Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
Typedeb
Namespacedebian
Namevlc
Version3.0.23-0+deb13u1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version3.0.23-1
Latest_non_vulnerable_version3.0.23-3
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-14gq-a12n-8yee
vulnerability_id VCID-14gq-a12n-8yee
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could lead to user-assisted execution of arbitrary code.
references
0
reference_url http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=861e374d03e6c60c7d3c98428c632fe3b9e371b2
reference_id
reference_type
scores
url http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=861e374d03e6c60c7d3c98428c632fe3b9e371b2
1
reference_url http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=c5b02d011b8c634d041167f4d2936b55eca4d18d
reference_id
reference_type
scores
url http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=c5b02d011b8c634d041167f4d2936b55eca4d18d
2
reference_url http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=dfe7084e8cc64e9b7a87cd37065b59cba2064823
reference_id
reference_type
scores
url http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=dfe7084e8cc64e9b7a87cd37065b59cba2064823
3
reference_url http://openwall.com/lists/oss-security/2011/10/18/10
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/10/18/10
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3623
reference_id
reference_type
scores
0
value 0.03687
scoring_system epss
scoring_elements 0.87997
published_at 2026-05-07T12:55:00Z
1
value 0.03687
scoring_system epss
scoring_elements 0.87876
published_at 2026-04-01T12:55:00Z
2
value 0.03687
scoring_system epss
scoring_elements 0.87887
published_at 2026-04-02T12:55:00Z
3
value 0.03687
scoring_system epss
scoring_elements 0.879
published_at 2026-04-04T12:55:00Z
4
value 0.03687
scoring_system epss
scoring_elements 0.87903
published_at 2026-04-07T12:55:00Z
5
value 0.03687
scoring_system epss
scoring_elements 0.87924
published_at 2026-04-08T12:55:00Z
6
value 0.03687
scoring_system epss
scoring_elements 0.87931
published_at 2026-04-09T12:55:00Z
7
value 0.03687
scoring_system epss
scoring_elements 0.87941
published_at 2026-04-11T12:55:00Z
8
value 0.03687
scoring_system epss
scoring_elements 0.87934
published_at 2026-04-12T12:55:00Z
9
value 0.03687
scoring_system epss
scoring_elements 0.87933
published_at 2026-04-13T12:55:00Z
10
value 0.03687
scoring_system epss
scoring_elements 0.87948
published_at 2026-04-21T12:55:00Z
11
value 0.03687
scoring_system epss
scoring_elements 0.87965
published_at 2026-04-24T12:55:00Z
12
value 0.03687
scoring_system epss
scoring_elements 0.87971
published_at 2026-04-29T12:55:00Z
13
value 0.03687
scoring_system epss
scoring_elements 0.87982
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3623
5
reference_url https://bugs.gentoo.org/show_bug.cgi?id=285370
reference_id
reference_type
scores
url https://bugs.gentoo.org/show_bug.cgi?id=285370
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3623
7
reference_url http://www.videolan.org/security/sa0901.html
reference_id
reference_type
scores
url http://www.videolan.org/security/sa0901.html
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1337:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.1337:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1337:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-3623
reference_id CVE-2011-3623
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2011-3623
49
reference_url https://security.gentoo.org/glsa/201411-01
reference_id GLSA-201411-01
reference_type
scores
url https://security.gentoo.org/glsa/201411-01
fixed_packages
0
url pkg:deb/debian/vlc@1.1.3-1?distro=trixie
purl pkg:deb/debian/vlc@1.1.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@1.1.3-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2011-3623
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-14gq-a12n-8yee
1
url VCID-1utk-kk7m-pqa8
vulnerability_id VCID-1utk-kk7m-pqa8
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could result in the arbitrary execution of code.
references
0
reference_url http://git.videolan.org/?p=vlc.git&a=search&h=refs/heads/master&st=commit&s=cve-2019
reference_id
reference_type
scores
url http://git.videolan.org/?p=vlc.git&a=search&h=refs/heads/master&st=commit&s=cve-2019
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00036.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00036.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00046.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00046.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-14970
reference_id
reference_type
scores
0
value 0.00623
scoring_system epss
scoring_elements 0.70234
published_at 2026-05-07T12:55:00Z
1
value 0.00623
scoring_system epss
scoring_elements 0.70191
published_at 2026-05-05T12:55:00Z
2
value 0.00623
scoring_system epss
scoring_elements 0.70064
published_at 2026-04-01T12:55:00Z
3
value 0.00623
scoring_system epss
scoring_elements 0.70077
published_at 2026-04-02T12:55:00Z
4
value 0.00623
scoring_system epss
scoring_elements 0.70091
published_at 2026-04-04T12:55:00Z
5
value 0.00623
scoring_system epss
scoring_elements 0.70068
published_at 2026-04-07T12:55:00Z
6
value 0.00623
scoring_system epss
scoring_elements 0.70116
published_at 2026-04-08T12:55:00Z
7
value 0.00623
scoring_system epss
scoring_elements 0.70132
published_at 2026-04-09T12:55:00Z
8
value 0.00623
scoring_system epss
scoring_elements 0.70156
published_at 2026-04-11T12:55:00Z
9
value 0.00623
scoring_system epss
scoring_elements 0.70141
published_at 2026-04-12T12:55:00Z
10
value 0.00623
scoring_system epss
scoring_elements 0.70128
published_at 2026-04-13T12:55:00Z
11
value 0.00623
scoring_system epss
scoring_elements 0.70172
published_at 2026-04-16T12:55:00Z
12
value 0.00623
scoring_system epss
scoring_elements 0.70181
published_at 2026-04-18T12:55:00Z
13
value 0.00623
scoring_system epss
scoring_elements 0.70159
published_at 2026-04-21T12:55:00Z
14
value 0.00623
scoring_system epss
scoring_elements 0.7021
published_at 2026-04-24T12:55:00Z
15
value 0.00623
scoring_system epss
scoring_elements 0.70217
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-14970
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13602
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13962
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14437
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14438
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14438
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14498
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14533
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14534
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14534
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14535
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14535
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14776
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14777
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14778
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14970
16
reference_url https://seclists.org/bugtraq/2019/Aug/36
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Aug/36
17
reference_url https://www.debian.org/security/2019/dsa-4504
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4504
18
reference_url https://www.videolan.org/security/sb-vlc308.html
reference_id
reference_type
scores
url https://www.videolan.org/security/sb-vlc308.html
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:3.0.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:3.0.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:3.0.7.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-14970
reference_id CVE-2019-14970
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-14970
23
reference_url https://security.gentoo.org/glsa/201909-02
reference_id GLSA-201909-02
reference_type
scores
url https://security.gentoo.org/glsa/201909-02
24
reference_url https://usn.ubuntu.com/4131-1/
reference_id USN-4131-1
reference_type
scores
url https://usn.ubuntu.com/4131-1/
fixed_packages
0
url pkg:deb/debian/vlc@3.0.8-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.8-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2019-14970
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1utk-kk7m-pqa8
2
url VCID-24xa-1hn8-rkbe
vulnerability_id VCID-24xa-1hn8-rkbe
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-25804
reference_id
reference_type
scores
0
value 0.01001
scoring_system epss
scoring_elements 0.76935
published_at 2026-04-01T12:55:00Z
1
value 0.01001
scoring_system epss
scoring_elements 0.76941
published_at 2026-04-02T12:55:00Z
2
value 0.01001
scoring_system epss
scoring_elements 0.76971
published_at 2026-04-04T12:55:00Z
3
value 0.01001
scoring_system epss
scoring_elements 0.76953
published_at 2026-04-07T12:55:00Z
4
value 0.01001
scoring_system epss
scoring_elements 0.76985
published_at 2026-04-08T12:55:00Z
5
value 0.01001
scoring_system epss
scoring_elements 0.76996
published_at 2026-04-09T12:55:00Z
6
value 0.01001
scoring_system epss
scoring_elements 0.77023
published_at 2026-04-11T12:55:00Z
7
value 0.01001
scoring_system epss
scoring_elements 0.77002
published_at 2026-04-12T12:55:00Z
8
value 0.01001
scoring_system epss
scoring_elements 0.76997
published_at 2026-04-13T12:55:00Z
9
value 0.01001
scoring_system epss
scoring_elements 0.77038
published_at 2026-04-16T12:55:00Z
10
value 0.01001
scoring_system epss
scoring_elements 0.7704
published_at 2026-04-18T12:55:00Z
11
value 0.01001
scoring_system epss
scoring_elements 0.77033
published_at 2026-04-21T12:55:00Z
12
value 0.01001
scoring_system epss
scoring_elements 0.77067
published_at 2026-04-24T12:55:00Z
13
value 0.01001
scoring_system epss
scoring_elements 0.77074
published_at 2026-04-26T12:55:00Z
14
value 0.01001
scoring_system epss
scoring_elements 0.77088
published_at 2026-04-29T12:55:00Z
15
value 0.01001
scoring_system epss
scoring_elements 0.77097
published_at 2026-05-05T12:55:00Z
16
value 0.01001
scoring_system epss
scoring_elements 0.77127
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-25804
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26664
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25801
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25802
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25803
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25804
6
reference_url https://usn.ubuntu.com/6180-1/
reference_id USN-6180-1
reference_type
scores
url https://usn.ubuntu.com/6180-1/
fixed_packages
0
url pkg:deb/debian/vlc@3.0.12-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.12-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2021-25804
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-24xa-1hn8-rkbe
3
url VCID-27xm-d15a-yugk
vulnerability_id VCID-27xm-d15a-yugk
summary
Multiple vulnerabilities have been found in libmicrodns, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6072
reference_id
reference_type
scores
0
value 0.00827
scoring_system epss
scoring_elements 0.746
published_at 2026-05-07T12:55:00Z
1
value 0.00827
scoring_system epss
scoring_elements 0.74568
published_at 2026-04-29T12:55:00Z
2
value 0.00827
scoring_system epss
scoring_elements 0.7457
published_at 2026-05-05T12:55:00Z
3
value 0.00827
scoring_system epss
scoring_elements 0.74441
published_at 2026-04-01T12:55:00Z
4
value 0.00827
scoring_system epss
scoring_elements 0.74445
published_at 2026-04-02T12:55:00Z
5
value 0.00827
scoring_system epss
scoring_elements 0.74472
published_at 2026-04-04T12:55:00Z
6
value 0.00827
scoring_system epss
scoring_elements 0.74446
published_at 2026-04-07T12:55:00Z
7
value 0.00827
scoring_system epss
scoring_elements 0.74478
published_at 2026-04-08T12:55:00Z
8
value 0.00827
scoring_system epss
scoring_elements 0.74494
published_at 2026-04-09T12:55:00Z
9
value 0.00827
scoring_system epss
scoring_elements 0.74516
published_at 2026-04-11T12:55:00Z
10
value 0.00827
scoring_system epss
scoring_elements 0.74497
published_at 2026-04-12T12:55:00Z
11
value 0.00827
scoring_system epss
scoring_elements 0.74489
published_at 2026-04-13T12:55:00Z
12
value 0.00827
scoring_system epss
scoring_elements 0.74526
published_at 2026-04-21T12:55:00Z
13
value 0.00827
scoring_system epss
scoring_elements 0.74534
published_at 2026-04-18T12:55:00Z
14
value 0.00827
scoring_system epss
scoring_elements 0.74561
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6072
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19721
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6071
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6071
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6072
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6072
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6073
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6077
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6078
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6079
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6080
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6080
9
reference_url https://talosintelligence.com/vulnerability_reports/TALOS-2020-0995
reference_id
reference_type
scores
url https://talosintelligence.com/vulnerability_reports/TALOS-2020-0995
10
reference_url https://www.debian.org/security/2020/dsa-4671
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4671
11
reference_url https://security.archlinux.org/ASA-202004-24
reference_id ASA-202004-24
reference_type
scores
url https://security.archlinux.org/ASA-202004-24
12
reference_url https://security.archlinux.org/AVG-1136
reference_id AVG-1136
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1136
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolabs:libmicrodns:0.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolabs:libmicrodns:0.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolabs:libmicrodns:0.1.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-6072
