoring_elements 0.90176
published_at 2026-04-04T12:55:00Z
4
value 0.05476
scoring_system epss
scoring_elements 0.90181
published_at 2026-04-07T12:55:00Z
5
value 0.05476
scoring_system epss
scoring_elements 0.90197
published_at 2026-04-08T12:55:00Z
6
value 0.05476
scoring_system epss
scoring_elements 0.90202
published_at 2026-04-09T12:55:00Z
7
value 0.05476
scoring_system epss
scoring_elements 0.90211
published_at 2026-04-11T12:55:00Z
8
value 0.05476
scoring_system epss
scoring_elements 0.9021
published_at 2026-04-12T12:55:00Z
9
value 0.05476
scoring_system epss
scoring_elements 0.90205
published_at 2026-04-13T12:55:00Z
10
value 0.05476
scoring_system epss
scoring_elements 0.90223
published_at 2026-04-16T12:55:00Z
11
value 0.05476
scoring_system epss
scoring_elements 0.90224
published_at 2026-04-18T12:55:00Z
12
value 0.05476
scoring_system epss
scoring_elements 0.9022
published_at 2026-04-21T12:55:00Z
13
value 0.05476
scoring_system epss
scoring_elements 0.90234
published_at 2026-04-24T12:55:00Z
14
value 0.05476
scoring_system epss
scoring_elements 0.90233
published_at 2026-04-26T12:55:00Z
15
value 0.05476
scoring_system epss
scoring_elements 0.9023
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-1309
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1309
2
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/18527
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/18527
3
reference_url http://www1.mplayerhq.hu/MPlayer/releases/ChangeLog
reference_id
reference_type
scores
url http://www1.mplayerhq.hu/MPlayer/releases/ChangeLog
4
reference_url http://www.idefense.com/application/poi/display?id=168
reference_id
reference_type
scores
url http://www.idefense.com/application/poi/display?id=168
5
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2004:157
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2004:157
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:unix_mplayer:1.0_pre5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:unix_mplayer:1.0_pre5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:unix_mplayer:1.0_pre5:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2004-1309
reference_id CVE-2004-1309
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2004-1309
fixed_packages
0
url pkg:deb/debian/mplayer@1.0~pre6a-1?distro=trixie
purl pkg:deb/debian/mplayer@1.0~pre6a-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~pre6a-1%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
4
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2004-1309
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-evnt-mtjq-mueg
16
url VCID-ff91-hyy8-nqc3
vulnerability_id VCID-ff91-hyy8-nqc3
summary Heap-based buffer overflow in the pnm_get_chunk function for xine 0.99.2, and other packages such as MPlayer that use the same code, allows remote attackers to execute arbitrary code via long PNA_TAG values, a different vulnerability than CVE-2004-1188.
references
0
reference_url http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/pnm.c?r1=1.20&r2=1.21
reference_id
reference_type
scores
url http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/pnm.c?r1=1.20&r2=1.21
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-1187
reference_id
reference_type
scores
0
value 0.05704
scoring_system epss
scoring_elements 0.90453
published_at 2026-05-05T12:55:00Z
1
value 0.05704
scoring_system epss
scoring_elements 0.90379
published_at 2026-04-01T12:55:00Z
2
value 0.05704
scoring_system epss
scoring_elements 0.90382
published_at 2026-04-02T12:55:00Z
3
value 0.05704
scoring_system epss
scoring_elements 0.90394
published_at 2026-04-04T12:55:00Z
4
value 0.05704
scoring_system epss
scoring_elements 0.90398
published_at 2026-04-07T12:55:00Z
5
value 0.05704
scoring_system epss
scoring_elements 0.90412
published_at 2026-04-08T12:55:00Z
6
value 0.05704
scoring_system epss
scoring_elements 0.90419
published_at 2026-04-09T12:55:00Z
7
value 0.05704
scoring_system epss
scoring_elements 0.90426
published_at 2026-04-12T12:55:00Z
8
value 0.05704
scoring_system epss
scoring_elements 0.90418
published_at 2026-04-13T12:55:00Z
9
value 0.05704
scoring_system epss
scoring_elements 0.90434
published_at 2026-04-18T12:55:00Z
10
value 0.05704
scoring_system epss
scoring_elements 0.90431
published_at 2026-04-21T12:55:00Z
11
value 0.05704
scoring_system epss
scoring_elements 0.90445
published_at 2026-04-24T12:55:00Z
12
value 0.05704
scoring_system epss
scoring_elements 0.90444
published_at 2026-04-26T12:55:00Z
13
value 0.05704
scoring_system epss
scoring_elements 0.90441
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-1187
2
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/18640
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/18640
3
reference_url http://www.idefense.com/application/poi/display?id=176&type=vulnerabilities
reference_id
reference_type
scores
url http://www.idefense.com/application/poi/display?id=176&type=vulnerabilities
4
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:011
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:011
5
reference_url http://www.mplayerhq.hu/MPlayer/patches/pnm_fix_20041215.diff
reference_id
reference_type
scores
url http://www.mplayerhq.hu/MPlayer/patches/pnm_fix_20041215.diff
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:head_cvs:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:head_cvs:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:head_cvs:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:0.9.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:0.9.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:0.9.13:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:0.9.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:0.9.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:0.9.18:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:0.9.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:0.9.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:0.9.8:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_alpha:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_alpha:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_alpha:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_beta1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_beta10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta10:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_beta11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta11:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_beta12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta12:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_beta2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_beta3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta3:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_beta4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta4:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_beta5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta5:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_beta6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta6:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_beta7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta7:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_beta8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta8:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_beta9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta9:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_rc0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc0a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_rc0a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc0a:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_rc1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_rc2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_rc3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc3:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc3a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_rc3a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc3a:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc3b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_rc3b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc3b:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_rc4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc4:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_rc5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc5:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_rc6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc6:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc6a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_rc6a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc6a:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_rc7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc7:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_rc8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc8:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:0.9.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.8:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.99:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:0.99:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.99:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_alpha:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_alpha:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_alpha:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_rc0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_rc1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc1:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_rc2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc2:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_rc3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_rc3a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3a:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_rc3b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3b:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_rc3c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3c:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_rc4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc4:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_rc5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc5:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_rc6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc6:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc6a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_rc6a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc6a:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_rc7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc7:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/detail/CVE-2004-1187
reference_id CVE-2004-1187
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2004-1187
fixed_packages
0
url pkg:deb/debian/mplayer@0?distro=trixie
purl pkg:deb/debian/mplayer@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@0%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
4
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2004-1187
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ff91-hyy8-nqc3
17
url VCID-fjy3-bfzh-7beu
vulnerability_id VCID-fjy3-bfzh-7beu
summary
Multiple vulnerabilities have been found in MPlayer and the bundled
    FFmpeg, the worst of which may lead to the execution of arbitrary code.
references
0
reference_url http://git.mplayer2.org/mplayer2/commit/?id=27b88a09c5319deb62221b8cd0ecc14cd1136e4a
reference_id
reference_type
scores
url http://git.mplayer2.org/mplayer2/commit/?id=27b88a09c5319deb62221b8cd0ecc14cd1136e4a
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3625
reference_id
reference_type
scores
0
value 0.68101
scoring_system epss
scoring_elements 0.98612
published_at 2026-05-05T12:55:00Z
1
value 0.68101
scoring_system epss
scoring_elements 0.98582
published_at 2026-04-01T12:55:00Z
2
value 0.68101
scoring_system epss
scoring_elements 0.98584
published_at 2026-04-02T12:55:00Z
3
value 0.68101
scoring_system epss
scoring_elements 0.98587
published_at 2026-04-04T12:55:00Z
4
value 0.68101
scoring_system epss
scoring_elements 0.98589
published_at 2026-04-07T12:55:00Z
5
value 0.68101
scoring_system epss
scoring_elements 0.98591
published_at 2026-04-08T12:55:00Z
6
value 0.68101
scoring_system epss
scoring_elements 0.98592
published_at 2026-04-09T12:55:00Z
7
value 0.68101
scoring_system epss
scoring_elements 0.98595
published_at 2026-04-12T12:55:00Z
8
value 0.68101
scoring_system epss
scoring_elements 0.98597
published_at 2026-04-13T12:55:00Z
9
value 0.68101
scoring_system epss
scoring_elements 0.98602
published_at 2026-04-21T12:55:00Z
10
value 0.68101
scoring_system epss
scoring_elements 0.98603
published_at 2026-04-18T12:55:00Z
11
value 0.68101
scoring_system epss
scoring_elements 0.98606
published_at 2026-04-24T12:55:00Z
12
value 0.68101
scoring_system epss
scoring_elements 0.98607
published_at 2026-04-26T12:55:00Z
13
value 0.68101
scoring_system epss
scoring_elements 0.98608
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3625
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3625
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3625
3
reference_url http://secunia.com/advisories/55486
reference_id
reference_type
scores
url http://secunia.com/advisories/55486
4
reference_url http://security.gentoo.org/glsa/glsa-201310-13.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201310-13.xml
5
reference_url https://labs.mwrinfosecurity.com/system/assets/149/original/mwri_mplayer-sami-subtitles_2011-08-12.pdf
reference_id
reference_type
scores
url https://labs.mwrinfosecurity.com/system/assets/149/original/mwri_mplayer-sami-subtitles_2011-08-12.pdf
6
reference_url http://www.openwall.com/lists/oss-security/2011/10/18/12
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2011/10/18/12
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=645987
reference_id 645987
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=645987
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer2:mplayer2:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer2:mplayer2:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer2:mplayer2:-:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ricardo_villalba:smplayer:0.6.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ricardo_villalba:smplayer:0.6.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ricardo_villalba:smplayer:0.6.9:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-3625
reference_id CVE-2011-3625
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-3625
11
reference_url https://security.gentoo.org/glsa/201310-13
reference_id GLSA-201310-13
reference_type
scores
url https://security.gentoo.org/glsa/201310-13
12
reference_url http://labs.mwrinfosecurity.com/files/Advisories/mwri_mplayer-sami-subtitles_2011-08-12.pdf
reference_id OSVDB-74604;CVE-2011-3625
reference_type exploit
scores
url http://labs.mwrinfosecurity.com/files/Advisories/mwri_mplayer-sami-subtitles_2011-08-12.pdf
13
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/18954.rb
reference_id OSVDB-74604;CVE-2011-3625
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/18954.rb
fixed_packages
0
url pkg:deb/debian/mplayer@2:1.0~rc4.dfsg1%2Bsvn33713-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.0~rc4.dfsg1%2Bsvn33713-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.0~rc4.dfsg1%252Bsvn33713-2%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