reference_id CVE-2020-6072
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-6072
16
reference_url https://security.gentoo.org/glsa/202005-10
reference_id GLSA-202005-10
reference_type
scores
url https://security.gentoo.org/glsa/202005-10
17
reference_url https://usn.ubuntu.com/7239-1/
reference_id USN-7239-1
reference_type
scores
url https://usn.ubuntu.com/7239-1/
fixed_packages
0
url pkg:deb/debian/vlc@3.0.8-4?distro=trixie
purl pkg:deb/debian/vlc@3.0.8-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.8-4%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2020-6072
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-27xm-d15a-yugk
4
url VCID-2b7e-qhwc-xqhr
vulnerability_id VCID-2b7e-qhwc-xqhr
summary
Multiple vulnerabilities were found in VLC, allowing for the execution of
    arbitrary code and Denial of Service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0295
reference_id
reference_type
scores
0
value 0.32938
scoring_system epss
scoring_elements 0.96857
published_at 2026-04-01T12:55:00Z
1
value 0.32938
scoring_system epss
scoring_elements 0.96865
published_at 2026-04-02T12:55:00Z
2
value 0.32938
scoring_system epss
scoring_elements 0.9687
published_at 2026-04-04T12:55:00Z
3
value 0.32938
scoring_system epss
scoring_elements 0.96875
published_at 2026-04-07T12:55:00Z
4
value 0.32938
scoring_system epss
scoring_elements 0.96883
published_at 2026-04-08T12:55:00Z
5
value 0.32938
scoring_system epss
scoring_elements 0.96885
published_at 2026-04-09T12:55:00Z
6
value 0.32938
scoring_system epss
scoring_elements 0.96887
published_at 2026-04-11T12:55:00Z
7
value 0.32938
scoring_system epss
scoring_elements 0.96889
published_at 2026-04-12T12:55:00Z
8
value 0.32938
scoring_system epss
scoring_elements 0.9689
published_at 2026-04-13T12:55:00Z
9
value 0.32938
scoring_system epss
scoring_elements 0.96897
published_at 2026-04-16T12:55:00Z
10
value 0.32938
scoring_system epss
scoring_elements 0.96901
published_at 2026-04-18T12:55:00Z
11
value 0.32938
scoring_system epss
scoring_elements 0.96905
published_at 2026-04-24T12:55:00Z
12
value 0.32938
scoring_system epss
scoring_elements 0.96908
published_at 2026-04-26T12:55:00Z
13
value 0.32938
scoring_system epss
scoring_elements 0.96912
published_at 2026-04-29T12:55:00Z
14
value 0.32938
scoring_system epss
scoring_elements 0.96915
published_at 2026-05-05T12:55:00Z
15
value 0.32938
scoring_system epss
scoring_elements 0.96919
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0295
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0295
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=461544
reference_id 461544
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=461544
3
reference_url https://security.gentoo.org/glsa/200803-13
reference_id GLSA-200803-13
reference_type
scores
url https://security.gentoo.org/glsa/200803-13
fixed_packages
0
url pkg:deb/debian/vlc@0.8.6.c-6?distro=trixie
purl pkg:deb/debian/vlc@0.8.6.c-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0.8.6.c-6%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2008-0295
risk_score 0.6
exploitability 2.0
weighted_severity 0.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2b7e-qhwc-xqhr
5
url VCID-2d6p-9nvq-m3hc
vulnerability_id VCID-2d6p-9nvq-m3hc
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9630
reference_id
reference_type
scores
0
value 0.00398
scoring_system epss
scoring_elements 0.60495
published_at 2026-04-01T12:55:00Z
1
value 0.00398
scoring_system epss
scoring_elements 0.60569
published_at 2026-04-02T12:55:00Z
2
value 0.00398
scoring_system epss
scoring_elements 0.60597
published_at 2026-05-05T12:55:00Z
3
value 0.00398
scoring_system epss
scoring_elements 0.60566
published_at 2026-04-07T12:55:00Z
4
value 0.00398
scoring_system epss
scoring_elements 0.60615
published_at 2026-04-08T12:55:00Z
5
value 0.00398
scoring_system epss
scoring_elements 0.60631
published_at 2026-04-09T12:55:00Z
6
value 0.00398
scoring_system epss
scoring_elements 0.60655
published_at 2026-04-11T12:55:00Z
7
value 0.00398
scoring_system epss
scoring_elements 0.60641
published_at 2026-04-12T12:55:00Z
8
value 0.00398
scoring_system epss
scoring_elements 0.6062
published_at 2026-04-13T12:55:00Z
9
value 0.00398
scoring_system epss
scoring_elements 0.60662
published_at 2026-04-16T12:55:00Z
10
value 0.00398
scoring_system epss
scoring_elements 0.60668
published_at 2026-04-18T12:55:00Z
11
value 0.00398
scoring_system epss
scoring_elements 0.60654
published_at 2026-04-21T12:55:00Z
12
value 0.00398
scoring_system epss
scoring_elements 0.6064
published_at 2026-04-29T12:55:00Z
13
value 0.00398
scoring_system epss
scoring_elements 0.60651
published_at 2026-04-26T12:55:00Z
14
value 0.00398
scoring_system epss
scoring_elements 0.60644
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9630
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9626
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9627
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9627
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9628
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9629
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9630
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9630
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775866
reference_id 775866
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775866
7
reference_url https://security.gentoo.org/glsa/201603-08
reference_id GLSA-201603-08
reference_type
scores
url https://security.gentoo.org/glsa/201603-08
fixed_packages
0
url pkg:deb/debian/vlc@2.2.0~rc2-2?distro=trixie
purl pkg:deb/debian/vlc@2.2.0~rc2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@2.2.0~rc2-2%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2014-9630
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2d6p-9nvq-m3hc
6
url VCID-2e5y-y87z-ffhy
vulnerability_id VCID-2e5y-y87z-ffhy
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could lead to user-assisted execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3276
reference_id
reference_type
scores
0
value 0.08557
scoring_system epss
scoring_elements 0.92437
published_at 2026-05-07T12:55:00Z
1
value 0.08557
scoring_system epss
scoring_elements 0.92365
published_at 2026-04-01T12:55:00Z
2
value 0.08557
scoring_system epss
scoring_elements 0.92372
published_at 2026-04-02T12:55:00Z
3
value 0.08557
scoring_system epss
scoring_elements 0.92379
published_at 2026-04-04T12:55:00Z
4
value 0.08557
scoring_system epss
scoring_elements 0.92383
published_at 2026-04-07T12:55:00Z
5
value 0.08557
scoring_system epss
scoring_elements 0.92395
published_at 2026-04-08T12:55:00Z
6
value 0.08557
scoring_system epss
scoring_elements 0.92399
published_at 2026-04-09T12:55:00Z
7
value 0.08557
scoring_system epss
scoring_elements 0.92405
published_at 2026-04-11T12:55:00Z
8
value 0.08557
scoring_system epss
scoring_elements 0.92407
published_at 2026-04-12T12:55:00Z
9
value 0.08557
scoring_system epss
scoring_elements 0.92406
published_at 2026-04-13T12:55:00Z
10
value 0.08557
scoring_system epss
scoring_elements 0.92417
published_at 2026-04-29T12:55:00Z
11
value 0.08557
scoring_system epss
scoring_elements 0.92416
published_at 2026-04-18T12:55:00Z
12
value 0.08557
scoring_system epss
scoring_elements 0.92418
published_at 2026-04-21T12:55:00Z
13
value 0.08557
scoring_system epss
scoring_elements 0.92422
published_at 2026-04-26T12:55:00Z
14
value 0.08557
scoring_system epss
scoring_elements 0.92427
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3276
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3276
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3276
2
reference_url http://secunia.com/advisories/43826
reference_id
reference_type
scores
url http://secunia.com/advisories/43826
3
reference_url http://securityreason.com/securityalert/8162
reference_id
reference_type
scores
url http://securityreason.com/securityalert/8162
4
reference_url http://securitytracker.com/id?1025250
reference_id
reference_type
scores
url http://securitytracker.com/id?1025250
5
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/66260
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/66260
6
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14873
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14873
7
reference_url http://www.coresecurity.com/content/vlc-vulnerabilities-amv-nsv-files
reference_id
reference_type
scores
url http://www.coresecurity.com/content/vlc-vulnerabilities-amv-nsv-files
8
reference_url http://www.debian.org/security/2011/dsa-2211
reference_id
reference_type
scores
url http://www.debian.org/security/2011/dsa-2211
9
reference_url http://www.osvdb.org/71278
reference_id
reference_type
scores
url http://www.osvdb.org/71278
10
reference_url http://www.securityfocus.com/archive/1/517150/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/517150/100/0/threaded
11
reference_url http://www.securityfocus.com/bid/47012
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/47012
12
reference_url http://www.videolan.org/vlc/releases/1.1.8.html
reference_id
reference_type
scores
url http://www.videolan.org/vlc/releases/1.1.8.html
13
reference_url http://www.vupen.com/english/advisories/2011/0759
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0759
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99b:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99e:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99f:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99f:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99f:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99g:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99g:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99g:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99h:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99h:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99h:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99i:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99i:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99i:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.60:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.60:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.60:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.61:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.61:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.61:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.62:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.62:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.62:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.63:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.63:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.63:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.70:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.70:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.70:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.71:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.71:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.71:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.72:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.72:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.72:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.73:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.73:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.73:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.80:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.80:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.80:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.81:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.81:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.81:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.82:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.82:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.82:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.83:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.83:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.83:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.90:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.90:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.90:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.91:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.92:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.3.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.3.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.4:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.5:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.6:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.3:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.4:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.5:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.6:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.6.1:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3276
reference_id CVE-2010-3276
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-3276
85
reference_url https://security.gentoo.org/glsa/201411-01
reference_id GLSA-201411-01
reference_type
scores
url https://security.gentoo.org/glsa/201411-01
fixed_packages
0
url pkg:deb/debian/vlc@1.1.8-1?distro=trixie
purl pkg:deb/debian/vlc@1.1.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@1.1.8-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2010-3276
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2e5y-y87z-ffhy
7
url VCID-2m5x-h1bj-xqbt
vulnerability_id VCID-2m5x-h1bj-xqbt
summary Stack-based buffer overflow in the parse_master function in the Ty demux plugin (modules/demux/ty.c) in VLC Media Player 0.9.0 through 0.9.4 allows remote attackers to execute arbitrary code via a TiVo TY media file with a header containing a crafted size value.