4
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2011-3625
risk_score 10.0
exploitability 2.0
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fjy3-bfzh-7beu
18
url VCID-fw24-pxsc-7bek
vulnerability_id VCID-fw24-pxsc-7bek
summary
Multiple vulnerabilities in MPlayer may lead to the execution of arbitrary
    code or a Denial of Service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5616
reference_id
reference_type
scores
0
value 0.25394
scoring_system epss
scoring_elements 0.96238
published_at 2026-05-05T12:55:00Z
1
value 0.25394
scoring_system epss
scoring_elements 0.96173
published_at 2026-04-01T12:55:00Z
2
value 0.25394
scoring_system epss
scoring_elements 0.9618
published_at 2026-04-02T12:55:00Z
3
value 0.25394
scoring_system epss
scoring_elements 0.96188
published_at 2026-04-04T12:55:00Z
4
value 0.25394
scoring_system epss
scoring_elements 0.96191
published_at 2026-04-07T12:55:00Z
5
value 0.25394
scoring_system epss
scoring_elements 0.96201
published_at 2026-04-08T12:55:00Z
6
value 0.25394
scoring_system epss
scoring_elements 0.96204
published_at 2026-04-09T12:55:00Z
7
value 0.25394
scoring_system epss
scoring_elements 0.96209
published_at 2026-04-11T12:55:00Z
8
value 0.25394
scoring_system epss
scoring_elements 0.96208
published_at 2026-04-12T12:55:00Z
9
value 0.25394
scoring_system epss
scoring_elements 0.9621
published_at 2026-04-13T12:55:00Z
10
value 0.25394
scoring_system epss
scoring_elements 0.96218
published_at 2026-04-16T12:55:00Z
11
value 0.25394
scoring_system epss
scoring_elements 0.96223
published_at 2026-04-21T12:55:00Z
12
value 0.25394
scoring_system epss
scoring_elements 0.96225
published_at 2026-04-24T12:55:00Z
13
value 0.25394
scoring_system epss
scoring_elements 0.96226
published_at 2026-04-26T12:55:00Z
14
value 0.25394
scoring_system epss
scoring_elements 0.96227
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5616
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5616
2
reference_url http://secunia.com/advisories/33136
reference_id
reference_type
scores
url http://secunia.com/advisories/33136
3
reference_url http://secunia.com/advisories/34845
reference_id
reference_type
scores
url http://secunia.com/advisories/34845
4
reference_url http://svn.mplayerhq.hu/mplayer/branches/1.0rc2/libmpdemux/demux_vqf.c?r1=24723&r2=28150&pathrev=28150
reference_id
reference_type
scores
url http://svn.mplayerhq.hu/mplayer/branches/1.0rc2/libmpdemux/demux_vqf.c?r1=24723&r2=28150&pathrev=28150
5
reference_url http://svn.mplayerhq.hu/mplayer/branches/1.0rc2/libmpdemux/demux_vqf.c?view=log&pathrev=28150#rev28150
reference_id
reference_type
scores
url http://svn.mplayerhq.hu/mplayer/branches/1.0rc2/libmpdemux/demux_vqf.c?view=log&pathrev=28150#rev28150
6
reference_url http://trapkit.de/advisories/TKADV2008-014.txt
reference_id
reference_type
scores
url http://trapkit.de/advisories/TKADV2008-014.txt
7
reference_url http://www.debian.org/security/2009/dsa-1782
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1782
8
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:013
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:013
9
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:014
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:014
10
reference_url http://www.securityfocus.com/archive/1/499214/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/499214/100/0/threaded
11
reference_url http://www.securityfocus.com/bid/32822
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32822
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=508803
reference_id 508803
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=508803
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5616
reference_id CVE-2008-5616
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-5616
34
reference_url https://security.gentoo.org/glsa/200901-07
reference_id GLSA-200901-07
reference_type
scores
url https://security.gentoo.org/glsa/200901-07
fixed_packages
0
url pkg:deb/debian/mplayer@1.0~rc2-19?distro=trixie
purl pkg:deb/debian/mplayer@1.0~rc2-19?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-19%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
4
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2008-5616
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fw24-pxsc-7bek
19
url VCID-g1k8-4mbb-fyew
vulnerability_id VCID-g1k8-4mbb-fyew
summary Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-38865
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.18492
published_at 2026-04-02T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18546
published_at 2026-04-04T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18254
published_at 2026-04-07T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.18337
published_at 2026-04-08T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.1839
published_at 2026-04-11T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18342
published_at 2026-04-12T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.1829
published_at 2026-04-13T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18234
published_at 2026-04-16T12:55:00Z
8
value 0.00058
scoring_system epss
scoring_elements 0.18246
published_at 2026-04-18T12:55:00Z
9
value 0.00058
scoring_system epss
scoring_elements 0.18273
published_at 2026-04-21T12:55:00Z
10
value 0.00058
scoring_system epss
scoring_elements 0.18172
published_at 2026-04-24T12:55:00Z
11
value 0.00058
scoring_system epss
scoring_elements 0.18155
published_at 2026-04-26T12:55:00Z
12
value 0.00058
scoring_system epss
scoring_elements 0.18119
published_at 2026-04-29T12:55:00Z
13
value 0.00058
scoring_system epss
scoring_elements 0.1798
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-38865
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38865
2
reference_url https://security.gentoo.org/glsa/202405-05
reference_id GLSA-202405-05
reference_type
scores
url https://security.gentoo.org/glsa/202405-05
3
reference_url https://usn.ubuntu.com/5895-1/
reference_id USN-5895-1
reference_type
scores
url https://usn.ubuntu.com/5895-1/
fixed_packages
0
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2022-38865
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g1k8-4mbb-fyew
20
url VCID-gaa2-bekm-6bbt
vulnerability_id VCID-gaa2-bekm-6bbt
summary
Multiple vulnerabilities have been discovered in MPlayer, possibly allowing
    for the remote execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0630
reference_id
reference_type
scores
0
value 0.06989
scoring_system epss
scoring_elements 0.9141
published_at 2026-04-01T12:55:00Z
1
value 0.06989
scoring_system epss
scoring_elements 0.91416
published_at 2026-04-02T12:55:00Z
2
value 0.06989
scoring_system epss
scoring_elements 0.91426
published_at 2026-04-04T12:55:00Z
3
value 0.06989
scoring_system epss
scoring_elements 0.91434
published_at 2026-04-07T12:55:00Z
4
value 0.06989
scoring_system epss
scoring_elements 0.91446
published_at 2026-04-08T12:55:00Z
5
value 0.06989
scoring_system epss
scoring_elements 0.91452
published_at 2026-04-09T12:55:00Z
6
value 0.06989
scoring_system epss
scoring_elements 0.91458
published_at 2026-04-11T12:55:00Z
7
value 0.06989
scoring_system epss
scoring_elements 0.91461
published_at 2026-04-12T12:55:00Z
8
value 0.06989
scoring_system epss
scoring_elements 0.9146
published_at 2026-04-13T12:55:00Z
9
value 0.06989
scoring_system epss
scoring_elements 0.91484
published_at 2026-04-16T12:55:00Z
10
value 0.06989
scoring_system epss
scoring_elements 0.91479
published_at 2026-04-21T12:55:00Z
11
value 0.07422
scoring_system epss
scoring_elements 0.91771
published_at 2026-04-24T12:55:00Z
12
value 0.07422
scoring_system epss
scoring_elements 0.91769
published_at 2026-04-26T12:55:00Z
13
value 0.07422
scoring_system epss
scoring_elements 0.91765
published_at 2026-04-29T12:55:00Z
14
value 0.07422
scoring_system epss
scoring_elements 0.91779
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0630
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0630
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0630
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464532
reference_id 464532
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464532
3
reference_url https://security.gentoo.org/glsa/200803-16
reference_id GLSA-200803-16
reference_type
scores
url https://security.gentoo.org/glsa/200803-16
fixed_packages
0
url pkg:deb/debian/mplayer@1.0~rc2-8?distro=trixie
purl pkg:deb/debian/mplayer@1.0~rc2-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-8%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
4
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2008-0630
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gaa2-bekm-6bbt
21
url VCID-gxnr-jbzt-cffq
vulnerability_id VCID-gxnr-jbzt-cffq
summary
Multiple vulnerabilities in MPlayer may lead to the execution of arbitrary
    code or a Denial of Service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3827
reference_id
reference_type
scores
0
value 0.03588
scoring_system epss
scoring_elements 0.87802
published_at 2026-05-05T12:55:00Z
1
value 0.03588
scoring_system epss
scoring_elements 0.87699
published_at 2026-04-01T12:55:00Z
2
value 0.03588
scoring_system epss
scoring_elements 0.8771
published_at 2026-04-02T12:55:00Z
3
value 0.03588
scoring_system epss
scoring_elements 0.87721
published_at 2026-04-04T12:55:00Z
4
value 0.03588
scoring_system epss
scoring_elements 0.87723
published_at 2026-04-07T12:55:00Z
5
value 0.03588
scoring_system epss
scoring_elements 0.87745
published_at 2026-04-08T12:55:00Z
6
value 0.03588
scoring_system epss
scoring_elements 0.87751
published_at 2026-04-09T12:55:00Z
7
value 0.03588
scoring_system epss
scoring_elements 0.87761
published_at 2026-04-11T12:55:00Z
8
value 0.03588
scoring_system epss
scoring_elements 0.87756
published_at 2026-04-12T12:55:00Z
9
value 0.03588
scoring_system epss
scoring_elements 0.87754
published_at 2026-04-13T12:55:00Z
10
value 0.03588
scoring_system epss
scoring_elements 0.87768
published_at 2026-04-16T12:55:00Z
11
value 0.03588
scoring_system epss
scoring_elements 0.87767
published_at 2026-04-18T12:55:00Z
12
value 0.03588
scoring_system epss
scoring_elements 0.87766
published_at 2026-04-21T12:55:00Z
13
value 0.03588
scoring_system epss
scoring_elements 0.87783
published_at 2026-04-24T12:55:00Z
14
value 0.03588
scoring_system epss
scoring_elements 0.8779
published_at 2026-04-26T12:55:00Z
15
value 0.03588
scoring_system epss
scoring_elements 0.87787
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3827
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3827
2
reference_url http://secunia.com/advisories/32045
reference_id
reference_type
scores
url http://secunia.com/advisories/32045
3
reference_url http://secunia.com/advisories/32153
reference_id
reference_type
scores
url http://secunia.com/advisories/32153
4
reference_url http://securityreason.com/securityalert/4326
reference_id
reference_type
scores
url http://securityreason.com/securityalert/4326
5
reference_url http://svn.mplayerhq.hu/mplayer/trunk/libmpdemux/demux_real.c?r1=27314&r2=27675
reference_id
reference_type
scores
url http://svn.mplayerhq.hu/mplayer/trunk/libmpdemux/demux_real.c?r1=27314&r2=27675
6
reference_url http://www.debian.org/security/2008/dsa-1644
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1644
7
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:219
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:219
8
reference_url http://www.ocert.org/advisories/ocert-2008-013.html
reference_id
reference_type
scores
url http://www.ocert.org/advisories/ocert-2008-013.html
9
reference_url http://www.securityfocus.com/archive/1/496806/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/496806/100/0/threaded
10
reference_url http://www.securityfocus.com/bid/31473
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/31473
11
reference_url http://www.securitytracker.com/id?1020952
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020952
12
reference_url http://www.vupen.com/english/advisories/2008/2703
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2703
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=500683
reference_id 500683
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=500683
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_rc1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_rc1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_rc1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3827
reference_id CVE-2008-3827
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-3827
36
reference_url https://security.gentoo.org/glsa/200901-07
reference_id GLSA-200901-07
reference_type
scores
url https://security.gentoo.org/glsa/200901-07
fixed_packages
0
url pkg:deb/debian/mplayer@1.0~rc2-18?distro=trixie
purl pkg:deb/debian/mplayer@1.0~rc2-18?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-18%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
4
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2008-3827
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gxnr-jbzt-cffq
22
url VCID-h9ks-v96k-wkf7
vulnerability_id VCID-h9ks-v96k-wkf7
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6933
reference_id
reference_type
scores
0
value 0.03355
scoring_system epss
scoring_elements 0.87278
published_at 2026-04-01T12:55:00Z
1
value 0.03355
scoring_system epss
scoring_elements 0.87288
published_at 2026-04-02T12:55:00Z
2
value 0.03355
scoring_system epss
scoring_elements 0.87304
published_at 2026-04-04T12:55:00Z
3
value 0.03355
scoring_system epss
scoring_elements 0.87303
published_at 2026-04-07T12:55:00Z
4
value 0.03355
scoring_system epss
scoring_elements 0.87322
published_at 2026-04-08T12:55:00Z
5
value 0.03355
scoring_system epss
scoring_elements 0.87329
published_at 2026-04-09T12:55:00Z
6
value 0.03355
scoring_system epss
scoring_elements 0.87342
published_at 2026-04-11T12:55:00Z
7
value 0.03355
scoring_system epss
scoring_elements 0.87336
published_at 2026-04-12T12:55:00Z
8
value 0.03355
scoring_system epss
scoring_elements 0.87332
published_at 2026-04-13T12:55:00Z
9
value 0.03355
scoring_system epss
scoring_elements 0.87346
published_at 2026-04-16T12:55:00Z
10
value 0.03355
scoring_system epss
scoring_elements 0.8735
published_at 2026-04-18T12:55:00Z
11
value 0.03355
scoring_system epss
scoring_elements 0.87344
published_at 2026-04-21T12:55:00Z
12
value 0.03355
scoring_system epss
scoring_elements 0.87361
published_at 2026-04-24T12:55:00Z
13
value 0.03355
scoring_system epss
scoring_elements 0.87368
published_at 2026-04-26T12:55:00Z
14
value 0.03355
scoring_system epss
scoring_elements 0.87369
published_at 2026-04-29T12:55:00Z
15
value 0.03355
scoring_system epss
scoring_elements 0.87385
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6933
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6933
fixed_packages
0
url pkg:deb/debian/mplayer@2:1.1.1%2Bsvn37434-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.1.1%2Bsvn37434-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.1.1%252Bsvn37434-1%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
4
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2013-6933
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h9ks-v96k-wkf7
23
url VCID-hc13-gs1j-suhs
vulnerability_id VCID-hc13-gs1j-suhs
summary
MPlayer is vulnerable to integer overflows in FFmpeg and ASF decoding that
    could potentially result in the execution of arbitrary code.