references
0
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=502726
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=502726
1
reference_url http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=fde9e1cc1fe1ec9635169fa071e42b3aa6436033
reference_id
reference_type
scores
url http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=fde9e1cc1fe1ec9635169fa071e42b3aa6436033
2
reference_url http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=26d92b87bba99b5ea2e17b7eaa39c462d65e9133
reference_id
reference_type
scores
url http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=26d92b87bba99b5ea2e17b7eaa39c462d65e9133
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4654
reference_id
reference_type
scores
0
value 0.82125
scoring_system epss
scoring_elements 0.99222
published_at 2026-05-07T12:55:00Z
1
value 0.82125
scoring_system epss
scoring_elements 0.99203
published_at 2026-04-01T12:55:00Z
2
value 0.82125
scoring_system epss
scoring_elements 0.99205
published_at 2026-04-02T12:55:00Z
3
value 0.82125
scoring_system epss
scoring_elements 0.99209
published_at 2026-04-04T12:55:00Z
4
value 0.82125
scoring_system epss
scoring_elements 0.99212
published_at 2026-04-07T12:55:00Z
5
value 0.82125
scoring_system epss
scoring_elements 0.99213
published_at 2026-04-16T12:55:00Z
6
value 0.82125
scoring_system epss
scoring_elements 0.99214
published_at 2026-04-12T12:55:00Z
7
value 0.82125
scoring_system epss
scoring_elements 0.99215
published_at 2026-04-21T12:55:00Z
8
value 0.82125
scoring_system epss
scoring_elements 0.99217
published_at 2026-04-24T12:55:00Z
9
value 0.82125
scoring_system epss
scoring_elements 0.99218
published_at 2026-04-26T12:55:00Z
10
value 0.82125
scoring_system epss
scoring_elements 0.99219
published_at 2026-04-29T12:55:00Z
11
value 0.82125
scoring_system epss
scoring_elements 0.99221
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4654
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4654
5
reference_url http://secunia.com/advisories/32339
reference_id
reference_type
scores
url http://secunia.com/advisories/32339
6
reference_url http://securityreason.com/securityalert/4460
reference_id
reference_type
scores
url http://securityreason.com/securityalert/4460
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/45960
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/45960
8
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14803
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14803
9
reference_url http://www.openwall.com/lists/oss-security/2008/10/19/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/10/19/2
10
reference_url http://www.securityfocus.com/archive/1/497587/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/497587/100/0/threaded
11
reference_url http://www.securityfocus.com/bid/31813
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/31813
12
reference_url http://www.trapkit.de/advisories/TKADV2008-010.txt
reference_id
reference_type
scores
url http://www.trapkit.de/advisories/TKADV2008-010.txt
13
reference_url http://www.videolan.org/security/sa0809.html
reference_id
reference_type
scores
url http://www.videolan.org/security/sa0809.html
14
reference_url http://www.vupen.com/english/advisories/2008/2856
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2856
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=502726
reference_id 502726
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=502726
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4654
reference_id CVE-2008-4654
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-4654
22
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/16629.rb
reference_id CVE-2008-4654;OSVDB-49181
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/16629.rb
23
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/6798.pl
reference_id OSVDB-49453;CVE-2008-4686;OSVDB-49181;CVE-2008-4654
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/6798.pl
24
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/6825.pl
reference_id OSVDB-49453;CVE-2008-4686;OSVDB-49181;CVE-2008-4654
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/6825.pl
fixed_packages
0
url pkg:deb/debian/vlc@1.0.3-1?distro=trixie
purl pkg:deb/debian/vlc@1.0.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@1.0.3-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2008-4654
risk_score 10.0
exploitability 2.0
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2m5x-h1bj-xqbt
8
url VCID-2mg7-zemp-n3c8
vulnerability_id VCID-2mg7-zemp-n3c8
summary
Multiple vulnerabilities were found in VLC, allowing for the execution of
    arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1489
reference_id
reference_type
scores
0
value 0.33213
scoring_system epss
scoring_elements 0.96875
published_at 2026-04-01T12:55:00Z
1
value 0.33213
scoring_system epss
scoring_elements 0.96882
published_at 2026-04-02T12:55:00Z
2
value 0.33213
scoring_system epss
scoring_elements 0.96887
published_at 2026-04-04T12:55:00Z
3
value 0.33213
scoring_system epss
scoring_elements 0.96892
published_at 2026-04-07T12:55:00Z
4
value 0.33213
scoring_system epss
scoring_elements 0.969
published_at 2026-04-08T12:55:00Z
5
value 0.33213
scoring_system epss
scoring_elements 0.96901
published_at 2026-04-09T12:55:00Z
6
value 0.33213
scoring_system epss
scoring_elements 0.96904
published_at 2026-04-11T12:55:00Z
7
value 0.33213
scoring_system epss
scoring_elements 0.96906
published_at 2026-04-12T12:55:00Z
8
value 0.33213
scoring_system epss
scoring_elements 0.96907
published_at 2026-04-13T12:55:00Z
9
value 0.33213
scoring_system epss
scoring_elements 0.96914
published_at 2026-04-16T12:55:00Z
10
value 0.33213
scoring_system epss
scoring_elements 0.96918
published_at 2026-04-18T12:55:00Z
11
value 0.33213
scoring_system epss
scoring_elements 0.9692
published_at 2026-04-21T12:55:00Z
12
value 0.33213
scoring_system epss
scoring_elements 0.96921
published_at 2026-04-24T12:55:00Z
13
value 0.33213
scoring_system epss
scoring_elements 0.96922
published_at 2026-04-26T12:55:00Z
14
value 0.33213
scoring_system epss
scoring_elements 0.96926
published_at 2026-04-29T12:55:00Z
15
value 0.33213
scoring_system epss
scoring_elements 0.9693
published_at 2026-05-05T12:55:00Z
16
value 0.33213
scoring_system epss
scoring_elements 0.96934
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1489
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1489
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=472635
reference_id 472635
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=472635
3
reference_url https://security.gentoo.org/glsa/200804-25
reference_id GLSA-200804-25
reference_type
scores
url https://security.gentoo.org/glsa/200804-25
fixed_packages
0
url pkg:deb/debian/vlc@0.8.6.e-1.1?distro=trixie
purl pkg:deb/debian/vlc@0.8.6.e-1.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0.8.6.e-1.1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2008-1489
risk_score 0.6
exploitability 2.0
weighted_severity 0.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2mg7-zemp-n3c8
9
url VCID-2mw7-98e2-93bv
vulnerability_id VCID-2mw7-98e2-93bv
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    may allow remote attackers to execute arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-8312
reference_id
reference_type
scores
0
value 0.00338
scoring_system epss
scoring_elements 0.56561
published_at 2026-05-07T12:55:00Z
1
value 0.00338
scoring_system epss
scoring_elements 0.56505
published_at 2026-04-01T12:55:00Z
2
value 0.00338
scoring_system epss
scoring_elements 0.56602
published_at 2026-04-07T12:55:00Z
3
value 0.00338
scoring_system epss
scoring_elements 0.56623
published_at 2026-04-04T12:55:00Z
4
value 0.00338
scoring_system epss
scoring_elements 0.56653
published_at 2026-04-08T12:55:00Z
5
value 0.00338
scoring_system epss
scoring_elements 0.56658
published_at 2026-04-09T12:55:00Z
6
value 0.00338
scoring_system epss
scoring_elements 0.56667
published_at 2026-04-11T12:55:00Z
7
value 0.00338
scoring_system epss
scoring_elements 0.56642
published_at 2026-04-12T12:55:00Z
8
value 0.00338
scoring_system epss
scoring_elements 0.56621
published_at 2026-04-13T12:55:00Z
9
value 0.00338
scoring_system epss
scoring_elements 0.56652
published_at 2026-04-16T12:55:00Z
10
value 0.00338
scoring_system epss
scoring_elements 0.56651
published_at 2026-04-18T12:55:00Z
11
value 0.00338
scoring_system epss
scoring_elements 0.56624
published_at 2026-04-21T12:55:00Z
12
value 0.00338
scoring_system epss
scoring_elements 0.5656
published_at 2026-04-29T12:55:00Z
13
value 0.00338
scoring_system epss
scoring_elements 0.56578
published_at 2026-04-26T12:55:00Z
14
value 0.00338
scoring_system epss
scoring_elements 0.56512
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-8312
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8310
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8311
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8312
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8313
5
reference_url https://security.archlinux.org/ASA-201706-1
reference_id ASA-201706-1
reference_type
scores
url https://security.archlinux.org/ASA-201706-1
6
reference_url https://security.archlinux.org/AVG-283
reference_id AVG-283
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-283
7
reference_url https://security.gentoo.org/glsa/201707-10
reference_id GLSA-201707-10
reference_type
scores
url https://security.gentoo.org/glsa/201707-10
fixed_packages
0
url pkg:deb/debian/vlc@2.2.6-1~deb9u1?distro=trixie
purl pkg:deb/debian/vlc@2.2.6-1~deb9u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@2.2.6-1~deb9u1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2017-8312
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2mw7-98e2-93bv
10
url VCID-2n9d-6mcy-6fhb
vulnerability_id VCID-2n9d-6mcy-6fhb
summary
Multiple vulnerabilities have been found in libmicrodns, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6079
reference_id
reference_type
scores
0
value 0.00311
scoring_system epss
scoring_elements 0.54238
published_at 2026-05-07T12:55:00Z
1
value 0.00311
scoring_system epss
scoring_elements 0.54245
published_at 2026-04-29T12:55:00Z
2
value 0.00311
scoring_system epss
scoring_elements 0.54195
published_at 2026-05-05T12:55:00Z
3
value 0.00311
scoring_system epss
scoring_elements 0.54184
published_at 2026-04-01T12:55:00Z
4
value 0.00311
scoring_system epss
scoring_elements 0.54204
published_at 2026-04-02T12:55:00Z
5
value 0.00311
scoring_system epss
scoring_elements 0.54234
published_at 2026-04-04T12:55:00Z
6
value 0.00311
scoring_system epss
scoring_elements 0.5421
published_at 2026-04-07T12:55:00Z
7
value 0.00311
scoring_system epss
scoring_elements 0.54262
published_at 2026-04-08T12:55:00Z
8
value 0.00311
scoring_system epss
scoring_elements 0.54257
published_at 2026-04-09T12:55:00Z
9
value 0.00311
scoring_system epss
scoring_elements 0.54306
published_at 2026-04-16T12:55:00Z
10
value 0.00311
scoring_system epss
scoring_elements 0.54289
published_at 2026-04-12T12:55:00Z
11
value 0.00311
scoring_system epss
scoring_elements 0.54268
published_at 2026-04-13T12:55:00Z
12
value 0.00311
scoring_system epss
scoring_elements 0.54311
published_at 2026-04-18T12:55:00Z
13
value 0.00311
scoring_system epss
scoring_elements 0.54291
published_at 2026-04-21T12:55:00Z
14
value 0.00311
scoring_system epss
scoring_elements 0.54254
published_at 2026-04-24T12:55:00Z
15
value 0.00311
scoring_system epss
scoring_elements 0.54269
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6079
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19721
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6071
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6071
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6072
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6072
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6073
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6077
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6078
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6079
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6080
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6080
9
reference_url https://talosintelligence.com/vulnerability_reports/TALOS-2020-1002
reference_id
reference_type
scores
url https://talosintelligence.com/vulnerability_reports/TALOS-2020-1002
10
reference_url https://www.debian.org/security/2020/dsa-4671
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4671
11
reference_url https://security.archlinux.org/ASA-202004-24
reference_id ASA-202004-24
reference_type
scores
url https://security.archlinux.org/ASA-202004-24
12
reference_url https://security.archlinux.org/AVG-1136
reference_id AVG-1136
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1136
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolabs:libmicrodns:0.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolabs:libmicrodns:0.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolabs:libmicrodns:0.1.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-6079
reference_id CVE-2020-6079
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-6079
17
reference_url https://security.gentoo.org/glsa/202005-10
reference_id GLSA-202005-10
reference_type
scores
url https://security.gentoo.org/glsa/202005-10
18
reference_url https://usn.ubuntu.com/7239-1/
reference_id USN-7239-1
reference_type
scores
url https://usn.ubuntu.com/7239-1/
fixed_packages
0
url pkg:deb/debian/vlc@3.0.8-4?distro=trixie
purl pkg:deb/debian/vlc@3.0.8-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.8-4%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2020-6079
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2n9d-6mcy-6fhb
11
url VCID-462c-amc9-4ffr
vulnerability_id VCID-462c-amc9-4ffr
summary
Multiple vulnerabilities were found in VLC, allowing for the execution of
    arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1768
reference_id
reference_type
scores
0
value 0.01879
scoring_system epss
scoring_elements 0.8307
published_at 2026-04-01T12:55:00Z
1
value 0.01879
scoring_system epss
scoring_elements 0.83086
published_at 2026-04-02T12:55:00Z
2
value 0.01879
scoring_system epss
scoring_elements 0.831
published_at 2026-04-04T12:55:00Z
3
value 0.01879
scoring_system epss
scoring_elements 0.83098
published_at 2026-04-07T12:55:00Z
4
value 0.01879
scoring_system epss
scoring_elements 0.83123
published_at 2026-04-08T12:55:00Z
5
value 0.01879
scoring_system epss
scoring_elements 0.8313
published_at 2026-04-09T12:55:00Z
6
value 0.01879
scoring_system epss
scoring_elements 0.83147
published_at 2026-04-11T12:55:00Z
7
value 0.01879
scoring_system epss
scoring_elements 0.83141
published_at 2026-04-12T12:55:00Z
8
value 0.01879
scoring_system epss
scoring_elements 0.83137
published_at 2026-04-13T12:55:00Z
9
value 0.01879
scoring_system epss
scoring_elements 0.83174
published_at 2026-04-18T12:55:00Z
10
value 0.01879
scoring_system epss
scoring_elements 0.83178
published_at 2026-04-21T12:55:00Z
11
value 0.01879
scoring_system epss
scoring_elements 0.832
published_at 2026-04-24T12:55:00Z
12
value 0.01879
scoring_system epss
scoring_elements 0.83208
published_at 2026-04-26T12:55:00Z
13
value 0.01879
scoring_system epss
scoring_elements 0.83215
published_at 2026-04-29T12:55:00Z
14
value 0.01879
scoring_system epss
scoring_elements 0.8324
published_at 2026-05-05T12:55:00Z
15
value 0.01879
scoring_system epss
scoring_elements 0.83262
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1768
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1768
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=478140
reference_id 478140
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=478140
3
reference_url https://security.gentoo.org/glsa/200804-25
reference_id GLSA-200804-25
reference_type
scores
url https://security.gentoo.org/glsa/200804-25
fixed_packages
0
url pkg:deb/debian/vlc@0.8.6.e-2.1?distro=trixie
purl pkg:deb/debian/vlc@0.8.6.e-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0.8.6.e-2.1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2008-1768
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-462c-amc9-4ffr
12
url VCID-4cqm-15gx-p7gr
vulnerability_id VCID-4cqm-15gx-p7gr
summary mmstu.c in VideoLAN VLC media player before 3.0.22 allows an out-of-bounds read and denial of service via a crafted 0x01 response from an MMS server.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-51602
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04156
published_at 2026-05-07T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04129
published_at 2026-04-26T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04164
published_at 2026-04-29T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.04128
published_at 2026-05-05T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.03992
published_at 2026-04-02T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.04009
published_at 2026-04-04T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.04023
published_at 2026-04-07T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.04029
published_at 2026-04-08T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.04047
published_at 2026-04-09T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.0402
published_at 2026-04-11T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.04005
published_at 2026-04-12T12:55:00Z
11
value 0.00017
scoring_system epss
scoring_elements 0.03978
published_at 2026-04-13T12:55:00Z
12
value 0.00017
scoring_system epss
scoring_elements 0.03961
published_at 2026-04-16T12:55:00Z
13
value 0.00017
scoring_system epss
scoring_elements 0.03973
published_at 2026-04-18T12:55:00Z
14
value 0.00017
scoring_system epss
scoring_elements 0.04098
published_at 2026-04-21T12:55:00Z
15
value 0.00017
scoring_system epss
scoring_elements 0.04111
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-51602
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-51602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-51602
2
reference_url https://code.videolan.org/videolan/vlc/-/issues/29146
reference_id 29146
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-20T17:35:28Z/
url https://code.videolan.org/videolan/vlc/-/issues/29146
3
reference_url https://www.videolan.org/security/sb-vlc3022.html
reference_id sb-vlc3022.html
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-20T17:35:28Z/
url https://www.videolan.org/security/sb-vlc3022.html
fixed_packages
0
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb13u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.22-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb11u1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
7
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2025-51602
risk_score 1.2
exploitability 0.5
weighted_severity 2.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4cqm-15gx-p7gr
13
url VCID-52yg-hpt4-9kfy
vulnerability_id VCID-52yg-hpt4-9kfy
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could result in the arbitrary execution of code.
references
0
reference_url http://git.videolan.org/?p=vlc.git&a=search&h=refs/heads/master&st=commit&s=cve-2019
reference_id
reference_type
scores
url http://git.videolan.org/?p=vlc.git&a=search&h=refs/heads/master&st=commit&s=cve-2019
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00036.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00036.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00046.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00046.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-14778
reference_id
reference_type
scores
0
value 0.00307
scoring_system epss
scoring_elements 0.53927
published_at 2026-05-07T12:55:00Z
1
value 0.00307
scoring_system epss
scoring_elements 0.53884
published_at 2026-05-05T12:55:00Z
2
value 0.00307
scoring_system epss
scoring_elements 0.53879
published_at 2026-04-01T12:55:00Z
3
value 0.00307
scoring_system epss
scoring_elements 0.53897
published_at 2026-04-02T12:55:00Z
4
value 0.00307
scoring_system epss
scoring_elements 0.53925
published_at 2026-04-04T12:55:00Z
5
value 0.00307
scoring_system epss
scoring_elements 0.539
published_at 2026-04-07T12:55:00Z
6
value 0.00307
scoring_system epss
scoring_elements 0.53952
published_at 2026-04-08T12:55:00Z
7
value 0.00307
scoring_system epss
scoring_elements 0.53951
published_at 2026-04-09T12:55:00Z
8
value 0.00307
scoring_system epss
scoring_elements 0.53998
published_at 2026-04-11T12:55:00Z
9
value 0.00307
scoring_system epss
scoring_elements 0.53981
published_at 2026-04-12T12:55:00Z
10
value 0.00307
scoring_system epss
scoring_elements 0.53963
published_at 2026-04-13T12:55:00Z
11
value 0.00307
scoring_system epss
scoring_elements 0.54001
published_at 2026-04-16T12:55:00Z
12
value 0.00307
scoring_system epss
scoring_elements 0.54006
published_at 2026-04-18T12:55:00Z
13
value 0.00307
scoring_system epss
scoring_elements 0.53987
published_at 2026-04-21T12:55:00Z
14
value 0.00307
scoring_system epss
scoring_elements 0.53954
published_at 2026-04-24T12:55:00Z
15
value 0.00307
scoring_system epss
scoring_elements 0.53966
published_at 2026-04-26T12:55:00Z
16
value 0.00307
scoring_system epss
scoring_elements 0.53936
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-14778
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13602
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13962
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14437
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14438
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14438
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14498
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14533
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14534
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14534
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14535
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14535
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14776
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14777
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14778
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14970
16
reference_url https://seclists.org/bugtraq/2019/Aug/36
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Aug/36
17
reference_url https://www.debian.org/security/2019/dsa-4504
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4504
18
reference_url https://www.videolan.org/security/sb-vlc308.html
reference_id
reference_type
scores
url https://www.videolan.org/security/sb-vlc308.html
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:3.0.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:3.0.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:3.0.7.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-14778
reference_id CVE-2019-14778
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-14778
23
reference_url https://security.gentoo.org/glsa/201909-02
reference_id GLSA-201909-02
reference_type
scores
url https://security.gentoo.org/glsa/201909-02
24
reference_url https://usn.ubuntu.com/4131-1/
reference_id USN-4131-1
reference_type
scores
url https://usn.ubuntu.com/4131-1/
fixed_packages
0
url pkg:deb/debian/vlc@3.0.8-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.8-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2019-14778
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-52yg-hpt4-9kfy
14
url VCID-5d5e-5emh-fqh4
vulnerability_id VCID-5d5e-5emh-fqh4
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9629
reference_id
reference_type
scores
0
value 0.01498
scoring_system epss
scoring_elements 0.81062
published_at 2026-04-01T12:55:00Z
1
value 0.01498
scoring_system epss
scoring_elements 0.81071
published_at 2026-04-02T12:55:00Z
2
value 0.01498
scoring_system epss
scoring_elements 0.81096
published_at 2026-04-07T12:55:00Z
3
value 0.01498
scoring_system epss
scoring_elements 0.81123
published_at 2026-04-08T12:55:00Z
4
value 0.01498
scoring_system epss
scoring_elements 0.8113
published_at 2026-04-09T12:55:00Z
5
value 0.01498
scoring_system epss
scoring_elements 0.81147
published_at 2026-04-11T12:55:00Z
6
value 0.01498
scoring_system epss
scoring_elements 0.81134
published_at 2026-04-12T12:55:00Z
7
value 0.01498
scoring_system epss
scoring_elements 0.81127
published_at 2026-04-13T12:55:00Z
8
value 0.01498
scoring_system epss
scoring_elements 0.81164
published_at 2026-04-16T12:55:00Z
9
value 0.01498
scoring_system epss
scoring_elements 0.81166
published_at 2026-04-18T12:55:00Z
10
value 0.01498
scoring_system epss
scoring_elements 0.81163
published_at 2026-04-21T12:55:00Z
11
value 0.01498
scoring_system epss
scoring_elements 0.81186
published_at 2026-04-24T12:55:00Z
12
value 0.01498
scoring_system epss
scoring_elements 0.81194
published_at 2026-04-26T12:55:00Z
13
value 0.01498
scoring_system epss
scoring_elements 0.81199
published_at 2026-04-29T12:55:00Z
14
value 0.01498
scoring_system epss
scoring_elements 0.81214
published_at 2026-05-05T12:55:00Z
15
value 0.01498
scoring_system epss
scoring_elements 0.81234
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9629
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9626
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9627
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9627
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9628
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9629
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9630
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9630
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775866
reference_id 775866
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775866
7
reference_url https://security.gentoo.org/glsa/201603-08
reference_id GLSA-201603-08
reference_type
scores
url https://security.gentoo.org/glsa/201603-08
fixed_packages
0
url pkg:deb/debian/vlc@2.2.0~rc2-2?distro=trixie
purl pkg:deb/debian/vlc@2.2.0~rc2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@2.2.0~rc2-2%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2014-9629
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5d5e-5emh-fqh4
15
url VCID-5k4p-gat4-afhp
vulnerability_id VCID-5k4p-gat4-afhp
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10699
reference_id
reference_type
scores
0
value 0.00675
scoring_system epss
scoring_elements 0.71572
published_at 2026-05-07T12:55:00Z
1
value 0.00675
scoring_system epss
scoring_elements 0.71415
published_at 2026-04-01T12:55:00Z
2
value 0.00675
scoring_system epss
scoring_elements 0.71423
published_at 2026-04-02T12:55:00Z
3
value 0.00675
scoring_system epss
scoring_elements 0.7144
published_at 2026-04-04T12:55:00Z
4
value 0.00675
scoring_system epss
scoring_elements 0.71416
published_at 2026-04-07T12:55:00Z
5
value 0.00675
scoring_system epss
scoring_elements 0.71457
published_at 2026-04-13T12:55:00Z
6
value 0.00675
scoring_system epss
scoring_elements 0.71469
published_at 2026-04-09T12:55:00Z
7
value 0.00675
scoring_system epss
scoring_elements 0.71491
published_at 2026-04-11T12:55:00Z
8
value 0.00675
scoring_system epss
scoring_elements 0.71476
published_at 2026-04-12T12:55:00Z
9
value 0.00675
scoring_system epss
scoring_elements 0.71503
published_at 2026-04-16T12:55:00Z
10
value 0.00675
scoring_system epss
scoring_elements 0.71508
published_at 2026-04-18T12:55:00Z
11
value 0.00675
scoring_system epss
scoring_elements 0.71488
published_at 2026-04-21T12:55:00Z
12
value 0.00675
scoring_system epss
scoring_elements 0.71538
published_at 2026-04-24T12:55:00Z
13
value 0.00675
scoring_system epss
scoring_elements 0.71545
published_at 2026-04-26T12:55:00Z
14
value 0.00675
scoring_system epss
scoring_elements 0.71549
published_at 2026-04-29T12:55:00Z
15
value 0.00675
scoring_system epss
scoring_elements 0.71537
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10699
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10699
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10699
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9300
3
reference_url https://security.archlinux.org/ASA-201712-4
reference_id ASA-201712-4
reference_type
scores
url https://security.archlinux.org/ASA-201712-4
4
reference_url https://security.archlinux.org/AVG-533
reference_id AVG-533
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-533
5
reference_url https://usn.ubuntu.com/USN-4805-1/
reference_id USN-USN-4805-1
reference_type
scores
url https://usn.ubuntu.com/USN-4805-1/
fixed_packages
0
url pkg:deb/debian/vlc@2.2.6-3?distro=trixie
purl pkg:deb/debian/vlc@2.2.6-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@2.2.6-3%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2017-10699
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5k4p-gat4-afhp
16
url VCID-5pkk-pxmh-93hy
vulnerability_id VCID-5pkk-pxmh-93hy
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    may allow remote attackers to execute arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-8313
reference_id
reference_type
scores
0
value 0.00338
scoring_system epss
scoring_elements 0.56527
published_at 2026-04-01T12:55:00Z
1
value 0.00338
scoring_system epss
scoring_elements 0.56624
published_at 2026-04-07T12:55:00Z
2
value 0.00338
scoring_system epss
scoring_elements 0.56645
published_at 2026-04-21T12:55:00Z
3
value 0.00338
scoring_system epss
scoring_elements 0.56675
published_at 2026-04-08T12:55:00Z
4
value 0.00338
scoring_system epss
scoring_elements 0.5668
published_at 2026-04-09T12:55:00Z
5
value 0.00338
scoring_system epss
scoring_elements 0.56689
published_at 2026-04-11T12:55:00Z
6
value 0.00338
scoring_system epss
scoring_elements 0.56664
published_at 2026-04-12T12:55:00Z
7
value 0.00338
scoring_system epss
scoring_elements 0.56643
published_at 2026-04-13T12:55:00Z
8
value 0.00338
scoring_system epss
scoring_elements 0.56674
published_at 2026-04-16T12:55:00Z
9
value 0.00338
scoring_system epss
scoring_elements 0.56673
published_at 2026-04-18T12:55:00Z
10
value 0.00338
scoring_system epss
scoring_elements 0.56582
published_at 2026-04-24T12:55:00Z
11
value 0.00338
scoring_system epss
scoring_elements 0.566
published_at 2026-04-26T12:55:00Z
12
value 0.00338
scoring_system epss
scoring_elements 0.56583
published_at 2026-04-29T12:55:00Z
13
value 0.00338
scoring_system epss
scoring_elements 0.56538
published_at 2026-05-05T12:55:00Z
14
value 0.00338
scoring_system epss
scoring_elements 0.56584
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-8313
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8310
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8311
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8312
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8313
5
reference_url https://security.gentoo.org/glsa/201707-10
reference_id GLSA-201707-10
reference_type
scores
url https://security.gentoo.org/glsa/201707-10
fixed_packages
0
url pkg:deb/debian/vlc@2.2.5-1?distro=trixie
purl pkg:deb/debian/vlc@2.2.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@2.2.5-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2017-8313
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5pkk-pxmh-93hy
17
url VCID-5r74-sdt8-sff8
vulnerability_id VCID-5r74-sdt8-sff8
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could lead to user-assisted execution of arbitrary code.