references
0
reference_url http://article.gmane.org/gmane.comp.video.ffmpeg.devel/26558
reference_id
reference_type
scores
url http://article.gmane.org/gmane.comp.video.ffmpeg.devel/26558
1
reference_url http://cvs.freedesktop.org/gstreamer/gst-ffmpeg/ChangeLog?rev=1.239&view=markup
reference_id
reference_type
scores
url http://cvs.freedesktop.org/gstreamer/gst-ffmpeg/ChangeLog?rev=1.239&view=markup
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-4048
reference_id
reference_type
scores
0
value 0.05247
scoring_system epss
scoring_elements 0.90019
published_at 2026-05-05T12:55:00Z
1
value 0.05247
scoring_system epss
scoring_elements 0.89936
published_at 2026-04-01T12:55:00Z
2
value 0.05247
scoring_system epss
scoring_elements 0.89939
published_at 2026-04-02T12:55:00Z
3
value 0.05247
scoring_system epss
scoring_elements 0.89952
published_at 2026-04-04T12:55:00Z
4
value 0.05247
scoring_system epss
scoring_elements 0.89959
published_at 2026-04-07T12:55:00Z
5
value 0.05247
scoring_system epss
scoring_elements 0.89975
published_at 2026-04-08T12:55:00Z
6
value 0.05247
scoring_system epss
scoring_elements 0.8998
published_at 2026-04-09T12:55:00Z
7
value 0.05247
scoring_system epss
scoring_elements 0.89988
published_at 2026-04-11T12:55:00Z
8
value 0.05247
scoring_system epss
scoring_elements 0.89986
published_at 2026-04-12T12:55:00Z
9
value 0.05247
scoring_system epss
scoring_elements 0.89979
published_at 2026-04-13T12:55:00Z
10
value 0.05247
scoring_system epss
scoring_elements 0.89994
published_at 2026-04-16T12:55:00Z
11
value 0.05247
scoring_system epss
scoring_elements 0.89995
published_at 2026-04-18T12:55:00Z
12
value 0.05247
scoring_system epss
scoring_elements 0.89991
published_at 2026-04-21T12:55:00Z
13
value 0.05247
scoring_system epss
scoring_elements 0.90008
published_at 2026-04-24T12:55:00Z
14
value 0.05247
scoring_system epss
scoring_elements 0.90007
published_at 2026-04-26T12:55:00Z
15
value 0.05247
scoring_system epss
scoring_elements 0.90006
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-4048
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4048
4
reference_url http://secunia.com/advisories/17892
reference_id
reference_type
scores
url http://secunia.com/advisories/17892
5
reference_url http://secunia.com/advisories/18066
reference_id
reference_type
scores
url http://secunia.com/advisories/18066
6
reference_url http://secunia.com/advisories/18087
reference_id
reference_type
scores
url http://secunia.com/advisories/18087
7
reference_url http://secunia.com/advisories/18107
reference_id
reference_type
scores
url http://secunia.com/advisories/18107
8
reference_url http://secunia.com/advisories/18400
reference_id
reference_type
scores
url http://secunia.com/advisories/18400
9
reference_url http://secunia.com/advisories/18739
reference_id
reference_type
scores
url http://secunia.com/advisories/18739
10
reference_url http://secunia.com/advisories/18746
reference_id
reference_type
scores
url http://secunia.com/advisories/18746
11
reference_url http://secunia.com/advisories/19114
reference_id
reference_type
scores
url http://secunia.com/advisories/19114
12
reference_url http://secunia.com/advisories/19192
reference_id
reference_type
scores
url http://secunia.com/advisories/19192
13
reference_url http://secunia.com/advisories/19272
reference_id
reference_type
scores
url http://secunia.com/advisories/19272
14
reference_url http://secunia.com/advisories/19279
reference_id
reference_type
scores
url http://secunia.com/advisories/19279
15
reference_url http://www1.mplayerhq.hu/cgi-bin/cvsweb.cgi/ffmpeg/libavcodec/utils.c.diff?r1=1.161&r2=1.162&cvsroot=FFMpeg
reference_id
reference_type
scores
url http://www1.mplayerhq.hu/cgi-bin/cvsweb.cgi/ffmpeg/libavcodec/utils.c.diff?r1=1.161&r2=1.162&cvsroot=FFMpeg
16
reference_url http://www1.mplayerhq.hu/cgi-bin/cvsweb.cgi/ffmpeg/libavcodec/utils.c?rev=1.162&content-type=text/x-cvsweb-markup&cvsroot=FFMpeg
reference_id
reference_type
scores
url http://www1.mplayerhq.hu/cgi-bin/cvsweb.cgi/ffmpeg/libavcodec/utils.c?rev=1.162&content-type=text/x-cvsweb-markup&cvsroot=FFMpeg
17
reference_url http://www.debian.org/security/2006/dsa-1004
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-1004
18
reference_url http://www.debian.org/security/2006/dsa-1005
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-1005
19
reference_url http://www.gentoo.org/security/en/glsa/glsa-200601-06.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200601-06.xml
20
reference_url http://www.gentoo.org/security/en/glsa/glsa-200602-01.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200602-01.xml
21
reference_url http://www.gentoo.org/security/en/glsa/glsa-200603-03.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200603-03.xml
22
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:228
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:228
23
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:229
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:229
24
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:230
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:230
25
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:231
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:231
26
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:232
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:232
27
reference_url http://www.securityfocus.com/bid/15743
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/15743
28
reference_url http://www.us.debian.org/security/2006/dsa-992
reference_id
reference_type
scores
url http://www.us.debian.org/security/2006/dsa-992
29
reference_url http://www.vupen.com/english/advisories/2005/2770
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2770
30
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342207
reference_id 342207
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342207
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:cvs:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:cvs:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:cvs:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-4048
reference_id CVE-2005-4048
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-4048
37
reference_url https://security.gentoo.org/glsa/200601-06
reference_id GLSA-200601-06
reference_type
scores
url https://security.gentoo.org/glsa/200601-06
38
reference_url https://security.gentoo.org/glsa/200602-01
reference_id GLSA-200602-01
reference_type
scores
url https://security.gentoo.org/glsa/200602-01
39
reference_url https://security.gentoo.org/glsa/200603-03
reference_id GLSA-200603-03
reference_type
scores
url https://security.gentoo.org/glsa/200603-03
40
reference_url https://usn.ubuntu.com/230-1/
reference_id USN-230-1
reference_type
scores
url https://usn.ubuntu.com/230-1/
41
reference_url https://usn.ubuntu.com/230-2/
reference_id USN-230-2
reference_type
scores
url https://usn.ubuntu.com/230-2/
fixed_packages
0
url pkg:deb/debian/mplayer@0?distro=trixie
purl pkg:deb/debian/mplayer@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@0%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
4
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2005-4048
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hc13-gs1j-suhs
24
url VCID-hujx-y363-e3cg
vulnerability_id VCID-hujx-y363-e3cg
summary
Multiple vulnerabilities have been discovered in MPlayer, possibly allowing
    for the remote execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0485
reference_id
reference_type
scores
0
value 0.16295
scoring_system epss
scoring_elements 0.94796
published_at 2026-04-01T12:55:00Z
1
value 0.16295
scoring_system epss
scoring_elements 0.94806
published_at 2026-04-02T12:55:00Z
2
value 0.16295
scoring_system epss
scoring_elements 0.94809
published_at 2026-04-04T12:55:00Z
3
value 0.16295
scoring_system epss
scoring_elements 0.94811
published_at 2026-04-07T12:55:00Z
4
value 0.16295
scoring_system epss
scoring_elements 0.94821
published_at 2026-04-08T12:55:00Z
5
value 0.16295
scoring_system epss
scoring_elements 0.94825
published_at 2026-04-09T12:55:00Z
6
value 0.16295
scoring_system epss
scoring_elements 0.94829
published_at 2026-04-11T12:55:00Z
7
value 0.16295
scoring_system epss
scoring_elements 0.94832
published_at 2026-04-12T12:55:00Z
8
value 0.16295
scoring_system epss
scoring_elements 0.94834
published_at 2026-04-13T12:55:00Z
9
value 0.16295
scoring_system epss
scoring_elements 0.9484
published_at 2026-04-16T12:55:00Z
10
value 0.16295
scoring_system epss
scoring_elements 0.94844
published_at 2026-04-18T12:55:00Z
11
value 0.16295
scoring_system epss
scoring_elements 0.94847
published_at 2026-04-21T12:55:00Z
12
value 0.16295
scoring_system epss
scoring_elements 0.94849
published_at 2026-04-26T12:55:00Z
13
value 0.16295
scoring_system epss
scoring_elements 0.9485
published_at 2026-04-29T12:55:00Z
14
value 0.16295
scoring_system epss
scoring_elements 0.94857
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0485
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0485
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464060
reference_id 464060
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464060
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/31076.py
reference_id CVE-2008-0485;OSVDB-42201
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/31076.py
4
reference_url https://www.securityfocus.com/bid/27499/info
reference_id CVE-2008-0485;OSVDB-42201
reference_type exploit
scores
url https://www.securityfocus.com/bid/27499/info
5
reference_url https://security.gentoo.org/glsa/200803-16
reference_id GLSA-200803-16
reference_type
scores
url https://security.gentoo.org/glsa/200803-16
fixed_packages
0
url pkg:deb/debian/mplayer@1.0~rc2-8?distro=trixie
purl pkg:deb/debian/mplayer@1.0~rc2-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-8%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
4
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2008-0485
risk_score 0.2
exploitability 2.0
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hujx-y363-e3cg
25
url VCID-j7wp-941h-p3fc
vulnerability_id VCID-j7wp-941h-p3fc
summary
Multiple vulnerabilities in xine-lib might result in the remote execution
    of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5244
reference_id
reference_type
scores
0
value 0.00435
scoring_system epss
scoring_elements 0.62945
published_at 2026-05-05T12:55:00Z
1
value 0.00435
scoring_system epss
scoring_elements 0.62825
published_at 2026-04-01T12:55:00Z
2
value 0.00435
scoring_system epss
scoring_elements 0.62883
published_at 2026-04-02T12:55:00Z
3
value 0.00435
scoring_system epss
scoring_elements 0.62913
published_at 2026-04-04T12:55:00Z
4
value 0.00435
scoring_system epss
scoring_elements 0.62876
published_at 2026-04-07T12:55:00Z
5
value 0.00435
scoring_system epss
scoring_elements 0.62927
published_at 2026-04-08T12:55:00Z
6
value 0.00435
scoring_system epss
scoring_elements 0.62943
published_at 2026-04-09T12:55:00Z
7
value 0.00435
scoring_system epss
scoring_elements 0.62962
published_at 2026-04-11T12:55:00Z
8
value 0.00435
scoring_system epss
scoring_elements 0.6295
published_at 2026-04-12T12:55:00Z
9
value 0.00435
scoring_system epss
scoring_elements 0.62928
published_at 2026-04-13T12:55:00Z
10
value 0.00435
scoring_system epss
scoring_elements 0.62968
published_at 2026-04-16T12:55:00Z
11
value 0.00435
scoring_system epss
scoring_elements 0.62976
published_at 2026-04-18T12:55:00Z
12
value 0.00435
scoring_system epss
scoring_elements 0.62955
published_at 2026-04-21T12:55:00Z
13
value 0.00435
scoring_system epss
scoring_elements 0.62975
published_at 2026-04-24T12:55:00Z
14
value 0.00435
scoring_system epss
scoring_elements 0.6299
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5244
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5244
3
reference_url http://securitytracker.com/id?1020703
reference_id
reference_type
scores
url http://securitytracker.com/id?1020703
4
reference_url http://sourceforge.net/project/shownotes.php?release_id=619869
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?release_id=619869
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=407010
reference_id 407010
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=407010
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.14:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5244
reference_id CVE-2008-5244
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-5244
56
reference_url https://security.gentoo.org/glsa/201006-04
reference_id GLSA-201006-04
reference_type
scores
url https://security.gentoo.org/glsa/201006-04
57
reference_url https://usn.ubuntu.com/710-1/
reference_id USN-710-1
reference_type
scores
url https://usn.ubuntu.com/710-1/
fixed_packages
0
url pkg:deb/debian/mplayer@1.0~rc2-20?distro=trixie
purl pkg:deb/debian/mplayer@1.0~rc2-20?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-20%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
4
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2008-5244
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j7wp-941h-p3fc
26
url VCID-kyv5-fhuz-n7f1
vulnerability_id VCID-kyv5-fhuz-n7f1
summary Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-38600
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.2079
published_at 2026-04-02T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20848
published_at 2026-04-04T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20563
published_at 2026-04-07T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20639
published_at 2026-04-08T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20701
published_at 2026-04-09T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.2072
published_at 2026-04-11T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.20677
published_at 2026-04-12T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20625
published_at 2026-04-13T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20611
published_at 2026-04-16T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20608
published_at 2026-04-18T12:55:00Z
10
value 0.00067
scoring_system epss
scoring_elements 0.20599
published_at 2026-04-21T12:55:00Z
11
value 0.00067
scoring_system epss
scoring_elements 0.20485
published_at 2026-04-24T12:55:00Z
12
value 0.00067
scoring_system epss
scoring_elements 0.20482
published_at 2026-04-26T12:55:00Z
13
value 0.00067
scoring_system epss
scoring_elements 0.20449
published_at 2026-04-29T12:55:00Z
14
value 0.00067
scoring_system epss
scoring_elements 0.20344
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-38600
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38600
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021013
reference_id 1021013
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021013
3
reference_url https://security.gentoo.org/glsa/202405-05
reference_id GLSA-202405-05
reference_type
scores
url https://security.gentoo.org/glsa/202405-05
fixed_packages
0
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2022-38600
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kyv5-fhuz-n7f1
27
url VCID-m5db-wq6e-gqeu
vulnerability_id VCID-m5db-wq6e-gqeu
summary Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-38855
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.19364
published_at 2026-04-02T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.19415
published_at 2026-04-04T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19132
published_at 2026-04-07T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.19212
published_at 2026-04-08T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.19264
published_at 2026-04-09T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.1927
published_at 2026-04-11T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.19224
published_at 2026-04-12T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.19169
published_at 2026-04-13T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.1913
published_at 2026-04-16T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.19139
published_at 2026-04-18T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.19147
published_at 2026-04-21T12:55:00Z
11
value 0.00061
scoring_system epss
scoring_elements 0.19039
published_at 2026-04-24T12:55:00Z
12
value 0.00061
scoring_system epss
scoring_elements 0.19028
published_at 2026-04-26T12:55:00Z
13
value 0.00061
scoring_system epss
scoring_elements 0.18984
published_at 2026-04-29T12:55:00Z
14
value 0.00061
scoring_system epss
scoring_elements 0.18863
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-38855
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38855
2
reference_url https://security.gentoo.org/glsa/202405-05
reference_id GLSA-202405-05
reference_type
scores
url https://security.gentoo.org/glsa/202405-05
3
reference_url https://usn.ubuntu.com/5895-1/
reference_id USN-5895-1
reference_type
scores
url https://usn.ubuntu.com/5895-1/
fixed_packages
0
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2022-38855
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m5db-wq6e-gqeu
28
url VCID-pbr8-afjj-pbdq
vulnerability_id VCID-pbr8-afjj-pbdq
summary
Two vulnerabilities have been discovered in MPlayer, each one could lead to
    the execution of arbitrary code.
references
0
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414072
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414072
1
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414072%3Bmsg=12%3Bfilename=DS_VideoDecoder.c---SVN--22205.patch%3Batt=1
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414072%3Bmsg=12%3Bfilename=DS_VideoDecoder.c---SVN--22205.patch%3Batt=1
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-1387
reference_id
reference_type
scores
0
value 0.05109
scoring_system epss
scoring_elements 0.89877
published_at 2026-05-05T12:55:00Z
1
value 0.05109
scoring_system epss
scoring_elements 0.898
published_at 2026-04-01T12:55:00Z
2
value 0.05109
scoring_system epss
scoring_elements 0.89803
published_at 2026-04-02T12:55:00Z
3
value 0.05109
scoring_system epss
scoring_elements 0.89817
published_at 2026-04-04T12:55:00Z
4
value 0.05109
scoring_system epss
scoring_elements 0.89821
published_at 2026-04-07T12:55:00Z
5
value 0.05109
scoring_system epss
scoring_elements 0.89839
published_at 2026-04-08T12:55:00Z
6
value 0.05109
scoring_system epss
scoring_elements 0.89845
published_at 2026-04-09T12:55:00Z
7
value 0.05109
scoring_system epss
scoring_elements 0.89851
published_at 2026-04-11T12:55:00Z
8
value 0.05109
scoring_system epss
scoring_elements 0.89849
published_at 2026-04-12T12:55:00Z
9
value 0.05109
scoring_system epss
scoring_elements 0.89842
published_at 2026-04-13T12:55:00Z
10
value 0.05109
scoring_system epss
scoring_elements 0.89856
published_at 2026-04-16T12:55:00Z
11
value 0.05109
scoring_system epss
scoring_elements 0.89857
published_at 2026-04-18T12:55:00Z
12
value 0.05109
scoring_system epss
scoring_elements 0.8985
published_at 2026-04-21T12:55:00Z
13
value 0.05109
scoring_system epss
scoring_elements 0.89865
published_at 2026-04-26T12:55:00Z
14
value 0.05109
scoring_system epss
scoring_elements 0.89863
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-1387
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1387
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1387
4
reference_url http://secunia.com/advisories/24443
reference_id
reference_type
scores
url http://secunia.com/advisories/24443
5
reference_url http://secunia.com/advisories/24444
reference_id
reference_type
scores
url http://secunia.com/advisories/24444
6
reference_url http://secunia.com/advisories/24462
reference_id
reference_type
scores
url http://secunia.com/advisories/24462
7
reference_url http://secunia.com/advisories/25462
reference_id
reference_type
scores
url http://secunia.com/advisories/25462
8
reference_url http://secunia.com/advisories/29601
reference_id
reference_type
scores
url http://secunia.com/advisories/29601
9
reference_url http://security.gentoo.org/glsa/glsa-200705-21.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200705-21.xml
10
reference_url http://www.debian.org/security/2008/dsa-1536
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1536
11
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:061
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:061
12
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:062
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:062
13
reference_url http://www.securityfocus.com/bid/22933
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/22933
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414075
reference_id 414075
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414075
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-1387
reference_id CVE-2007-1387
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:M/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-1387
17
reference_url https://security.gentoo.org/glsa/200705-21
reference_id GLSA-200705-21
reference_type
scores
url https://security.gentoo.org/glsa/200705-21
18
reference_url https://usn.ubuntu.com/435-1/
reference_id USN-435-1
reference_type
scores
url https://usn.ubuntu.com/435-1/
fixed_packages
0
url pkg:deb/debian/mplayer@1.0~rc1-13?distro=trixie
purl pkg:deb/debian/mplayer@1.0~rc1-13?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc1-13%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
4
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2007-1387
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pbr8-afjj-pbdq
29
url VCID-pbz2-w6vz-cqhx
vulnerability_id VCID-pbz2-w6vz-cqhx
summary
An integer overflow vulnerability in MPlayer may allow for the execution of
    arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1558
reference_id
reference_type
scores
0
value 0.21937
scoring_system epss
scoring_elements 0.95731
published_at 2026-04-01T12:55:00Z
1
value 0.21937
scoring_system epss
scoring_elements 0.9574
published_at 2026-04-02T12:55:00Z
2
value 0.21937
scoring_system epss
scoring_elements 0.95748
published_at 2026-04-04T12:55:00Z
3
value 0.21937
scoring_system epss
scoring_elements 0.95751
published_at 2026-04-07T12:55:00Z
4
value 0.21937
scoring_system epss
scoring_elements 0.95759
published_at 2026-04-08T12:55:00Z
5
value 0.21937
scoring_system epss
scoring_elements 0.95763
published_at 2026-04-09T12:55:00Z
6
value 0.21937
scoring_system epss
scoring_elements 0.95766
published_at 2026-04-12T12:55:00Z
7
value 0.21937
scoring_system epss
scoring_elements 0.95767
published_at 2026-04-13T12:55:00Z
8
value 0.21937
scoring_system epss
scoring_elements 0.95777
published_at 2026-04-16T12:55:00Z
9
value 0.21937
scoring_system epss
scoring_elements 0.95781
published_at 2026-04-18T12:55:00Z
10
value 0.21937
scoring_system epss
scoring_elements 0.95783
published_at 2026-04-29T12:55:00Z
11
value 0.21937
scoring_system epss
scoring_elements 0.95785
published_at 2026-04-26T12:55:00Z
12
value 0.21937
scoring_system epss
scoring_elements 0.95796
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1558
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1558
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=473056
reference_id 473056
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=473056
3
reference_url https://security.gentoo.org/glsa/200805-22
reference_id GLSA-200805-22
reference_type
scores
url https://security.gentoo.org/glsa/200805-22
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/5307.pl
reference_id OSVDB-43740;CVE-2008-1558
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/5307.pl
fixed_packages
0
url pkg:deb/debian/mplayer@1.0~rc2-10?distro=trixie
purl pkg:deb/debian/mplayer@1.0~rc2-10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-10%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
4
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2008-1558
risk_score 0.4
exploitability 2.0
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pbz2-w6vz-cqhx
30
url VCID-pfcp-7vj5-rqef
vulnerability_id VCID-pfcp-7vj5-rqef
summary Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-38864
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.19364
published_at 2026-04-02T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.19415
published_at 2026-04-04T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19132
published_at 2026-04-07T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.19212
published_at 2026-04-08T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.19264
published_at 2026-04-09T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.1927
published_at 2026-04-11T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.19224
published_at 2026-04-12T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.19169
published_at 2026-04-13T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.1913
published_at 2026-04-16T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.19139
published_at 2026-04-18T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.19147
published_at 2026-04-21T12:55:00Z
11
value 0.00061
scoring_system epss
scoring_elements 0.19039
published_at 2026-04-24T12:55:00Z
12
value 0.00061
scoring_system epss
scoring_elements 0.19028
published_at 2026-04-26T12:55:00Z
13
value 0.00061
scoring_system epss
scoring_elements 0.18984
published_at 2026-04-29T12:55:00Z
14
value 0.00061
scoring_system epss
scoring_elements 0.18863
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-38864
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38864
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021013
reference_id 1021013
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021013
3
reference_url https://security.gentoo.org/glsa/202405-05
reference_id GLSA-202405-05
reference_type
scores
url https://security.gentoo.org/glsa/202405-05
4
reference_url https://usn.ubuntu.com/5895-1/
reference_id USN-5895-1
reference_type
scores
url https://usn.ubuntu.com/5895-1/
fixed_packages
0
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2022-38864
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pfcp-7vj5-rqef
31
url VCID-pxrz-2835-dfhm
vulnerability_id VCID-pxrz-2835-dfhm
summary Heap-based buffer overflow in libmpdemux/aviheader.c in MPlayer 1.0rc1 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a .avi file with certain large "indx truck size" and nEntriesInuse values, and a certain wLongsPerEntry value.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4938
reference_id
reference_type
scores
0
value 0.09968
scoring_system epss
scoring_elements 0.93011
published_at 2026-04-01T12:55:00Z
1
value 0.09968
scoring_system epss
scoring_elements 0.9302
published_at 2026-04-02T12:55:00Z
2
value 0.09968
scoring_system epss
scoring_elements 0.93024
published_at 2026-04-04T12:55:00Z
3
value 0.09968
scoring_system epss
scoring_elements 0.93023
published_at 2026-04-07T12:55:00Z
4
value 0.09968
scoring_system epss
scoring_elements 0.93031
published_at 2026-04-08T12:55:00Z
5
value 0.09968
scoring_system epss
scoring_elements 0.93036
published_at 2026-04-09T12:55:00Z
6
value 0.09968
scoring_system epss
scoring_elements 0.93041
published_at 2026-04-11T12:55:00Z
7
value 0.09968
scoring_system epss
scoring_elements 0.93038
published_at 2026-04-12T12:55:00Z
8
value 0.09968
scoring_system epss
scoring_elements 0.9304
published_at 2026-04-13T12:55:00Z
9
value 0.09968
scoring_system epss
scoring_elements 0.9305
published_at 2026-04-16T12:55:00Z
10
value 0.09968
scoring_system epss
scoring_elements 0.93053
published_at 2026-04-18T12:55:00Z
11
value 0.09968
scoring_system epss
scoring_elements 0.9306
published_at 2026-04-21T12:55:00Z
12
value 0.09968
scoring_system epss
scoring_elements 0.93067
published_at 2026-05-05T12:55:00Z
13
value 0.09968
scoring_system epss
scoring_elements 0.93062
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4938
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4938
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=443478
reference_id 443478
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=443478
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/30578.txt
reference_id CVE-2007-4938;OSVDB-45940
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/30578.txt
4
reference_url https://www.securityfocus.com/bid/25648/info
reference_id CVE-2007-4938;OSVDB-45940
reference_type exploit
scores
url https://www.securityfocus.com/bid/25648/info
fixed_packages
0
url pkg:deb/debian/mplayer@1.0~rc1-16.1?distro=trixie
purl pkg:deb/debian/mplayer@1.0~rc1-16.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc1-16.1%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
4
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2007-4938
risk_score 0.2
exploitability 2.0
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pxrz-2835-dfhm
32
url VCID-q7u2-mhac-r7fp
vulnerability_id VCID-q7u2-mhac-r7fp
summary
xine-lib is vulnerable to multiple buffer overflows when processing FLAC
    and ASF streams.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0486.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0486.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0486
reference_id
reference_type
scores
0
value 0.0457
scoring_system epss
scoring_elements 0.89158
published_at 2026-04-01T12:55:00Z
1
value 0.0457
scoring_system epss
scoring_elements 0.89165
published_at 2026-04-02T12:55:00Z
2
value 0.0457
scoring_system epss
scoring_elements 0.8918
published_at 2026-04-04T12:55:00Z
3
value 0.0457
scoring_system epss
scoring_elements 0.89182
published_at 2026-04-07T12:55:00Z
4
value 0.0457
scoring_system epss
scoring_elements 0.892
published_at 2026-04-08T12:55:00Z
5
value 0.0457
scoring_system epss
scoring_elements 0.89205
published_at 2026-04-09T12:55:00Z
6
value 0.0457
scoring_system epss
scoring_elements 0.89215
published_at 2026-04-11T12:55:00Z
7
value 0.0457
scoring_system epss
scoring_elements 0.89211
published_at 2026-04-12T12:55:00Z
8
value 0.0457
scoring_system epss
scoring_elements 0.89209
published_at 2026-04-13T12:55:00Z
9
value 0.0457
scoring_system epss
scoring_elements 0.89221
published_at 2026-04-18T12:55:00Z
10
value 0.0457
scoring_system epss
scoring_elements 0.89217
published_at 2026-04-21T12:55:00Z
11
value 0.04864
scoring_system epss
scoring_elements 0.89577
published_at 2026-04-24T12:55:00Z
12
value 0.04864
scoring_system epss
scoring_elements 0.89581
published_at 2026-04-29T12:55:00Z
13
value 0.04864
scoring_system epss
scoring_elements 0.89588
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0486
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0486
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=431541
reference_id 431541
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=431541
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464060
reference_id 464060
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464060
5
reference_url https://security.gentoo.org/glsa/200802-12
reference_id GLSA-200802-12
reference_type
scores
url https://security.gentoo.org/glsa/200802-12
6
reference_url https://security.gentoo.org/glsa/200803-16
reference_id GLSA-200803-16
reference_type
scores
url https://security.gentoo.org/glsa/200803-16
7
reference_url https://usn.ubuntu.com/635-1/
reference_id USN-635-1
reference_type
scores
url https://usn.ubuntu.com/635-1/
fixed_packages
0
url pkg:deb/debian/mplayer@1.0~rc2-8?distro=trixie
purl pkg:deb/debian/mplayer@1.0~rc2-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-8%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
4
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2008-0486
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q7u2-mhac-r7fp
33
url VCID-r4rz-8ey9-fqb4
vulnerability_id VCID-r4rz-8ey9-fqb4
summary
Multiple vulnerabilities in FFmpeg may lead to the remote execution of
    arbitrary code or a Denial of Service.