references
0
reference_url http://git.videolan.org/?p=vlc/vlc-1.1.git%3Ba=commit%3Bh=8902488ba529c0cf4c903a8a84ff20b5737cc753
reference_id
reference_type
scores
url http://git.videolan.org/?p=vlc/vlc-1.1.git%3Ba=commit%3Bh=8902488ba529c0cf4c903a8a84ff20b5737cc753
1
reference_url http://openwall.com/lists/oss-security/2010/04/28/4
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/04/28/4
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1443
reference_id
reference_type
scores
0
value 0.00535
scoring_system epss
scoring_elements 0.67512
published_at 2026-05-07T12:55:00Z
1
value 0.00535
scoring_system epss
scoring_elements 0.67359
published_at 2026-04-01T12:55:00Z
2
value 0.00535
scoring_system epss
scoring_elements 0.67395
published_at 2026-04-07T12:55:00Z
3
value 0.00535
scoring_system epss
scoring_elements 0.67416
published_at 2026-04-04T12:55:00Z
4
value 0.00535
scoring_system epss
scoring_elements 0.67447
published_at 2026-04-08T12:55:00Z
5
value 0.00535
scoring_system epss
scoring_elements 0.67461
published_at 2026-04-09T12:55:00Z
6
value 0.00535
scoring_system epss
scoring_elements 0.67483
published_at 2026-04-11T12:55:00Z
7
value 0.00535
scoring_system epss
scoring_elements 0.6747
published_at 2026-04-12T12:55:00Z
8
value 0.00535
scoring_system epss
scoring_elements 0.67437
published_at 2026-04-13T12:55:00Z
9
value 0.00535
scoring_system epss
scoring_elements 0.67473
published_at 2026-04-16T12:55:00Z
10
value 0.00535
scoring_system epss
scoring_elements 0.67485
published_at 2026-04-18T12:55:00Z
11
value 0.00535
scoring_system epss
scoring_elements 0.67465
published_at 2026-04-21T12:55:00Z
12
value 0.00535
scoring_system epss
scoring_elements 0.67482
published_at 2026-04-24T12:55:00Z
13
value 0.00535
scoring_system epss
scoring_elements 0.67493
published_at 2026-04-26T12:55:00Z
14
value 0.00535
scoring_system epss
scoring_elements 0.67494
published_at 2026-04-29T12:55:00Z
15
value 0.00535
scoring_system epss
scoring_elements 0.67468
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1443
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1443
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1443
4
reference_url http://www.videolan.org/security/sa1003.html
reference_id
reference_type
scores
url http://www.videolan.org/security/sa1003.html
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1337:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.1337:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1337:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-1443
reference_id CVE-2010-1443
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-1443
50
reference_url https://security.gentoo.org/glsa/201411-01
reference_id GLSA-201411-01
reference_type
scores
url https://security.gentoo.org/glsa/201411-01
fixed_packages
0
url pkg:deb/debian/vlc@1.0.6-1?distro=trixie
purl pkg:deb/debian/vlc@1.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@1.0.6-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2010-1443
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5r74-sdt8-sff8
18
url VCID-5vkn-89xw-hyba
vulnerability_id VCID-5vkn-89xw-hyba
summary
Multiple vulnerabilities have been found in libmicrodns, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6071
reference_id
reference_type
scores
0
value 0.00314
scoring_system epss
scoring_elements 0.54494
published_at 2026-05-07T12:55:00Z
1
value 0.00314
scoring_system epss
scoring_elements 0.54502
published_at 2026-04-29T12:55:00Z
2
value 0.00314
scoring_system epss
scoring_elements 0.54452
published_at 2026-05-05T12:55:00Z
3
value 0.00314
scoring_system epss
scoring_elements 0.54442
published_at 2026-04-01T12:55:00Z
4
value 0.00314
scoring_system epss
scoring_elements 0.54517
published_at 2026-04-02T12:55:00Z
5
value 0.00314
scoring_system epss
scoring_elements 0.5454
published_at 2026-04-04T12:55:00Z
6
value 0.00314
scoring_system epss
scoring_elements 0.54509
published_at 2026-04-07T12:55:00Z
7
value 0.00314
scoring_system epss
scoring_elements 0.54561
published_at 2026-04-08T12:55:00Z
8
value 0.00314
scoring_system epss
scoring_elements 0.54555
published_at 2026-04-09T12:55:00Z
9
value 0.00314
scoring_system epss
scoring_elements 0.54567
published_at 2026-04-18T12:55:00Z
10
value 0.00314
scoring_system epss
scoring_elements 0.54549
published_at 2026-04-12T12:55:00Z
11
value 0.00314
scoring_system epss
scoring_elements 0.54528
published_at 2026-04-13T12:55:00Z
12
value 0.00314
scoring_system epss
scoring_elements 0.54565
published_at 2026-04-16T12:55:00Z
13
value 0.00314
scoring_system epss
scoring_elements 0.54544
published_at 2026-04-21T12:55:00Z
14
value 0.00314
scoring_system epss
scoring_elements 0.54507
published_at 2026-04-24T12:55:00Z
15
value 0.00314
scoring_system epss
scoring_elements 0.54523
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6071
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19721
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6071
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6071
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6072
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6072
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6073
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6077
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6078
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6079
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6080
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6080
9
reference_url https://talosintelligence.com/vulnerability_reports/TALOS-2020-0994
reference_id
reference_type
scores
url https://talosintelligence.com/vulnerability_reports/TALOS-2020-0994
10
reference_url https://www.debian.org/security/2020/dsa-4671
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4671
11
reference_url https://security.archlinux.org/ASA-202004-24
reference_id ASA-202004-24
reference_type
scores
url https://security.archlinux.org/ASA-202004-24
12
reference_url https://security.archlinux.org/AVG-1136
reference_id AVG-1136
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1136
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolabs:libmicrodns:0.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolabs:libmicrodns:0.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolabs:libmicrodns:0.1.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-6071
reference_id CVE-2020-6071
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-6071
16
reference_url https://security.gentoo.org/glsa/202005-10
reference_id GLSA-202005-10
reference_type
scores
url https://security.gentoo.org/glsa/202005-10
17
reference_url https://usn.ubuntu.com/7239-1/
reference_id USN-7239-1
reference_type
scores
url https://usn.ubuntu.com/7239-1/
fixed_packages
0
url pkg:deb/debian/vlc@3.0.8-4?distro=trixie
purl pkg:deb/debian/vlc@3.0.8-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.8-4%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2020-6071
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5vkn-89xw-hyba
19
url VCID-63e8-v5s5-27ew
vulnerability_id VCID-63e8-v5s5-27ew
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9628
reference_id
reference_type
scores
0
value 0.01634
scoring_system epss
scoring_elements 0.81844
published_at 2026-04-01T12:55:00Z
1
value 0.01634
scoring_system epss
scoring_elements 0.81855
published_at 2026-04-02T12:55:00Z
2
value 0.01634
scoring_system epss
scoring_elements 0.81878
published_at 2026-04-04T12:55:00Z
3
value 0.01634
scoring_system epss
scoring_elements 0.81874
published_at 2026-04-07T12:55:00Z
4
value 0.01634
scoring_system epss
scoring_elements 0.81901
published_at 2026-04-08T12:55:00Z
5
value 0.01634
scoring_system epss
scoring_elements 0.81907
published_at 2026-04-09T12:55:00Z
6
value 0.01634
scoring_system epss
scoring_elements 0.81927
published_at 2026-04-11T12:55:00Z
7
value 0.01634
scoring_system epss
scoring_elements 0.81915
published_at 2026-04-12T12:55:00Z
8
value 0.01634
scoring_system epss
scoring_elements 0.8191
published_at 2026-04-13T12:55:00Z
9
value 0.01634
scoring_system epss
scoring_elements 0.81946
published_at 2026-04-18T12:55:00Z
10
value 0.01634
scoring_system epss
scoring_elements 0.81948
published_at 2026-04-21T12:55:00Z
11
value 0.01634
scoring_system epss
scoring_elements 0.8197
published_at 2026-04-24T12:55:00Z
12
value 0.01634
scoring_system epss
scoring_elements 0.81981
published_at 2026-04-26T12:55:00Z
13
value 0.01634
scoring_system epss
scoring_elements 0.81987
published_at 2026-04-29T12:55:00Z
14
value 0.01634
scoring_system epss
scoring_elements 0.82007
published_at 2026-05-05T12:55:00Z
15
value 0.01634
scoring_system epss
scoring_elements 0.82027
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9628
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9626
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9627
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9627
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9628
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9629
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9630
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9630
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775866
reference_id 775866
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775866
7
reference_url https://security.gentoo.org/glsa/201603-08
reference_id GLSA-201603-08
reference_type
scores
url https://security.gentoo.org/glsa/201603-08
fixed_packages
0
url pkg:deb/debian/vlc@2.2.0~rc2-2?distro=trixie
purl pkg:deb/debian/vlc@2.2.0~rc2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@2.2.0~rc2-2%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2014-9628
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-63e8-v5s5-27ew
20
url VCID-6a89-jzyb-vygd
vulnerability_id VCID-6a89-jzyb-vygd
summary
Multiple vulnerabilities have been found in VLC allowing remote
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url http://billblough.net/blog/2015/03/04/cve-2014-6440-heap-overflow-in-vlc-transcode-module/
reference_id
reference_type
scores
url http://billblough.net/blog/2015/03/04/cve-2014-6440-heap-overflow-in-vlc-transcode-module/
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-6440
reference_id
reference_type
scores
0
value 0.05344
scoring_system epss
scoring_elements 0.90123
published_at 2026-05-07T12:55:00Z
1
value 0.05344
scoring_system epss
scoring_elements 0.90108
published_at 2026-05-05T12:55:00Z
2
value 0.05344
scoring_system epss
scoring_elements 0.90026
published_at 2026-04-01T12:55:00Z
3
value 0.05344
scoring_system epss
scoring_elements 0.90029
published_at 2026-04-02T12:55:00Z
4
value 0.05344
scoring_system epss
scoring_elements 0.9004
published_at 2026-04-04T12:55:00Z
5
value 0.05344
scoring_system epss
scoring_elements 0.90045
published_at 2026-04-07T12:55:00Z
6
value 0.05344
scoring_system epss
scoring_elements 0.9006
published_at 2026-04-08T12:55:00Z
7
value 0.05344
scoring_system epss
scoring_elements 0.90066
published_at 2026-04-09T12:55:00Z
8
value 0.05344
scoring_system epss
scoring_elements 0.90075
published_at 2026-04-11T12:55:00Z
9
value 0.05344
scoring_system epss
scoring_elements 0.90073
published_at 2026-04-12T12:55:00Z
10
value 0.05344
scoring_system epss
scoring_elements 0.90067
published_at 2026-04-13T12:55:00Z
11
value 0.05344
scoring_system epss
scoring_elements 0.90084
published_at 2026-04-18T12:55:00Z
12
value 0.05344
scoring_system epss
scoring_elements 0.90082
published_at 2026-04-21T12:55:00Z
13
value 0.05344
scoring_system epss
scoring_elements 0.901
published_at 2026-04-26T12:55:00Z
14
value 0.05344
scoring_system epss
scoring_elements 0.90097
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-6440
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6440
3
reference_url http://seclists.org/oss-sec/2015/q1/751
reference_id
reference_type
scores
url http://seclists.org/oss-sec/2015/q1/751
4
reference_url http://www.securityfocus.com/bid/72950
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/72950
5
reference_url http://www.videolan.org/developers/vlc-branch/NEWS
reference_id
reference_type
scores
url http://www.videolan.org/developers/vlc-branch/NEWS
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc:*:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-6440
reference_id CVE-2014-6440
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2014-6440
8
reference_url https://security.gentoo.org/glsa/201603-08
reference_id GLSA-201603-08
reference_type
scores
url https://security.gentoo.org/glsa/201603-08
fixed_packages
0
url pkg:deb/debian/vlc@2.1.5-1?distro=trixie
purl pkg:deb/debian/vlc@2.1.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@2.1.5-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2014-6440
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6a89-jzyb-vygd
21
url VCID-6ksu-smfm-8kaf
vulnerability_id VCID-6ksu-smfm-8kaf
summary
Multiple vulnerabilities in VLC may allow for the execution of arbitrary
    code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-2147
reference_id
reference_type
scores
0
value 0.00079
scoring_system epss
scoring_elements 0.23286
published_at 2026-04-01T12:55:00Z
1
value 0.00079
scoring_system epss
scoring_elements 0.2346
published_at 2026-04-02T12:55:00Z
2
value 0.00079
scoring_system epss
scoring_elements 0.23497