references
0
reference_url http://archives.neohapsis.com/archives/fulldisclosure/2008-09/0103.html
reference_id
reference_type
scores
url http://archives.neohapsis.com/archives/fulldisclosure/2008-09/0103.html
1
reference_url http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2008-August/016011.html
reference_id
reference_type
scores
url http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2008-August/016011.html
2
reference_url http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2008-August/016012.html
reference_id
reference_type
scores
url http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2008-August/016012.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4866
reference_id
reference_type
scores
0
value 0.05735
scoring_system epss
scoring_elements 0.90477
published_at 2026-05-05T12:55:00Z
1
value 0.05735
scoring_system epss
scoring_elements 0.90404
published_at 2026-04-01T12:55:00Z
2
value 0.05735
scoring_system epss
scoring_elements 0.90408
published_at 2026-04-02T12:55:00Z
3
value 0.05735
scoring_system epss
scoring_elements 0.9042
published_at 2026-04-04T12:55:00Z
4
value 0.05735
scoring_system epss
scoring_elements 0.90424
published_at 2026-04-07T12:55:00Z
5
value 0.05735
scoring_system epss
scoring_elements 0.90438
published_at 2026-04-08T12:55:00Z
6
value 0.05735
scoring_system epss
scoring_elements 0.90444
published_at 2026-04-13T12:55:00Z
7
value 0.05735
scoring_system epss
scoring_elements 0.90452
published_at 2026-04-12T12:55:00Z
8
value 0.05735
scoring_system epss
scoring_elements 0.9046
published_at 2026-04-16T12:55:00Z
9
value 0.05735
scoring_system epss
scoring_elements 0.90459
published_at 2026-04-18T12:55:00Z
10
value 0.05735
scoring_system epss
scoring_elements 0.90457
published_at 2026-04-21T12:55:00Z
11
value 0.05735
scoring_system epss
scoring_elements 0.9047
published_at 2026-04-24T12:55:00Z
12
value 0.05735
scoring_system epss
scoring_elements 0.90469
published_at 2026-04-26T12:55:00Z
13
value 0.05735
scoring_system epss
scoring_elements 0.90465
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4866
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4866
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4866
5
reference_url http://secunia.com/advisories/34296
reference_id
reference_type
scores
url http://secunia.com/advisories/34296
6
reference_url http://secunia.com/advisories/34385
reference_id
reference_type
scores
url http://secunia.com/advisories/34385
7
reference_url http://secunia.com/advisories/34845
reference_id
reference_type
scores
url http://secunia.com/advisories/34845
8
reference_url http://security.gentoo.org/glsa/glsa-200903-33.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200903-33.xml
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/46322
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/46322
10
reference_url http://www.debian.org/security/2009/dsa-1782
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1782
11
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:013
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:013
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:015
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:015
13
reference_url http://www.openwall.com/lists/oss-security/2008/10/29/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/10/29/6
14
reference_url http://www.securityfocus.com/bid/33308
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/33308
15
reference_url http://www.ubuntu.com/usn/USN-734-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-734-1
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4866
reference_id CVE-2008-4866
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-4866
32
reference_url https://security.gentoo.org/glsa/200903-33
reference_id GLSA-200903-33
reference_type
scores
url https://security.gentoo.org/glsa/200903-33
33
reference_url https://usn.ubuntu.com/734-1/
reference_id USN-734-1
reference_type
scores
url https://usn.ubuntu.com/734-1/
fixed_packages
0
url pkg:deb/debian/mplayer@1.0~rc2-14?distro=trixie
purl pkg:deb/debian/mplayer@1.0~rc2-14?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-14%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
4
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2008-4866
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r4rz-8ey9-fqb4
34
url VCID-sar3-93je-n7e9
vulnerability_id VCID-sar3-93je-n7e9
summary
A buffer overflow was found in MPlayer's RTSP plugin that could lead to a
    Denial of Service or arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-6172
reference_id
reference_type
scores
0
value 0.04458
scoring_system epss
scoring_elements 0.8912
published_at 2026-05-05T12:55:00Z
1
value 0.04458
scoring_system epss
scoring_elements 0.89021
published_at 2026-04-01T12:55:00Z
2
value 0.04458
scoring_system epss
scoring_elements 0.89029
published_at 2026-04-02T12:55:00Z
3
value 0.04458
scoring_system epss
scoring_elements 0.89044
published_at 2026-04-04T12:55:00Z
4
value 0.04458
scoring_system epss
scoring_elements 0.89046
published_at 2026-04-07T12:55:00Z
5
value 0.04458
scoring_system epss
scoring_elements 0.89064
published_at 2026-04-08T12:55:00Z
6
value 0.04458
scoring_system epss
scoring_elements 0.89068
published_at 2026-04-09T12:55:00Z
7
value 0.04458
scoring_system epss
scoring_elements 0.8908
published_at 2026-04-11T12:55:00Z
8
value 0.04458
scoring_system epss
scoring_elements 0.89076
published_at 2026-04-12T12:55:00Z
9
value 0.04458
scoring_system epss
scoring_elements 0.89074
published_at 2026-04-13T12:55:00Z
10
value 0.04458
scoring_system epss
scoring_elements 0.89088
published_at 2026-04-18T12:55:00Z
11
value 0.04458
scoring_system epss
scoring_elements 0.89084
published_at 2026-04-21T12:55:00Z
12
value 0.04458
scoring_system epss
scoring_elements 0.89102
published_at 2026-04-24T12:55:00Z
13
value 0.04458
scoring_system epss
scoring_elements 0.89109
published_at 2026-04-26T12:55:00Z
14
value 0.04458
scoring_system epss
scoring_elements 0.89113
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-6172
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6172
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6172
2
reference_url http://secunia.com/advisories/23218
reference_id
reference_type
scores
url http://secunia.com/advisories/23218
3
reference_url http://secunia.com/advisories/23242
reference_id
reference_type
scores
url http://secunia.com/advisories/23242
4
reference_url http://secunia.com/advisories/23249
reference_id
reference_type
scores
url http://secunia.com/advisories/23249
5
reference_url http://secunia.com/advisories/23301
reference_id
reference_type
scores
url http://secunia.com/advisories/23301
6
reference_url http://secunia.com/advisories/23335
reference_id
reference_type
scores
url http://secunia.com/advisories/23335
7
reference_url http://secunia.com/advisories/23512
reference_id
reference_type
scores
url http://secunia.com/advisories/23512
8
reference_url http://secunia.com/advisories/23567
reference_id
reference_type
scores
url http://secunia.com/advisories/23567
9
reference_url http://secunia.com/advisories/24336
reference_id
reference_type
scores
url http://secunia.com/advisories/24336
10
reference_url http://secunia.com/advisories/24339
reference_id
reference_type
scores
url http://secunia.com/advisories/24339
11
reference_url http://secunia.com/advisories/25555
reference_id
reference_type
scores
url http://secunia.com/advisories/25555
12
reference_url http://security.gentoo.org/glsa/glsa-200612-02.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200612-02.xml
13
reference_url http://security.gentoo.org/glsa/glsa-200702-11.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200702-11.xml
14
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.433842
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.433842
15
reference_url http://sourceforge.net/project/shownotes.php?release_id=468432
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?release_id=468432
16
reference_url https://sourceforge.net/tracker/index.php?func=detail&aid=1603458&group_id=9655&atid=109655
reference_id
reference_type
scores
url https://sourceforge.net/tracker/index.php?func=detail&aid=1603458&group_id=9655&atid=109655
17
reference_url http://www.debian.org/security/2006/dsa-1244
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-1244
18
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:224
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:224
19
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:112
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:112
20
reference_url http://www.mplayerhq.hu/design7/news.html#vuln14
reference_id
reference_type
scores
url http://www.mplayerhq.hu/design7/news.html#vuln14
21
reference_url http://www.mplayerhq.hu/MPlayer/patches/asmrules_fix_20061231.diff
reference_id
reference_type
scores
url http://www.mplayerhq.hu/MPlayer/patches/asmrules_fix_20061231.diff
22
reference_url http://www.novell.com/linux/security/advisories/2006_28_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2006_28_sr.html
23
reference_url http://www.securityfocus.com/bid/21435
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/21435
24
reference_url http://www.ubuntu.com/usn/usn-392-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-392-1
25
reference_url http://www.vupen.com/english/advisories/2006/4824
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/4824
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:real_media_input_plugin:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:real_media_input_plugin:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:real_media_input_plugin:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2006-6172
reference_id CVE-2006-6172
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2006-6172
29
reference_url https://security.gentoo.org/glsa/200612-02
reference_id GLSA-200612-02
reference_type
scores
url https://security.gentoo.org/glsa/200612-02
30
reference_url https://security.gentoo.org/glsa/200702-11
reference_id GLSA-200702-11
reference_type
scores
url https://security.gentoo.org/glsa/200702-11
31
reference_url https://usn.ubuntu.com/392-1/
reference_id USN-392-1
reference_type
scores
url https://usn.ubuntu.com/392-1/
fixed_packages
0
url pkg:deb/debian/mplayer@1.0~rc1-11?distro=trixie
purl pkg:deb/debian/mplayer@1.0~rc1-11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc1-11%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
4
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2006-6172
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sar3-93je-n7e9
35
url VCID-sgm1-d98g-nff9
vulnerability_id VCID-sgm1-d98g-nff9
summary
Multiple vulnerabilities in FFmpeg may lead to the remote execution of
    arbitrary code or a Denial of Service.