published_at 2026-04-04T12:55:00Z
3
value 0.00079
scoring_system epss
scoring_elements 0.23282
published_at 2026-04-07T12:55:00Z
4
value 0.00079
scoring_system epss
scoring_elements 0.23354
published_at 2026-04-08T12:55:00Z
5
value 0.00079
scoring_system epss
scoring_elements 0.23405
published_at 2026-04-09T12:55:00Z
6
value 0.00079
scoring_system epss
scoring_elements 0.23424
published_at 2026-04-11T12:55:00Z
7
value 0.00079
scoring_system epss
scoring_elements 0.23387
published_at 2026-04-12T12:55:00Z
8
value 0.00079
scoring_system epss
scoring_elements 0.23333
published_at 2026-04-13T12:55:00Z
9
value 0.00079
scoring_system epss
scoring_elements 0.23349
published_at 2026-04-16T12:55:00Z
10
value 0.00079
scoring_system epss
scoring_elements 0.23344
published_at 2026-04-18T12:55:00Z
11
value 0.00079
scoring_system epss
scoring_elements 0.23324
published_at 2026-04-21T12:55:00Z
12
value 0.00079
scoring_system epss
scoring_elements 0.23133
published_at 2026-04-24T12:55:00Z
13
value 0.00079
scoring_system epss
scoring_elements 0.23125
published_at 2026-04-26T12:55:00Z
14
value 0.00079
scoring_system epss
scoring_elements 0.23117
published_at 2026-04-29T12:55:00Z
15
value 0.00079
scoring_system epss
scoring_elements 0.2301
published_at 2026-05-05T12:55:00Z
16
value 0.00079
scoring_system epss
scoring_elements 0.23093
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-2147
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2147
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480724
reference_id 480724
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480724
3
reference_url https://security.gentoo.org/glsa/200807-13
reference_id GLSA-200807-13
reference_type
scores
url https://security.gentoo.org/glsa/200807-13
fixed_packages
0
url pkg:deb/debian/vlc@0.8.6.e-2.2?distro=trixie
purl pkg:deb/debian/vlc@0.8.6.e-2.2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0.8.6.e-2.2%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2008-2147
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6ksu-smfm-8kaf
22
url VCID-74ez-a9dg-7uha
vulnerability_id VCID-74ez-a9dg-7uha
summary Cross-site scripting (XSS) vulnerability in the httpd_HtmlError function in network/httpd.c in the web interface in VideoLAN VLC Media Player before 2.2.0 allows remote attackers to inject arbitrary web script or HTML via the path info.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9743
reference_id
reference_type
scores
0
value 0.00256
scoring_system epss
scoring_elements 0.48889
published_at 2026-05-07T12:55:00Z
1
value 0.00256
scoring_system epss
scoring_elements 0.48926
published_at 2026-04-02T12:55:00Z
2
value 0.00256
scoring_system epss
scoring_elements 0.48952
published_at 2026-04-04T12:55:00Z
3
value 0.00256
scoring_system epss
scoring_elements 0.48906
published_at 2026-04-07T12:55:00Z
4
value 0.00256
scoring_system epss
scoring_elements 0.4896
published_at 2026-04-21T12:55:00Z
5
value 0.00256
scoring_system epss
scoring_elements 0.48958
published_at 2026-04-09T12:55:00Z
6
value 0.00256
scoring_system epss
scoring_elements 0.48974
published_at 2026-04-11T12:55:00Z
7
value 0.00256
scoring_system epss
scoring_elements 0.48948
published_at 2026-04-24T12:55:00Z
8
value 0.00256
scoring_system epss
scoring_elements 0.48956
published_at 2026-04-26T12:55:00Z
9
value 0.00256
scoring_system epss
scoring_elements 0.49002
published_at 2026-04-16T12:55:00Z
10
value 0.00256
scoring_system epss
scoring_elements 0.48998
published_at 2026-04-18T12:55:00Z
11
value 0.00256
scoring_system epss
scoring_elements 0.48909
published_at 2026-04-29T12:55:00Z
12
value 0.00256
scoring_system epss
scoring_elements 0.48826
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9743
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9743
fixed_packages
0
url pkg:deb/debian/vlc@2.2.0~rc2-1?distro=trixie
purl pkg:deb/debian/vlc@2.2.0~rc2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@2.2.0~rc2-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2014-9743
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-74ez-a9dg-7uha
23
url VCID-75p5-9stz-dffu
vulnerability_id VCID-75p5-9stz-dffu
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could lead to user-assisted execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6934
reference_id
reference_type
scores
0
value 0.03978
scoring_system epss
scoring_elements 0.88343
published_at 2026-04-01T12:55:00Z
1
value 0.03978
scoring_system epss
scoring_elements 0.88352
published_at 2026-04-02T12:55:00Z
2
value 0.03978
scoring_system epss
scoring_elements 0.88366
published_at 2026-04-04T12:55:00Z
3
value 0.03978
scoring_system epss
scoring_elements 0.88371
published_at 2026-04-07T12:55:00Z
4
value 0.03978
scoring_system epss
scoring_elements 0.8839
published_at 2026-04-08T12:55:00Z
5
value 0.03978
scoring_system epss
scoring_elements 0.88396
published_at 2026-04-09T12:55:00Z
6
value 0.03978
scoring_system epss
scoring_elements 0.88406
published_at 2026-04-11T12:55:00Z
7
value 0.03978
scoring_system epss
scoring_elements 0.88399
published_at 2026-04-13T12:55:00Z
8
value 0.03978
scoring_system epss
scoring_elements 0.88413
published_at 2026-04-16T12:55:00Z
9
value 0.03978
scoring_system epss
scoring_elements 0.88409
published_at 2026-04-21T12:55:00Z
10
value 0.03978
scoring_system epss
scoring_elements 0.88425
published_at 2026-04-24T12:55:00Z
11
value 0.03978
scoring_system epss
scoring_elements 0.8843
published_at 2026-04-26T12:55:00Z
12
value 0.03978
scoring_system epss
scoring_elements 0.88431
published_at 2026-04-29T12:55:00Z
13
value 0.03978
scoring_system epss
scoring_elements 0.88442
published_at 2026-05-05T12:55:00Z
14
value 0.03978
scoring_system epss
scoring_elements 0.88459
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6934
1
reference_url https://security.gentoo.org/glsa/201411-01
reference_id GLSA-201411-01
reference_type
scores
url https://security.gentoo.org/glsa/201411-01
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2013-6934
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-75p5-9stz-dffu
24
url VCID-76yz-q5df-1ueg
vulnerability_id VCID-76yz-q5df-1ueg
summary VideoLAN VLC Media Player before 2.0.7 allows remote attackers to cause a denial of service (memory consumption) via a crafted playlist file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-7340
reference_id
reference_type
scores
0
value 0.00443
scoring_system epss
scoring_elements 0.63242
published_at 2026-04-01T12:55:00Z
1
value 0.00443
scoring_system epss
scoring_elements 0.63301
published_at 2026-04-02T12:55:00Z
2
value 0.00443
scoring_system epss
scoring_elements 0.63328
published_at 2026-04-04T12:55:00Z
3
value 0.00443
scoring_system epss
scoring_elements 0.63294
published_at 2026-04-07T12:55:00Z
4
value 0.00443
scoring_system epss
scoring_elements 0.63345
published_at 2026-04-08T12:55:00Z
5
value 0.00443
scoring_system epss
scoring_elements 0.63363
published_at 2026-04-12T12:55:00Z
6
value 0.00443
scoring_system epss
scoring_elements 0.6338
published_at 2026-04-11T12:55:00Z
7
value 0.00443
scoring_system epss
scoring_elements 0.63327
published_at 2026-04-13T12:55:00Z
8
value 0.00443
scoring_system epss
scoring_elements 0.63361
published_at 2026-04-16T12:55:00Z
9
value 0.00443
scoring_system epss
scoring_elements 0.63369
published_at 2026-04-18T12:55:00Z
10
value 0.00443
scoring_system epss
scoring_elements 0.63347
published_at 2026-04-21T12:55:00Z
11
value 0.00443
scoring_system epss
scoring_elements 0.63366
published_at 2026-04-24T12:55:00Z
12
value 0.00443
scoring_system epss
scoring_elements 0.63379
published_at 2026-04-26T12:55:00Z
13
value 0.00443
scoring_system epss
scoring_elements 0.63377
published_at 2026-04-29T12:55:00Z
14
value 0.00443
scoring_system epss
scoring_elements 0.63348
published_at 2026-05-05T12:55:00Z
15
value 0.00443
scoring_system epss
scoring_elements 0.63393
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-7340
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7340
fixed_packages
0
url pkg:deb/debian/vlc@2.2.0~rc2-1?distro=trixie
purl pkg:deb/debian/vlc@2.2.0~rc2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@2.2.0~rc2-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2013-7340
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-76yz-q5df-1ueg
25
url VCID-79z4-a6ab-rygh
vulnerability_id VCID-79z4-a6ab-rygh
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could lead to user-assisted execution of arbitrary code.
references
0
reference_url http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=5637ca8141bf39f263ecdb62035d2cb45c740821
reference_id
reference_type
scores
url http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=5637ca8141bf39f263ecdb62035d2cb45c740821
1
reference_url http://openwall.com/lists/oss-security/2011/04/11/17
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/04/11/17
2
reference_url http://openwall.com/lists/oss-security/2011/04/13/14
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/04/13/14
3
reference_url http://openwall.com/lists/oss-security/2011/04/13/17
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/04/13/17
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1684
reference_id
reference_type
scores
0
value 0.0494
scoring_system epss
scoring_elements 0.89688
published_at 2026-05-07T12:55:00Z
1
value 0.0494
scoring_system epss
scoring_elements 0.89593
published_at 2026-04-01T12:55:00Z
2
value 0.0494
scoring_system epss
scoring_elements 0.89596
published_at 2026-04-02T12:55:00Z
3
value 0.0494
scoring_system epss
scoring_elements 0.89609
published_at 2026-04-04T12:55:00Z
4
value 0.0494
scoring_system epss
scoring_elements 0.8961
published_at 2026-04-07T12:55:00Z
5
value 0.0494
scoring_system epss
scoring_elements 0.89627
published_at 2026-04-08T12:55:00Z
6
value 0.0494
scoring_system epss
scoring_elements 0.89632
published_at 2026-04-09T12:55:00Z
7
value 0.0494
scoring_system epss
scoring_elements 0.89639
published_at 2026-04-11T12:55:00Z
8
value 0.0494
scoring_system epss
scoring_elements 0.89637
published_at 2026-04-12T12:55:00Z
9
value 0.0494
scoring_system epss
scoring_elements 0.89631
published_at 2026-04-13T12:55:00Z
10
value 0.0494
scoring_system epss
scoring_elements 0.89647
published_at 2026-04-16T12:55:00Z
11
value 0.0494
scoring_system epss
scoring_elements 0.89648
published_at 2026-04-18T12:55:00Z
12
value 0.0494
scoring_system epss
scoring_elements 0.89642
published_at 2026-04-21T12:55:00Z
13
value 0.0494
scoring_system epss
scoring_elements 0.89657
published_at 2026-04-24T12:55:00Z
14
value 0.0494
scoring_system epss
scoring_elements 0.89661
published_at 2026-04-29T12:55:00Z
15
value 0.0494
scoring_system epss
scoring_elements 0.89671
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1684
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1684
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1684
6
reference_url http://secunia.com/advisories/43890
reference_id
reference_type
scores
url http://secunia.com/advisories/43890
7
reference_url http://secunia.com/advisories/44022
reference_id
reference_type
scores
url http://secunia.com/advisories/44022
8
reference_url http://securitytracker.com/id?1025373
reference_id
reference_type
scores
url http://securitytracker.com/id?1025373
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/66664
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/66664
10
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14741
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14741
11
reference_url http://www.debian.org/security/2011/dsa-2218
reference_id
reference_type
scores
url http://www.debian.org/security/2011/dsa-2218
12
reference_url http://www.securityfocus.com/bid/47293
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/47293
13
reference_url http://www.videolan.org/security/sa1103.html
reference_id
reference_type
scores
url http://www.videolan.org/security/sa1103.html
14
reference_url http://www.vupen.com/english/advisories/2011/0916
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0916
15
reference_url http://www.vupen.com/english/advisories/2011/0954
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0954
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.3:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.4:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.5:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.6:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.6.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.7:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.8:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1684
reference_id CVE-2011-1684
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2011-1684
34
reference_url https://security.gentoo.org/glsa/201411-01
reference_id GLSA-201411-01
reference_type
scores
url https://security.gentoo.org/glsa/201411-01
fixed_packages
0
url pkg:deb/debian/vlc@1.1.8-3?distro=trixie
purl pkg:deb/debian/vlc@1.1.8-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@1.1.8-3%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2011-1684
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-79z4-a6ab-rygh
26
url VCID-7enm-2sr1-cygk
vulnerability_id VCID-7enm-2sr1-cygk
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could lead to user-assisted execution of arbitrary code.