references
0
reference_url http://git.ffmpeg.org/?p=ffmpeg%3Ba=commitdiff%3Bh=72e715fb798f2cb79fd24a6d2eaeafb7c6eeda17
reference_id
reference_type
scores
url http://git.ffmpeg.org/?p=ffmpeg%3Ba=commitdiff%3Bh=72e715fb798f2cb79fd24a6d2eaeafb7c6eeda17
1
reference_url http://osvdb.org/51643
reference_id
reference_type
scores
url http://osvdb.org/51643
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0385
reference_id
reference_type
scores
0
value 0.11552
scoring_system epss
scoring_elements 0.93669
published_at 2026-05-05T12:55:00Z
1
value 0.11552
scoring_system epss
scoring_elements 0.93594
published_at 2026-04-01T12:55:00Z
2
value 0.11552
scoring_system epss
scoring_elements 0.93603
published_at 2026-04-02T12:55:00Z
3
value 0.11552
scoring_system epss
scoring_elements 0.93612
published_at 2026-04-04T12:55:00Z
4
value 0.11552
scoring_system epss
scoring_elements 0.93614
published_at 2026-04-07T12:55:00Z
5
value 0.11552
scoring_system epss
scoring_elements 0.93623
published_at 2026-04-08T12:55:00Z
6
value 0.11552
scoring_system epss
scoring_elements 0.93625
published_at 2026-04-09T12:55:00Z
7
value 0.11552
scoring_system epss
scoring_elements 0.9363
published_at 2026-04-12T12:55:00Z
8
value 0.11552
scoring_system epss
scoring_elements 0.93631
published_at 2026-04-13T12:55:00Z
9
value 0.11552
scoring_system epss
scoring_elements 0.93649
published_at 2026-04-16T12:55:00Z
10
value 0.11552
scoring_system epss
scoring_elements 0.93656
published_at 2026-04-18T12:55:00Z
11
value 0.11552
scoring_system epss
scoring_elements 0.9366
published_at 2026-04-21T12:55:00Z
12
value 0.11552
scoring_system epss
scoring_elements 0.93665
published_at 2026-04-24T12:55:00Z
13
value 0.11552
scoring_system epss
scoring_elements 0.93663
published_at 2026-04-26T12:55:00Z
14
value 0.11552
scoring_system epss
scoring_elements 0.93661
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0385
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0385
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0385
4
reference_url http://secunia.com/advisories/33711
reference_id
reference_type
scores
url http://secunia.com/advisories/33711
5
reference_url http://secunia.com/advisories/34296
reference_id
reference_type
scores
url http://secunia.com/advisories/34296
6
reference_url http://secunia.com/advisories/34385
reference_id
reference_type
scores
url http://secunia.com/advisories/34385
7
reference_url http://secunia.com/advisories/34712
reference_id
reference_type
scores
url http://secunia.com/advisories/34712
8
reference_url http://secunia.com/advisories/34845
reference_id
reference_type
scores
url http://secunia.com/advisories/34845
9
reference_url http://secunia.com/advisories/34905
reference_id
reference_type
scores
url http://secunia.com/advisories/34905
10
reference_url http://security.gentoo.org/glsa/glsa-200903-33.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200903-33.xml
11
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/48330
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/48330
12
reference_url http://svn.mplayerhq.hu/ffmpeg/trunk/libavformat/4xm.c?r1=16838&r2=16846&pathrev=16846
reference_id
reference_type
scores
url http://svn.mplayerhq.hu/ffmpeg/trunk/libavformat/4xm.c?r1=16838&r2=16846&pathrev=16846
13
reference_url http://svn.mplayerhq.hu/ffmpeg?view=rev&revision=16846
reference_id
reference_type
scores
url http://svn.mplayerhq.hu/ffmpeg?view=rev&revision=16846
14
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00210.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00210.html
15
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00215.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00215.html
16
reference_url http://www.debian.org/security/2009/dsa-1781
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1781
17
reference_url http://www.debian.org/security/2009/dsa-1782
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1782
18
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:297
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:297
19
reference_url http://www.securityfocus.com/archive/1/500514/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/500514/100/0/threaded
20
reference_url http://www.securityfocus.com/bid/33502
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/33502
21
reference_url http://www.trapkit.de/advisories/TKADV2009-004.txt
reference_id
reference_type
scores
url http://www.trapkit.de/advisories/TKADV2009-004.txt
22
reference_url http://www.ubuntu.com/usn/USN-734-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-734-1
23
reference_url http://www.vupen.com/english/advisories/2009/0277
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0277
24
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524805
reference_id 524805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524805
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/detail/CVE-2009-0385
reference_id CVE-2009-0385
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2009-0385
35
reference_url https://security.gentoo.org/glsa/200903-33
reference_id GLSA-200903-33
reference_type
scores
url https://security.gentoo.org/glsa/200903-33
36
reference_url https://usn.ubuntu.com/734-1/
reference_id USN-734-1
reference_type
scores
url https://usn.ubuntu.com/734-1/
fixed_packages
0
url pkg:deb/debian/mplayer@1.0~rc2-14?distro=trixie
purl pkg:deb/debian/mplayer@1.0~rc2-14?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc2-14%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
4
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2009-0385
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sgm1-d98g-nff9
36
url VCID-sm8z-qqhz-93cv
vulnerability_id VCID-sm8z-qqhz-93cv
summary
MPlayer contains a remotely exploitable buffer overflow in the HTTP parser
    that may allow attackers to run arbitrary code on a user's computer.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0386
reference_id
reference_type
scores
0
value 0.36771
scoring_system epss
scoring_elements 0.97114
published_at 2026-04-01T12:55:00Z
1
value 0.36771
scoring_system epss
scoring_elements 0.97121
published_at 2026-04-02T12:55:00Z
2
value 0.36771
scoring_system epss
scoring_elements 0.97128
published_at 2026-04-07T12:55:00Z
3
value 0.36771
scoring_system epss
scoring_elements 0.97138
published_at 2026-04-09T12:55:00Z
4
value 0.36771
scoring_system epss
scoring_elements 0.97142
published_at 2026-04-11T12:55:00Z
5
value 0.36771
scoring_system epss
scoring_elements 0.97144
published_at 2026-04-13T12:55:00Z
6
value 0.36771
scoring_system epss
scoring_elements 0.97152
published_at 2026-04-16T12:55:00Z
7
value 0.36771
scoring_system epss
scoring_elements 0.97153
published_at 2026-04-18T12:55:00Z
8
value 0.36771
scoring_system epss
scoring_elements 0.97157
published_at 2026-04-21T12:55:00Z
9
value 0.36771
scoring_system epss
scoring_elements 0.97158
published_at 2026-04-24T12:55:00Z
10
value 0.36771
scoring_system epss
scoring_elements 0.97161
published_at 2026-04-26T12:55:00Z
11
value 0.36771
scoring_system epss
scoring_elements 0.97162
published_at 2026-04-29T12:55:00Z
12
value 0.36771
scoring_system epss
scoring_elements 0.97165
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0386
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0386
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0386
2
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/23896.txt
reference_id CVE-2004-0386;OSVDB-4754
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/23896.txt
3
reference_url https://www.securityfocus.com/bid/10008/info
reference_id CVE-2004-0386;OSVDB-4754
reference_type exploit
scores
url https://www.securityfocus.com/bid/10008/info
4
reference_url https://security.gentoo.org/glsa/200403-13
reference_id GLSA-200403-13
reference_type
scores
url https://security.gentoo.org/glsa/200403-13
fixed_packages
0
url pkg:deb/debian/mplayer@1.0~pre6a-1?distro=trixie
purl pkg:deb/debian/mplayer@1.0~pre6a-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~pre6a-1%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
4
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2004-0386
risk_score 0.6
exploitability 2.0
weighted_severity 0.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sm8z-qqhz-93cv
37
url VCID-st2b-1ue7-fkcs
vulnerability_id VCID-st2b-1ue7-fkcs
summary Integer overflow in the real_setup_and_get_header function in real.c for Unix MPlayer 1.0pre5 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a Real RTSP streaming media file with a -1 content-length field, which leads to a heap-based buffer overflow.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-1311
reference_id
reference_type
scores
0
value 0.03418
scoring_system epss
scoring_elements 0.87496
published_at 2026-05-05T12:55:00Z
1
value 0.03418
scoring_system epss
scoring_elements 0.87393
published_at 2026-04-01T12:55:00Z
2
value 0.03418
scoring_system epss
scoring_elements 0.87403
published_at 2026-04-02T12:55:00Z
3
value 0.03418
scoring_system epss
scoring_elements 0.87417
published_at 2026-04-04T12:55:00Z
4
value 0.03418
scoring_system epss
scoring_elements 0.87416
published_at 2026-04-07T12:55:00Z
5
value 0.03418
scoring_system epss
scoring_elements 0.87435
published_at 2026-04-08T12:55:00Z
6
value 0.03418
scoring_system epss
scoring_elements 0.87442
published_at 2026-04-09T12:55:00Z
7
value 0.03418
scoring_system epss
scoring_elements 0.87453
published_at 2026-04-11T12:55:00Z
8
value 0.03418
scoring_system epss
scoring_elements 0.87449
published_at 2026-04-12T12:55:00Z
9
value 0.03418
scoring_system epss
scoring_elements 0.87445
published_at 2026-04-13T12:55:00Z
10
value 0.03418
scoring_system epss
scoring_elements 0.8746
published_at 2026-04-21T12:55:00Z
11
value 0.03418
scoring_system epss
scoring_elements 0.87462
published_at 2026-04-18T12:55:00Z
12
value 0.03418
scoring_system epss
scoring_elements 0.87475
published_at 2026-04-24T12:55:00Z
13
value 0.03418
scoring_system epss
scoring_elements 0.87482
published_at 2026-04-26T12:55:00Z
14
value 0.03418
scoring_system epss
scoring_elements 0.87483
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-1311
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1311
2
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/18525
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/18525
3
reference_url http://www1.mplayerhq.hu/MPlayer/patches/rtsp_fix_20041215.diff
reference_id
reference_type
scores
url http://www1.mplayerhq.hu/MPlayer/patches/rtsp_fix_20041215.diff
4
reference_url http://www1.mplayerhq.hu/MPlayer/releases/ChangeLog
reference_id
reference_type
scores
url http://www1.mplayerhq.hu/MPlayer/releases/ChangeLog
5
reference_url http://www.idefense.com/application/poi/display?id=166
reference_id
reference_type
scores
url http://www.idefense.com/application/poi/display?id=166
6
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2004:157
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2004:157
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2004-1311
reference_id CVE-2004-1311
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2004-1311
fixed_packages
0
url pkg:deb/debian/mplayer@1.0~pre6a-1?distro=trixie
purl pkg:deb/debian/mplayer@1.0~pre6a-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~pre6a-1%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
4
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2004-1311
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-st2b-1ue7-fkcs
38
url VCID-tff5-wrpr-hbe1
vulnerability_id VCID-tff5-wrpr-hbe1
summary Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-38860
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.18492
published_at 2026-04-02T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18546
published_at 2026-04-04T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18254
published_at 2026-04-07T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.18337
published_at 2026-04-08T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.1839
published_at 2026-04-11T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18342
published_at 2026-04-12T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.1829
published_at 2026-04-13T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18234
published_at 2026-04-16T12:55:00Z
8
value 0.00058
scoring_system epss
scoring_elements 0.18246
published_at 2026-04-18T12:55:00Z
9
value 0.00058
scoring_system epss
scoring_elements 0.18273
published_at 2026-04-21T12:55:00Z
10
value 0.00058
scoring_system epss
scoring_elements 0.18172
published_at 2026-04-24T12:55:00Z
11
value 0.00058
scoring_system epss
scoring_elements 0.18155
published_at 2026-04-26T12:55:00Z
12
value 0.00058
scoring_system epss
scoring_elements 0.18119
published_at 2026-04-29T12:55:00Z
13
value 0.00058
scoring_system epss
scoring_elements 0.1798
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-38860
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38860
2
reference_url https://security.gentoo.org/glsa/202405-05
reference_id GLSA-202405-05
reference_type
scores
url https://security.gentoo.org/glsa/202405-05
3
reference_url https://usn.ubuntu.com/5895-1/
reference_id USN-5895-1
reference_type
scores
url https://usn.ubuntu.com/5895-1/
fixed_packages
0
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2022-38860
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tff5-wrpr-hbe1
39
url VCID-tteq-u99e-ayg4
vulnerability_id VCID-tteq-u99e-ayg4
summary
Multiple vulnerabilities have been found in MPlayer and the bundled
    FFmpeg, the worst of which may lead to the execution of arbitrary code.