references
0
reference_url http://marc.info/?l=oss-security&m=136367945627336&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=136367945627336&w=2
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1868
reference_id
reference_type
scores
0
value 0.50657
scoring_system epss
scoring_elements 0.97866
published_at 2026-05-07T12:55:00Z
1
value 0.50657
scoring_system epss
scoring_elements 0.97829
published_at 2026-04-01T12:55:00Z
2
value 0.50657
scoring_system epss
scoring_elements 0.97834
published_at 2026-04-02T12:55:00Z
3
value 0.50657
scoring_system epss
scoring_elements 0.97836
published_at 2026-04-04T12:55:00Z
4
value 0.50657
scoring_system epss
scoring_elements 0.97838
published_at 2026-04-07T12:55:00Z
5
value 0.50657
scoring_system epss
scoring_elements 0.97843
published_at 2026-04-08T12:55:00Z
6
value 0.50657
scoring_system epss
scoring_elements 0.97846
published_at 2026-04-09T12:55:00Z
7
value 0.50657
scoring_system epss
scoring_elements 0.97848
published_at 2026-04-11T12:55:00Z
8
value 0.50657
scoring_system epss
scoring_elements 0.9785
published_at 2026-04-12T12:55:00Z
9
value 0.50657
scoring_system epss
scoring_elements 0.97852
published_at 2026-04-13T12:55:00Z
10
value 0.50657
scoring_system epss
scoring_elements 0.97859
published_at 2026-04-26T12:55:00Z
11
value 0.50657
scoring_system epss
scoring_elements 0.97862
published_at 2026-04-18T12:55:00Z
12
value 0.50657
scoring_system epss
scoring_elements 0.9786
published_at 2026-04-21T12:55:00Z
13
value 0.50657
scoring_system epss
scoring_elements 0.97858
published_at 2026-04-24T12:55:00Z
14
value 0.50657
scoring_system epss
scoring_elements 0.97863
published_at 2026-04-29T12:55:00Z
15
value 0.50657
scoring_system epss
scoring_elements 0.97867
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1868
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1868
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1868
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1954
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4388
5
reference_url http://secunia.com/advisories/59793
reference_id
reference_type
scores
url http://secunia.com/advisories/59793
6
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17226
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17226
7
reference_url http://www.securityfocus.com/bid/57079
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/57079
8
reference_url http://www.videolan.org/security/sa1301.html
reference_id
reference_type
scores
url http://www.videolan.org/security/sa1301.html
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:2.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.3:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1868
reference_id CVE-2013-1868
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2013-1868
15
reference_url https://security.gentoo.org/glsa/201411-01
reference_id GLSA-201411-01
reference_type
scores
url https://security.gentoo.org/glsa/201411-01
16
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/23201.txt
reference_id OSVDB-88299;CVE-2013-1868
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/23201.txt
fixed_packages
0
url pkg:deb/debian/vlc@2.0.5-1?distro=trixie
purl pkg:deb/debian/vlc@2.0.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@2.0.5-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2013-1868
risk_score 10.0
exploitability 2.0
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7enm-2sr1-cygk
27
url VCID-7hn8-1cj7-2be3
vulnerability_id VCID-7hn8-1cj7-2be3
summary The vlc_demux_chained_Delete function in input/demux_chained.c in VideoLAN VLC media player 3.0.1 allows remote attackers to cause a denial of service (heap corruption and application crash) or possibly have unspecified other impact via a crafted .swf file.
references
0
reference_url http://code610.blogspot.com/2018/05/make-free-vlc.html
reference_id
reference_type
scores
url http://code610.blogspot.com/2018/05/make-free-vlc.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-11516
reference_id
reference_type
scores
0
value 0.00601
scoring_system epss
scoring_elements 0.69589
published_at 2026-05-07T12:55:00Z
1
value 0.00601
scoring_system epss
scoring_elements 0.69547
published_at 2026-05-05T12:55:00Z
2
value 0.00601
scoring_system epss
scoring_elements 0.69415
published_at 2026-04-01T12:55:00Z
3
value 0.00601
scoring_system epss
scoring_elements 0.69426
published_at 2026-04-02T12:55:00Z
4
value 0.00601
scoring_system epss
scoring_elements 0.69443
published_at 2026-04-04T12:55:00Z
5
value 0.00601
scoring_system epss
scoring_elements 0.69422
published_at 2026-04-07T12:55:00Z
6
value 0.00601
scoring_system epss
scoring_elements 0.69472
published_at 2026-04-08T12:55:00Z
7
value 0.00601
scoring_system epss
scoring_elements 0.69488
published_at 2026-04-09T12:55:00Z
8
value 0.00601
scoring_system epss
scoring_elements 0.6951
published_at 2026-04-11T12:55:00Z
9
value 0.00601
scoring_system epss
scoring_elements 0.69494
published_at 2026-04-12T12:55:00Z
10
value 0.00601
scoring_system epss
scoring_elements 0.6948
published_at 2026-04-13T12:55:00Z
11
value 0.00601
scoring_system epss
scoring_elements 0.69519
published_at 2026-04-16T12:55:00Z
12
value 0.00601
scoring_system epss
scoring_elements 0.69528
published_at 2026-04-18T12:55:00Z
13
value 0.00601
scoring_system epss
scoring_elements 0.69508
published_at 2026-04-21T12:55:00Z
14
value 0.00601
scoring_system epss
scoring_elements 0.69561
published_at 2026-04-24T12:55:00Z
15
value 0.00601
scoring_system epss
scoring_elements 0.69568
published_at 2026-04-26T12:55:00Z
16
value 0.00601
scoring_system epss
scoring_elements 0.69572
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-11516
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11516
3
reference_url http://www.securityfocus.com/bid/104293
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104293
4
reference_url http://www.securitytracker.com/id/1041312
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1041312
5
reference_url http://www.videolan.org/security/sa1801.html
reference_id
reference_type
scores
url http://www.videolan.org/security/sa1801.html
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:3.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:3.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:3.0.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:3.0.1:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-11516
reference_id CVE-2018-11516
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-11516
fixed_packages
0
url pkg:deb/debian/vlc@3.0.2-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.2-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2018-11516
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7hn8-1cj7-2be3
28
url VCID-7q9n-v18z-z7av
vulnerability_id VCID-7q9n-v18z-z7av
summary Stack-based buffer overflow in Xine-lib-rc5 in xine-lib 1_rc5-r2 and earlier allows remote attackers to execute arbitrary code via crafted playlists that result in a long vcd:// URL.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-1455
reference_id
reference_type
scores
0
value 0.04348
scoring_system epss
scoring_elements 0.88888
published_at 2026-04-01T12:55:00Z
1
value 0.04348
scoring_system epss
scoring_elements 0.88896
published_at 2026-04-02T12:55:00Z
2
value 0.04348
scoring_system epss
scoring_elements 0.88912
published_at 2026-04-04T12:55:00Z
3
value 0.04348
scoring_system epss
scoring_elements 0.88915
published_at 2026-04-07T12:55:00Z
4
value 0.04348
scoring_system epss
scoring_elements 0.88933
published_at 2026-04-08T12:55:00Z
5
value 0.04348
scoring_system epss
scoring_elements 0.88938
published_at 2026-04-09T12:55:00Z
6
value 0.04348
scoring_system epss
scoring_elements 0.8895
published_at 2026-04-11T12:55:00Z
7
value 0.04348
scoring_system epss
scoring_elements 0.88944
published_at 2026-04-12T12:55:00Z
8
value 0.04348
scoring_system epss
scoring_elements 0.88943
published_at 2026-04-13T12:55:00Z
9
value 0.04348
scoring_system epss
scoring_elements 0.88956
published_at 2026-04-16T12:55:00Z
10
value 0.04348
scoring_system epss
scoring_elements 0.88954
published_at 2026-04-18T12:55:00Z
11
value 0.04348
scoring_system epss
scoring_elements 0.88951
published_at 2026-04-21T12:55:00Z
12
value 0.04348
scoring_system epss
scoring_elements 0.88968
published_at 2026-04-24T12:55:00Z
13
value 0.04348
scoring_system epss
scoring_elements 0.88975
published_at 2026-04-26T12:55:00Z
14
value 0.04348
scoring_system epss
scoring_elements 0.88976
published_at 2026-04-29T12:55:00Z
15
value 0.04348
scoring_system epss
scoring_elements 0.88982
published_at 2026-05-05T12:55:00Z
16
value 0.04348
scoring_system epss
scoring_elements 0.88996
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-1455
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2004-1455
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7q9n-v18z-z7av
29
url VCID-7s4c-q35j-sbf8
vulnerability_id VCID-7s4c-q35j-sbf8
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could result in the arbitrary execution of code.
references
0
reference_url http://git.videolan.org/?p=vlc.git&a=search&h=refs/heads/master&st=commit&s=cve-2019
reference_id
reference_type
scores
url http://git.videolan.org/?p=vlc.git&a=search&h=refs/heads/master&st=commit&s=cve-2019
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00036.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00036.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00046.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00046.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-14535
reference_id
reference_type
scores
0
value 0.00546
scoring_system epss
scoring_elements 0.67913
published_at 2026-05-07T12:55:00Z
1
value 0.00546
scoring_system epss
scoring_elements 0.6787
published_at 2026-05-05T12:55:00Z
2
value 0.00546
scoring_system epss
scoring_elements 0.67759
published_at 2026-04-01T12:55:00Z
3
value 0.00546
scoring_system epss
scoring_elements 0.67792
published_at 2026-04-07T12:55:00Z
4
value 0.00546
scoring_system epss
scoring_elements 0.67812
published_at 2026-04-04T12:55:00Z
5
value 0.00546
scoring_system epss
scoring_elements 0.67843
published_at 2026-04-08T12:55:00Z
6
value 0.00546
scoring_system epss
scoring_elements 0.67857
published_at 2026-04-09T12:55:00Z
7
value 0.00546
scoring_system epss
scoring_elements 0.6788
published_at 2026-04-11T12:55:00Z
8
value 0.00546
scoring_system epss
scoring_elements 0.67867
published_at 2026-04-12T12:55:00Z
9
value 0.00546
scoring_system epss
scoring_elements 0.6783
published_at 2026-04-13T12:55:00Z
10
value 0.00546
scoring_system epss
scoring_elements 0.67866
published_at 2026-04-16T12:55:00Z
11
value 0.00546
scoring_system epss
scoring_elements 0.67879
published_at 2026-04-24T12:55:00Z
12
value 0.00546
scoring_system epss
scoring_elements 0.6786
published_at 2026-04-21T12:55:00Z
13
value 0.00546
scoring_system epss
scoring_elements 0.67889
published_at 2026-04-26T12:55:00Z
14
value 0.00546
scoring_system epss
scoring_elements 0.67894
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-14535
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13602
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13962
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14437
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14438
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14438
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14498
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14533
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14534
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14534
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14535
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14535
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14776
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14777
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14778
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14970
16
reference_url https://seclists.org/bugtraq/2019/Aug/36
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Aug/36
17
reference_url https://www.debian.org/security/2019/dsa-4504
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4504
18
reference_url https://www.videolan.org/security/sb-vlc308.html
reference_id
reference_type
scores
url https://www.videolan.org/security/sb-vlc308.html
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:3.0.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:3.0.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:3.0.7.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-14535
reference_id CVE-2019-14535
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-14535
23
reference_url https://security.gentoo.org/glsa/201909-02
reference_id GLSA-201909-02
reference_type
scores
url https://security.gentoo.org/glsa/201909-02
24
reference_url https://usn.ubuntu.com/4131-1/
reference_id USN-4131-1
reference_type
scores
url https://usn.ubuntu.com/4131-1/
fixed_packages
0
url pkg:deb/debian/vlc@3.0.8-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.8-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2019-14535
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7s4c-q35j-sbf8
30
url VCID-7yxx-uyu3-t3fk
vulnerability_id VCID-7yxx-uyu3-t3fk
summary
Two vulnerabilities in VLC may lead to the remote execution of arbitrary
    code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3732
reference_id
reference_type
scores
0
value 0.32143
scoring_system epss
scoring_elements 0.96854
published_at 2026-05-07T12:55:00Z
1
value 0.32143
scoring_system epss
scoring_elements 0.968
published_at 2026-04-01T12:55:00Z
2
value 0.32143
scoring_system epss
scoring_elements 0.96807
published_at 2026-04-02T12:55:00Z
3
value 0.32143
scoring_system epss
scoring_elements 0.96809
published_at 2026-04-04T12:55:00Z
4
value 0.32143
scoring_system epss
scoring_elements 0.96813
published_at 2026-04-07T12:55:00Z
5
value 0.32143
scoring_system epss
scoring_elements 0.96821
published_at 2026-04-08T12:55:00Z
6
value 0.32143
scoring_system epss
scoring_elements 0.96822
published_at 2026-04-09T12:55:00Z
7
value 0.32143
scoring_system epss
scoring_elements 0.96824
published_at 2026-04-11T12:55:00Z
8
value 0.32143
scoring_system epss
scoring_elements 0.96825
published_at 2026-04-12T12:55:00Z
9
value 0.32143
scoring_system epss
scoring_elements 0.96826
published_at 2026-04-13T12:55:00Z
10
value 0.32143
scoring_system epss
scoring_elements 0.96832
published_at 2026-04-16T12:55:00Z
11
value 0.32143
scoring_system epss
scoring_elements 0.96836
published_at 2026-04-18T12:55:00Z
12
value 0.32143
scoring_system epss
scoring_elements 0.96838
published_at 2026-04-24T12:55:00Z
13
value 0.32143
scoring_system epss
scoring_elements 0.9684
published_at 2026-04-26T12:55:00Z
14
value 0.32143
scoring_system epss
scoring_elements 0.96844
published_at 2026-04-29T12:55:00Z
15
value 0.32143
scoring_system epss
scoring_elements 0.9685
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3732
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3732
2
reference_url http://secunia.com/advisories/31512
reference_id
reference_type
scores
url http://secunia.com/advisories/31512
3
reference_url http://security.gentoo.org/glsa/glsa-200809-06.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200809-06.xml
4
reference_url http://securityreason.com/securityalert/4170
reference_id
reference_type
scores
url http://securityreason.com/securityalert/4170
5
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/44510
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/44510
6
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14570
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14570
7
reference_url https://www.exploit-db.com/exploits/6252
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/6252
8
reference_url http://www.orange-bat.com/adv/2008/adv.08.16.txt
reference_id
reference_type
scores
url http://www.orange-bat.com/adv/2008/adv.08.16.txt
9
reference_url http://www.securityfocus.com/bid/30718
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/30718
10
reference_url http://www.vupen.com/english/advisories/2008/2394
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2394
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3732
reference_id CVE-2008-3732
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-3732
13
reference_url https://security.gentoo.org/glsa/200809-06
reference_id GLSA-200809-06
reference_type
scores
url https://security.gentoo.org/glsa/200809-06
14
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/6252.txt
reference_id OSVDB-47541;CVE-2008-3732
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/6252.txt
fixed_packages
0
url pkg:deb/debian/vlc@0.8.6.h-2?distro=trixie
purl pkg:deb/debian/vlc@0.8.6.h-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0.8.6.h-2%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2008-3732
risk_score 10.0
exploitability 2.0
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7yxx-uyu3-t3fk
31
url VCID-85px-3mub-ckdj
vulnerability_id VCID-85px-3mub-ckdj
summary
A buffer overflow in VLC might allow remote attackers to execute
    arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00045.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00045.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5108
reference_id
reference_type
scores
0
value 0.20819
scoring_system epss
scoring_elements 0.95645
published_at 2026-05-07T12:55:00Z
1
value 0.20819
scoring_system epss
scoring_elements 0.95625
published_at 2026-04-29T12:55:00Z
2
value 0.20819
scoring_system epss
scoring_elements 0.95641
published_at 2026-05-05T12:55:00Z
3
value 0.20819
scoring_system epss
scoring_elements 0.95575
published_at 2026-04-01T12:55:00Z
4
value 0.20819
scoring_system epss
scoring_elements 0.95583
published_at 2026-04-02T12:55:00Z
5
value 0.20819
scoring_system epss
scoring_elements 0.95588
published_at 2026-04-04T12:55:00Z
6
value 0.20819
scoring_system epss
scoring_elements 0.95591
published_at 2026-04-07T12:55:00Z
7
value 0.20819
scoring_system epss
scoring_elements 0.956
published_at 2026-04-08T12:55:00Z
8
value 0.20819
scoring_system epss
scoring_elements 0.95603
published_at 2026-04-09T12:55:00Z
9
value 0.20819
scoring_system epss
scoring_elements 0.95607
published_at 2026-04-11T12:55:00Z
10
value 0.20819
scoring_system epss
scoring_elements 0.95608
published_at 2026-04-12T12:55:00Z
11
value 0.20819
scoring_system epss
scoring_elements 0.9561
published_at 2026-04-13T12:55:00Z
12
value 0.20819
scoring_system epss
scoring_elements 0.95619
published_at 2026-04-16T12:55:00Z
13
value 0.20819
scoring_system epss
scoring_elements 0.95624
published_at 2026-04-24T12:55:00Z
14
value 0.20819
scoring_system epss
scoring_elements 0.95623
published_at 2026-04-21T12:55:00Z
15
value 0.20819
scoring_system epss
scoring_elements 0.95627
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5108
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5108
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://www.debian.org/security/2016/dsa-3598
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3598
5
reference_url http://www.securityfocus.com/bid/90924
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/90924
6
reference_url http://www.securitytracker.com/id/1036009
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1036009
7
reference_url http://www.videolan.org/security/sa1601.html
reference_id
reference_type
scores
url http://www.videolan.org/security/sa1601.html
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=825728
reference_id 825728
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=825728
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
11
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/41025.txt
reference_id CVE-2016-5108
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/41025.txt
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-5108
reference_id CVE-2016-5108
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-5108
13
reference_url http://www.openwall.com/lists/oss-security/2016/05/27/3
reference_id CVE-2016-5108
reference_type exploit
scores
url http://www.openwall.com/lists/oss-security/2016/05/27/3
14
reference_url https://security.gentoo.org/glsa/201701-39
reference_id GLSA-201701-39
reference_type
scores
url https://security.gentoo.org/glsa/201701-39
fixed_packages
0
url pkg:deb/debian/vlc@2.2.3-2?distro=trixie
purl pkg:deb/debian/vlc@2.2.3-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@2.2.3-2%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2016-5108
risk_score 10.0
exploitability 2.0
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-85px-3mub-ckdj
32
url VCID-8pdq-58a2-a7fc
vulnerability_id VCID-8pdq-58a2-a7fc
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could lead to user-assisted execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2588
reference_id
reference_type
scores
0
value 0.03007
scoring_system epss
scoring_elements 0.86524
published_at 2026-04-01T12:55:00Z
1
value 0.03007
scoring_system epss
scoring_elements 0.86534
published_at 2026-04-02T12:55:00Z
2
value 0.03007
scoring_system epss
scoring_elements 0.86553
published_at 2026-04-04T12:55:00Z
3
value 0.03007
scoring_system epss
scoring_elements 0.86552
published_at 2026-04-07T12:55:00Z
4
value 0.03007
scoring_system epss
scoring_elements 0.86572
published_at 2026-04-08T12:55:00Z
5
value 0.03007
scoring_system epss
scoring_elements 0.86582
published_at 2026-04-09T12:55:00Z
6
value 0.03007
scoring_system epss
scoring_elements 0.86596
published_at 2026-04-11T12:55:00Z
7
value 0.03007
scoring_system epss
scoring_elements 0.86593
published_at 2026-04-12T12:55:00Z
8
value 0.03007
scoring_system epss
scoring_elements 0.86586
published_at 2026-04-13T12:55:00Z
9
value 0.03007
scoring_system epss
scoring_elements 0.866
published_at 2026-04-16T12:55:00Z
10
value 0.03007
scoring_system epss
scoring_elements 0.86605
published_at 2026-04-18T12:55:00Z
11
value 0.03007
scoring_system epss
scoring_elements 0.86597
published_at 2026-04-21T12:55:00Z
12
value 0.03007
scoring_system epss
scoring_elements 0.86615
published_at 2026-04-24T12:55:00Z
13
value 0.03007
scoring_system epss
scoring_elements 0.86624
published_at 2026-04-26T12:55:00Z
14
value 0.03007
scoring_system epss
scoring_elements 0.86622
published_at 2026-04-29T12:55:00Z
15
value 0.03007
scoring_system epss
scoring_elements 0.86643
published_at 2026-05-05T12:55:00Z
16
value 0.03007
scoring_system epss
scoring_elements 0.86662
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2588
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2588
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=633675
reference_id 633675
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=633675
3
reference_url https://security.gentoo.org/glsa/201411-01
reference_id GLSA-201411-01
reference_type
scores
url https://security.gentoo.org/glsa/201411-01
fixed_packages
0
url pkg:deb/debian/vlc@1.1.11-1?distro=trixie
purl pkg:deb/debian/vlc@1.1.11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@1.1.11-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2011-2588
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8pdq-58a2-a7fc
33
url VCID-8q82-evfa-s7fm
vulnerability_id VCID-8q82-evfa-s7fm
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could lead to user-assisted execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2396.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2396.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2396
reference_id
reference_type
scores
0
value 0.02464
scoring_system epss
scoring_elements 0.85343
published_at 2026-05-07T12:55:00Z
1
value 0.02464
scoring_system epss
scoring_elements 0.85303
published_at 2026-04-29T12:55:00Z
2
value 0.02464
scoring_system epss
scoring_elements 0.85317
published_at 2026-05-05T12:55:00Z
3
value 0.02464
scoring_system epss
scoring_elements 0.85211
published_at 2026-04-04T12:55:00Z
4
value 0.02464
scoring_system epss
scoring_elements 0.85213
published_at 2026-04-07T12:55:00Z
5
value 0.02464
scoring_system epss
scoring_elements 0.85235
published_at 2026-04-08T12:55:00Z
6
value 0.02464
scoring_system epss
scoring_elements 0.85243
published_at 2026-04-09T12:55:00Z
7
value 0.02464
scoring_system epss
scoring_elements 0.85258
published_at 2026-04-11T12:55:00Z
8
value 0.02464
scoring_system epss
scoring_elements 0.85255
published_at 2026-04-12T12:55:00Z
9
value 0.02464
scoring_system epss
scoring_elements 0.85252
published_at 2026-04-13T12:55:00Z
10
value 0.02464
scoring_system epss
scoring_elements 0.85272
published_at 2026-04-16T12:55:00Z
11
value 0.02464
scoring_system epss
scoring_elements 0.85274
published_at 2026-04-18T12:55:00Z
12
value 0.02464
scoring_system epss
scoring_elements 0.85273
published_at 2026-04-21T12:55:00Z
13
value 0.02464
scoring_system epss
scoring_elements 0.85296
published_at 2026-04-24T12:55:00Z
14
value 0.02464
scoring_system epss
scoring_elements 0.85305
published_at 2026-04-26T12:55:00Z
15
value 0.02478
scoring_system epss
scoring_elements 0.85226
published_at 2026-04-02T12:55:00Z
16
value 0.02478
scoring_system epss
scoring_elements 0.85214
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2396
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2396
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2396
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=818583
reference_id 818583
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=818583
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/18757.txt
reference_id CVE-2012-2396;OSVDB-81224
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/18757.txt
5
reference_url https://security.gentoo.org/glsa/201411-01
reference_id GLSA-201411-01
reference_type
scores
url https://security.gentoo.org/glsa/201411-01
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2012-2396
risk_score null
exploitability 2.0
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8q82-evfa-s7fm
34
url VCID-9428-9mzj-e7ee
vulnerability_id VCID-9428-9mzj-e7ee
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could lead to user-assisted execution of arbitrary code.
references
0
reference_url http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=7d282fac1cc455b5a5eca2bb56375efcbf879b06
reference_id
reference_type
scores
url http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=7d282fac1cc455b5a5eca2bb56375efcbf879b06
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0023
reference_id
reference_type
scores
0
value 0.11852
scoring_system epss
scoring_elements 0.93776
published_at 2026-05-07T12:55:00Z
1
value 0.11852
scoring_system epss
scoring_elements 0.93689
published_at 2026-04-01T12:55:00Z
2
value 0.11852
scoring_system epss
scoring_elements 0.93699
published_at 2026-04-02T12:55:00Z
3
value 0.11852
scoring_system epss
scoring_elements 0.93709
published_at 2026-04-04T12:55:00Z
4
value 0.11852
scoring_system epss
scoring_elements 0.93712
published_at 2026-04-07T12:55:00Z
5
value 0.11852
scoring_system epss
scoring_elements 0.93721
published_at 2026-04-08T12:55:00Z
6
value 0.11852
scoring_system epss
scoring_elements 0.93723
published_at 2026-04-09T12:55:00Z
7
value 0.11852
scoring_system epss
scoring_elements 0.93727
published_at 2026-04-12T12:55:00Z
8
value 0.11852
scoring_system epss
scoring_elements 0.93728
published_at 2026-04-13T12:55:00Z
9
value 0.11852
scoring_system epss
scoring_elements 0.93745
published_at 2026-04-16T12:55:00Z
10
value 0.11852
scoring_system epss
scoring_elements 0.93752
published_at 2026-04-18T12:55:00Z
11
value 0.11852
scoring_system epss
scoring_elements 0.93755
published_at 2026-04-29T12:55:00Z
12
value 0.11852
scoring_system epss
scoring_elements 0.93759
published_at 2026-04-24T12:55:00Z
13
value 0.11852
scoring_system epss
scoring_elements 0.93756
published_at 2026-04-26T12:55:00Z
14
value 0.11852
scoring_system epss
scoring_elements 0.93765
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0023
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0023
3
reference_url http://secunia.com/advisories/47325
reference_id
reference_type
scores
url http://secunia.com/advisories/47325
4
reference_url http://securitytracker.com/id?1026449
reference_id
reference_type
scores
url http://securitytracker.com/id?1026449
5