references
0
reference_url http://sam.zoy.org/blog/2007-01-16-exposing-file-parsing-vulnerabilities
reference_id
reference_type
scores
url http://sam.zoy.org/blog/2007-01-16-exposing-file-parsing-vulnerabilities
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-6718
reference_id
reference_type
scores
0
value 0.00443
scoring_system epss
scoring_elements 0.63348
published_at 2026-05-05T12:55:00Z
1
value 0.00443
scoring_system epss
scoring_elements 0.63242
published_at 2026-04-01T12:55:00Z
2
value 0.00443
scoring_system epss
scoring_elements 0.63301
published_at 2026-04-02T12:55:00Z
3
value 0.00443
scoring_system epss
scoring_elements 0.63328
published_at 2026-04-04T12:55:00Z
4
value 0.00443
scoring_system epss
scoring_elements 0.63294
published_at 2026-04-07T12:55:00Z
5
value 0.00443
scoring_system epss
scoring_elements 0.63345
published_at 2026-04-08T12:55:00Z
6
value 0.00443
scoring_system epss
scoring_elements 0.63363
published_at 2026-04-12T12:55:00Z
7
value 0.00443
scoring_system epss
scoring_elements 0.6338
published_at 2026-04-11T12:55:00Z
8
value 0.00443
scoring_system epss
scoring_elements 0.63327
published_at 2026-04-13T12:55:00Z
9
value 0.00443
scoring_system epss
scoring_elements 0.63361
published_at 2026-04-16T12:55:00Z
10
value 0.00443
scoring_system epss
scoring_elements 0.63369
published_at 2026-04-18T12:55:00Z
11
value 0.00443
scoring_system epss
scoring_elements 0.63347
published_at 2026-04-21T12:55:00Z
12
value 0.00443
scoring_system epss
scoring_elements 0.63366
published_at 2026-04-24T12:55:00Z
13
value 0.00443
scoring_system epss
scoring_elements 0.63379
published_at 2026-04-26T12:55:00Z
14
value 0.00443
scoring_system epss
scoring_elements 0.63377
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-6718
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6718
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6718
3
reference_url http://www.openwall.com/lists/oss-security/2008/10/07/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/10/07/1
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=407010
reference_id 407010
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=407010
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-6718
reference_id CVE-2007-6718
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-6718
26
reference_url https://security.gentoo.org/glsa/201310-13
reference_id GLSA-201310-13
reference_type
scores
url https://security.gentoo.org/glsa/201310-13
fixed_packages
0
url pkg:deb/debian/mplayer@1.0~rc3%2Bsvn20100502-1?distro=trixie
purl pkg:deb/debian/mplayer@1.0~rc3%2Bsvn20100502-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc3%252Bsvn20100502-1%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
4
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2007-6718
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tteq-u99e-ayg4
40
url VCID-vnmz-rcby-n3gs
vulnerability_id VCID-vnmz-rcby-n3gs
summary Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-38858
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.19364
published_at 2026-04-02T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.19415
published_at 2026-04-04T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19132
published_at 2026-04-07T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.19212
published_at 2026-04-08T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.19264
published_at 2026-04-09T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.1927
published_at 2026-04-11T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.19224
published_at 2026-04-12T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.19169
published_at 2026-04-13T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.1913
published_at 2026-04-16T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.19139
published_at 2026-04-18T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.19147
published_at 2026-04-21T12:55:00Z
11
value 0.00061
scoring_system epss
scoring_elements 0.19039
published_at 2026-04-24T12:55:00Z
12
value 0.00061
scoring_system epss
scoring_elements 0.19028
published_at 2026-04-26T12:55:00Z
13
value 0.00061
scoring_system epss
scoring_elements 0.18984
published_at 2026-04-29T12:55:00Z
14
value 0.00061
scoring_system epss
scoring_elements 0.18863
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-38858
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38858
2
reference_url https://security.gentoo.org/glsa/202405-05
reference_id GLSA-202405-05
reference_type
scores
url https://security.gentoo.org/glsa/202405-05
3
reference_url https://usn.ubuntu.com/5895-1/
reference_id USN-5895-1
reference_type
scores
url https://usn.ubuntu.com/5895-1/
fixed_packages
0
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2022-38858
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vnmz-rcby-n3gs
41
url VCID-wg5t-2vzg-b7bj
vulnerability_id VCID-wg5t-2vzg-b7bj
summary
MPlayer is vulnerable to integer overflows in FFmpeg and ASF decoding that
    could potentially result in the execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-0579
reference_id
reference_type
scores
0
value 0.03797
scoring_system epss
scoring_elements 0.88024
published_at 2026-04-01T12:55:00Z
1
value 0.03797
scoring_system epss
scoring_elements 0.88034
published_at 2026-04-02T12:55:00Z
2
value 0.03797
scoring_system epss
scoring_elements 0.88048
published_at 2026-04-04T12:55:00Z
3
value 0.03797
scoring_system epss
scoring_elements 0.88054
published_at 2026-04-07T12:55:00Z
4
value 0.03797
scoring_system epss
scoring_elements 0.88074
published_at 2026-04-08T12:55:00Z
5
value 0.03797
scoring_system epss
scoring_elements 0.88079
published_at 2026-04-09T12:55:00Z
6
value 0.03797
scoring_system epss
scoring_elements 0.88089
published_at 2026-04-11T12:55:00Z
7
value 0.03797
scoring_system epss
scoring_elements 0.88082
published_at 2026-04-12T12:55:00Z
8
value 0.03797
scoring_system epss
scoring_elements 0.88083
published_at 2026-04-13T12:55:00Z
9
value 0.03797
scoring_system epss
scoring_elements 0.88096
published_at 2026-04-16T12:55:00Z
10
value 0.03797
scoring_system epss
scoring_elements 0.88094
published_at 2026-04-21T12:55:00Z
11
value 0.03797
scoring_system epss
scoring_elements 0.88112
published_at 2026-04-24T12:55:00Z
12
value 0.03797
scoring_system epss
scoring_elements 0.88117
published_at 2026-04-26T12:55:00Z
13
value 0.03797
scoring_system epss
scoring_elements 0.88116
published_at 2026-04-29T12:55:00Z
14
value 0.03797
scoring_system epss
scoring_elements 0.88128
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-0579
1
reference_url https://security.gentoo.org/glsa/200603-03
reference_id GLSA-200603-03
reference_type
scores
url https://security.gentoo.org/glsa/200603-03
fixed_packages
0
url pkg:deb/debian/mplayer@0?distro=trixie
purl pkg:deb/debian/mplayer@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@0%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
4
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2006-0579
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wg5t-2vzg-b7bj
42
url VCID-wyvf-q6re-jfgf
vulnerability_id VCID-wyvf-q6re-jfgf
summary Stack-based buffer overflow in the asf_mmst_streaming.c functionality for MPlayer 1.0pre5 allows remote attackers to execute arbitrary code via a large MMST stream packet.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-1310
reference_id
reference_type
scores
0
value 0.05704
scoring_system epss
scoring_elements 0.90453
published_at 2026-05-05T12:55:00Z
1
value 0.05704
scoring_system epss
scoring_elements 0.90379
published_at 2026-04-01T12:55:00Z
2
value 0.05704
scoring_system epss
scoring_elements 0.90382
published_at 2026-04-02T12:55:00Z
3
value 0.05704
scoring_system epss
scoring_elements 0.90394
published_at 2026-04-04T12:55:00Z
4
value 0.05704
scoring_system epss
scoring_elements 0.90398
published_at 2026-04-07T12:55:00Z
5
value 0.05704
scoring_system epss
scoring_elements 0.90412
published_at 2026-04-08T12:55:00Z
6
value 0.05704
scoring_system epss
scoring_elements 0.90419
published_at 2026-04-09T12:55:00Z
7
value 0.05704
scoring_system epss
scoring_elements 0.90426
published_at 2026-04-12T12:55:00Z
8
value 0.05704
scoring_system epss
scoring_elements 0.90418
published_at 2026-04-13T12:55:00Z
9
value 0.05704
scoring_system epss
scoring_elements 0.90434
published_at 2026-04-18T12:55:00Z
10
value 0.05704
scoring_system epss
scoring_elements 0.90431
published_at 2026-04-21T12:55:00Z
11
value 0.05704
scoring_system epss
scoring_elements 0.90445
published_at 2026-04-24T12:55:00Z
12
value 0.05704
scoring_system epss
scoring_elements 0.90444
published_at 2026-04-26T12:55:00Z
13
value 0.05704
scoring_system epss
scoring_elements 0.90441
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-1310
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1310
2
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/18526
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/18526
3
reference_url http://www1.mplayerhq.hu/MPlayer/patches/mmst_fix_20041215.diff
reference_id
reference_type
scores
url http://www1.mplayerhq.hu/MPlayer/patches/mmst_fix_20041215.diff
4
reference_url http://www1.mplayerhq.hu/MPlayer/releases/ChangeLog
reference_id
reference_type
scores
url http://www1.mplayerhq.hu/MPlayer/releases/ChangeLog
5
reference_url http://www.idefense.com/application/poi/display?id=167
reference_id
reference_type
scores
url http://www.idefense.com/application/poi/display?id=167
6
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2004:157
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2004:157
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2004-1310
reference_id CVE-2004-1310
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2004-1310
fixed_packages
0
url pkg:deb/debian/mplayer@1.0~pre6a-1?distro=trixie
purl pkg:deb/debian/mplayer@1.0~pre6a-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~pre6a-1%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
4
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2004-1310
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wyvf-q6re-jfgf
43
url VCID-xb3p-8n52-byaf
vulnerability_id VCID-xb3p-8n52-byaf
summary
FFmpeg is vulnerable to multiple buffer overflows that might be exploited
    to execute arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-4800
reference_id
reference_type
scores
0
value 0.06299
scoring_system epss
scoring_elements 0.90904
published_at 2026-04-01T12:55:00Z
1
value 0.06299
scoring_system epss
scoring_elements 0.90909
published_at 2026-04-02T12:55:00Z
2
value 0.06299
scoring_system epss
scoring_elements 0.90919
published_at 2026-04-04T12:55:00Z
3
value 0.06299
scoring_system epss
scoring_elements 0.90929
published_at 2026-04-07T12:55:00Z
4
value 0.06299
scoring_system epss
scoring_elements 0.9094
published_at 2026-04-08T12:55:00Z
5
value 0.06299
scoring_system epss
scoring_elements 0.90947
published_at 2026-04-09T12:55:00Z
6
value 0.06299
scoring_system epss
scoring_elements 0.90955
published_at 2026-04-13T12:55:00Z
7
value 0.06299
scoring_system epss
scoring_elements 0.90956
published_at 2026-04-12T12:55:00Z
8
value 0.06299
scoring_system epss
scoring_elements 0.9098
published_at 2026-04-16T12:55:00Z
9
value 0.06299
scoring_system epss
scoring_elements 0.90978
published_at 2026-04-18T12:55:00Z
10
value 0.06299
scoring_system epss
scoring_elements 0.90979
published_at 2026-04-21T12:55:00Z
11
value 0.06299
scoring_system epss
scoring_elements 0.90991
published_at 2026-04-24T12:55:00Z
12
value 0.06299
scoring_system epss
scoring_elements 0.9099
published_at 2026-04-26T12:55:00Z
13
value 0.06299
scoring_system epss
scoring_elements 0.90986
published_at 2026-04-29T12:55:00Z
14
value 0.06299
scoring_system epss
scoring_elements 0.91002
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-4800
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4800
2
reference_url https://security.gentoo.org/glsa/200609-09
reference_id GLSA-200609-09
reference_type
scores
url https://security.gentoo.org/glsa/200609-09
3
reference_url https://usn.ubuntu.com/358-1/
reference_id USN-358-1
reference_type
scores
url https://usn.ubuntu.com/358-1/
fixed_packages
0
url pkg:deb/debian/mplayer@1.0~rc1-1?distro=trixie
purl pkg:deb/debian/mplayer@1.0~rc1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc1-1%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
4
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2006-4800
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xb3p-8n52-byaf
44
url VCID-xfdf-djbw-3yht
vulnerability_id VCID-xfdf-djbw-3yht
summary
Two vulnerabilities have been discovered in MPlayer, each one could lead to
    the execution of arbitrary code.
references
0
reference_url http://lists.grok.org.uk/pipermail/full-disclosure/2007-March/052738.html
reference_id
reference_type
scores
url http://lists.grok.org.uk/pipermail/full-disclosure/2007-March/052738.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-1246
reference_id
reference_type
scores
0
value 0.09304
scoring_system epss
scoring_elements 0.92774
published_at 2026-05-05T12:55:00Z
1
value 0.09304
scoring_system epss
scoring_elements 0.92718
published_at 2026-04-01T12:55:00Z
2
value 0.09304
scoring_system epss
scoring_elements 0.92725
published_at 2026-04-02T12:55:00Z
3
value 0.09304
scoring_system epss
scoring_elements 0.9273
published_at 2026-04-04T12:55:00Z
4
value 0.09304
scoring_system epss
scoring_elements 0.92728
published_at 2026-04-07T12:55:00Z
5
value 0.09304
scoring_system epss
scoring_elements 0.92738
published_at 2026-04-08T12:55:00Z
6
value 0.09304
scoring_system epss
scoring_elements 0.92742
published_at 2026-04-09T12:55:00Z
7
value 0.09304
scoring_system epss
scoring_elements 0.92748
published_at 2026-04-11T12:55:00Z
8
value 0.09304
scoring_system epss
scoring_elements 0.92746
published_at 2026-04-13T12:55:00Z
9
value 0.09304
scoring_system epss
scoring_elements 0.92758
published_at 2026-04-18T12:55:00Z
10
value 0.09304
scoring_system epss
scoring_elements 0.92762
published_at 2026-04-21T12:55:00Z
11
value 0.09304
scoring_system epss
scoring_elements 0.92769
published_at 2026-04-26T12:55:00Z
12
value 0.09304
scoring_system epss
scoring_elements 0.92764
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-1246
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1246
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1246
3
reference_url http://secunia.com/advisories/24443
reference_id
reference_type
scores
url http://secunia.com/advisories/24443
4
reference_url http://secunia.com/advisories/24444
reference_id
reference_type
scores
url http://secunia.com/advisories/24444
5
reference_url http://secunia.com/advisories/24446
reference_id
reference_type
scores
url http://secunia.com/advisories/24446
6
reference_url http://secunia.com/advisories/24448
reference_id
reference_type
scores
url http://secunia.com/advisories/24448
7
reference_url http://secunia.com/advisories/24462
reference_id
reference_type
scores
url http://secunia.com/advisories/24462
8
reference_url http://secunia.com/advisories/24866
reference_id
reference_type
scores
url http://secunia.com/advisories/24866
9
reference_url http://secunia.com/advisories/24897
reference_id
reference_type
scores
url http://secunia.com/advisories/24897
10
reference_url http://secunia.com/advisories/24995
reference_id
reference_type
scores
url http://secunia.com/advisories/24995
11
reference_url http://secunia.com/advisories/25462
reference_id
reference_type
scores
url http://secunia.com/advisories/25462
12
reference_url http://secunia.com/advisories/29601
reference_id
reference_type
scores
url http://secunia.com/advisories/29601
13
reference_url http://security.gentoo.org/glsa/glsa-200704-09.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200704-09.xml
14
reference_url http://security.gentoo.org/glsa/glsa-200705-21.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200705-21.xml
15
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/32747
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/32747
16
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.449141
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.449141
17
reference_url http://svn.mplayerhq.hu/mplayer/trunk/loader/dmo/DMO_VideoDecoder.c
reference_id
reference_type
scores
url http://svn.mplayerhq.hu/mplayer/trunk/loader/dmo/DMO_VideoDecoder.c
18
reference_url http://svn.mplayerhq.hu/mplayer/trunk/loader/dmo/DMO_VideoDecoder.c?r1=22019&r2=22204
reference_id
reference_type
scores
url http://svn.mplayerhq.hu/mplayer/trunk/loader/dmo/DMO_VideoDecoder.c?r1=22019&r2=22204
19
reference_url http://www.debian.org/security/2008/dsa-1536
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1536
20
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:055
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:055
21
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:057
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:057
22
reference_url http://www.novell.com/linux/security/advisories/2007_007_suse.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_007_suse.html
23
reference_url http://www.novell.com/linux/security/advisories/2007_5_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_5_sr.html
24
reference_url http://www.securityfocus.com/archive/1/466691/30/6900/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/466691/30/6900/threaded
25
reference_url http://www.securityfocus.com/bid/22771
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/22771
26
reference_url http://www.ubuntu.com/usn/usn-433-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-433-1
27
reference_url http://www.vupen.com/english/advisories/2007/0794
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0794
28
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414075
reference_id 414075
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414075
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-1246
reference_id CVE-2007-1246
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-1246
31
reference_url https://security.gentoo.org/glsa/200704-09
reference_id GLSA-200704-09
reference_type
scores
url https://security.gentoo.org/glsa/200704-09
32
reference_url https://security.gentoo.org/glsa/200705-21
reference_id GLSA-200705-21
reference_type
scores
url https://security.gentoo.org/glsa/200705-21
33
reference_url https://usn.ubuntu.com/433-1/
reference_id USN-433-1
reference_type
scores
url https://usn.ubuntu.com/433-1/
fixed_packages
0
url pkg:deb/debian/mplayer@1.0~rc1-13?distro=trixie
purl pkg:deb/debian/mplayer@1.0~rc1-13?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc1-13%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
4
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2007-1246
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xfdf-djbw-3yht
45
url VCID-xxgu-jjrs-pkaz
vulnerability_id VCID-xxgu-jjrs-pkaz
summary Integer overflow in the demuxer function in libmpdemux/demux_gif.c in Mplayer allows remote attackers to cause a denial of service (crash) via large dimensions in a gif file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4352
reference_id
reference_type
scores
0
value 0.00202
scoring_system epss
scoring_elements 0.42241
published_at 2026-04-01T12:55:00Z
1
value 0.00202
scoring_system epss
scoring_elements 0.42316
published_at 2026-04-02T12:55:00Z
2
value 0.00202
scoring_system epss
scoring_elements 0.42345
published_at 2026-04-04T12:55:00Z
3
value 0.00202
scoring_system epss
scoring_elements 0.42286
published_at 2026-04-07T12:55:00Z
4
value 0.00202
scoring_system epss
scoring_elements 0.42334
published_at 2026-04-08T12:55:00Z
5
value 0.00202
scoring_system epss
scoring_elements 0.42342
published_at 2026-04-09T12:55:00Z
6
value 0.00202
scoring_system epss
scoring_elements 0.42365
published_at 2026-04-11T12:55:00Z
7
value 0.00202
scoring_system epss
scoring_elements 0.42328
published_at 2026-04-12T12:55:00Z
8
value 0.00202
scoring_system epss
scoring_elements 0.423
published_at 2026-04-13T12:55:00Z
9
value 0.00202
scoring_system epss
scoring_elements 0.4235
published_at 2026-04-16T12:55:00Z
10
value 0.00202
scoring_system epss
scoring_elements 0.42326
published_at 2026-04-18T12:55:00Z
11
value 0.00202
scoring_system epss
scoring_elements 0.42253
published_at 2026-04-21T12:55:00Z
12
value 0.00202
scoring_system epss
scoring_elements 0.42185
published_at 2026-04-24T12:55:00Z
13
value 0.00202
scoring_system epss
scoring_elements 0.4218
published_at 2026-04-26T12:55:00Z
14
value 0.00202
scoring_system epss
scoring_elements 0.42098
published_at 2026-04-29T12:55:00Z
15
value 0.00202
scoring_system epss
scoring_elements 0.41956
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4352
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4352
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823723
reference_id 823723
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823723
fixed_packages
0
url pkg:deb/debian/mplayer@2:1.3.0-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.3.0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.3.0-2%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
4
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2016-4352
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xxgu-jjrs-pkaz
46
url VCID-ybgy-yct3-6fba
vulnerability_id VCID-ybgy-yct3-6fba
summary
Multiple vulnerabilities have been found in MPlayer and the bundled
    FFmpeg, the worst of which may lead to the execution of arbitrary code.
references
0
reference_url http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=dc74600c97eb834c08674676e209afa842053aca
reference_id
reference_type
scores
url http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=dc74600c97eb834c08674676e209afa842053aca
1
reference_url http://openwall.com/lists/oss-security/2010/06/04/4
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/06/04/4
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2062
reference_id
reference_type
scores
0
value 0.02991
scoring_system epss
scoring_elements 0.86607
published_at 2026-05-05T12:55:00Z
1
value 0.02991
scoring_system epss
scoring_elements 0.86483
published_at 2026-04-01T12:55:00Z
2
value 0.02991
scoring_system epss
scoring_elements 0.86493
published_at 2026-04-02T12:55:00Z
3
value 0.02991
scoring_system epss
scoring_elements 0.86512
published_at 2026-04-04T12:55:00Z
4
value 0.02991
scoring_system epss
scoring_elements 0.86511
published_at 2026-04-07T12:55:00Z
5
value 0.02991
scoring_system epss
scoring_elements 0.86531
published_at 2026-04-08T12:55:00Z
6
value 0.02991
scoring_system epss
scoring_elements 0.86541
published_at 2026-04-09T12:55:00Z
7
value 0.02991
scoring_system epss
scoring_elements 0.86556
published_at 2026-04-11T12:55:00Z
8
value 0.02991
scoring_system epss
scoring_elements 0.86552
published_at 2026-04-12T12:55:00Z
9
value 0.02991
scoring_system epss
scoring_elements 0.86547
published_at 2026-04-13T12:55:00Z
10
value 0.02991
scoring_system epss
scoring_elements 0.86561
published_at 2026-04-16T12:55:00Z
11
value 0.02991
scoring_system epss
scoring_elements 0.86567
published_at 2026-04-18T12:55:00Z
12
value 0.02991
scoring_system epss
scoring_elements 0.8656
published_at 2026-04-21T12:55:00Z
13
value 0.02991
scoring_system epss
scoring_elements 0.86578
published_at 2026-04-24T12:55:00Z
14
value 0.02991
scoring_system epss
scoring_elements 0.86587
published_at 2026-04-26T12:55:00Z
15
value 0.02991
scoring_system epss
scoring_elements 0.86586
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2062
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2062
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2062
4
reference_url https://dzcore.wordpress.com/2009/07/27/dzc-2009-001-the-movie-player-and-vlc-media-player-real-data-transport-parsing-integer-underflow/
reference_id
reference_type
scores
url https://dzcore.wordpress.com/2009/07/27/dzc-2009-001-the-movie-player-and-vlc-media-player-real-data-transport-parsing-integer-underflow/
5
reference_url http://seclists.org/fulldisclosure/2009/Jul/418
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2009/Jul/418
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=581245
reference_id 581245
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=581245
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1337:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.1337:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1337:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2062
reference_id CVE-2010-2062
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2062
47
reference_url https://security.gentoo.org/glsa/201310-13
reference_id GLSA-201310-13
reference_type
scores
url https://security.gentoo.org/glsa/201310-13
48
reference_url https://security.gentoo.org/glsa/201411-01
reference_id GLSA-201411-01
reference_type
scores
url https://security.gentoo.org/glsa/201411-01
fixed_packages
0
url pkg:deb/debian/mplayer@2:1.0~rc3%2Bsvn20100502-3?distro=trixie
purl pkg:deb/debian/mplayer@2:1.0~rc3%2Bsvn20100502-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.0~rc3%252Bsvn20100502-3%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
4
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2010-2062
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ybgy-yct3-6fba
47
url VCID-z3dv-rb28-kycj
vulnerability_id VCID-z3dv-rb28-kycj
summary Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-38856
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09439
published_at 2026-04-02T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09488
published_at 2026-04-04T12:55:00Z
2
value 0.00033
scoring_system epss
scoring_elements 0.094
published_at 2026-04-07T12:55:00Z
3
value 0.00033
scoring_system epss
scoring_elements 0.09474
published_at 2026-04-08T12:55:00Z
4
value 0.00033
scoring_system epss
scoring_elements 0.09522
published_at 2026-04-09T12:55:00Z
5
value 0.00033
scoring_system epss
scoring_elements 0.09535
published_at 2026-04-11T12:55:00Z
6
value 0.00033
scoring_system epss
scoring_elements 0.09506
published_at 2026-04-12T12:55:00Z
7
value 0.00033
scoring_system epss
scoring_elements 0.09489
published_at 2026-04-13T12:55:00Z
8
value 0.00033
scoring_system epss
scoring_elements 0.09382
published_at 2026-04-16T12:55:00Z
9
value 0.00033
scoring_system epss
scoring_elements 0.09383
published_at 2026-04-18T12:55:00Z
10
value 0.00033
scoring_system epss
scoring_elements 0.09533
published_at 2026-04-21T12:55:00Z
11
value 0.00033
scoring_system epss
scoring_elements 0.09579
published_at 2026-04-24T12:55:00Z
12
value 0.00033
scoring_system epss
scoring_elements 0.09546
published_at 2026-04-26T12:55:00Z
13
value 0.00033
scoring_system epss
scoring_elements 0.09504
published_at 2026-04-29T12:55:00Z
14
value 0.00033
scoring_system epss
scoring_elements 0.09415
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-38856
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38856
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021013
reference_id 1021013
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021013
3
reference_url https://security.gentoo.org/glsa/202405-05
reference_id GLSA-202405-05
reference_type
scores
url https://security.gentoo.org/glsa/202405-05
fixed_packages
0
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2022-38856
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z3dv-rb28-kycj
48
url VCID-zpam-9ay6-d7a3
vulnerability_id VCID-zpam-9ay6-d7a3
summary The pnm_get_chunk function in xine 0.99.2 and earlier, and other packages such as MPlayer that use the same code, does not properly verify that the chunk size is less than the PREAMBLE_SIZE, which causes a read operation with a negative length that leads to a buffer overflow via (1) RMF_TAG, (2) DATA_TAG, (3) PROP_TAG, (4) MDPR_TAG, and (5) CONT_TAG values, a different vulnerability than CVE-2004-1187.
references
0
reference_url http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/pnm.c?r1=1.20&r2=1.21
reference_id
reference_type
scores
url http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/pnm.c?r1=1.20&r2=1.21
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-1188
reference_id
reference_type
scores
0
value 0.00495
scoring_system epss
scoring_elements 0.658
published_at 2026-05-05T12:55:00Z
1
value 0.00495
scoring_system epss
scoring_elements 0.65682
published_at 2026-04-01T12:55:00Z
2
value 0.00495
scoring_system epss
scoring_elements 0.65732
published_at 2026-04-02T12:55:00Z
3
value 0.00495
scoring_system epss
scoring_elements 0.65761
published_at 2026-04-04T12:55:00Z
4
value 0.00495
scoring_system epss
scoring_elements 0.65727
published_at 2026-04-07T12:55:00Z
5
value 0.00495
scoring_system epss
scoring_elements 0.6578
published_at 2026-04-08T12:55:00Z
6
value 0.00495
scoring_system epss
scoring_elements 0.6579
published_at 2026-04-09T12:55:00Z
7
value 0.00495
scoring_system epss
scoring_elements 0.65811
published_at 2026-04-11T12:55:00Z
8
value 0.00495
scoring_system epss
scoring_elements 0.65797
published_at 2026-04-12T12:55:00Z
9
value 0.00495
scoring_system epss
scoring_elements 0.65767
published_at 2026-04-13T12:55:00Z
10
value 0.00495
scoring_system epss
scoring_elements 0.65801
published_at 2026-04-16T12:55:00Z
11
value 0.00495
scoring_system epss
scoring_elements 0.65816
published_at 2026-04-18T12:55:00Z
12
value 0.00495
scoring_system epss
scoring_elements 0.65802
published_at 2026-04-21T12:55:00Z
13
value 0.00495
scoring_system epss
scoring_elements 0.65814
published_at 2026-04-24T12:55:00Z
14
value 0.00495
scoring_system epss
scoring_elements 0.65825
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-1188
2
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/18638
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/18638
3
reference_url http://www.idefense.com/application/poi/display?id=177&type=vulnerabilities
reference_id
reference_type
scores
url http://www.idefense.com/application/poi/display?id=177&type=vulnerabilities
4
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:011
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:011
5
reference_url http://www.mplayerhq.hu/MPlayer/patches/pnm_fix_20041215.diff
reference_id
reference_type
scores
url http://www.mplayerhq.hu/MPlayer/patches/pnm_fix_20041215.diff
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:head_cvs:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:head_cvs:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:head_cvs:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:0.9.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:0.9.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:0.9.13:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:0.9.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:0.9.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:0.9.18:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:0.9.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:0.9.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:0.9.8:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_alpha:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_alpha:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_alpha:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_beta1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_beta10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta10:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_beta11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta11:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_beta12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta12:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_beta2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_beta3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta3:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_beta4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta4:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_beta5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta5:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_beta6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta6:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_beta7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta7:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_beta8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta8:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_beta9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_beta9:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_rc0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc0a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_rc0a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc0a:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_rc1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_rc2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_rc3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc3:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc3a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_rc3a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc3a:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc3b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_rc3b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc3b:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_rc4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc4:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_rc5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc5:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_rc6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc6:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc6a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_rc6a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc6a:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_rc7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc7:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1_rc8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1_rc8:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:0.9.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.8:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.99:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:0.99:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.99:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_alpha:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_alpha:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_alpha:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_rc0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_rc1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc1:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_rc2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc2:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_rc3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_rc3a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3a:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_rc3b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3b:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_rc3c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc3c:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_rc4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc4:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_rc5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc5:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_rc6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc6:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc6a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_rc6a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc6a:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_rc7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc7:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/detail/CVE-2004-1188
reference_id CVE-2004-1188
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2004-1188
fixed_packages
0
url pkg:deb/debian/mplayer@0?distro=trixie
purl pkg:deb/debian/mplayer@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@0%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
4
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
aliases CVE-2004-1188
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zpam-9ay6-d7a3
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie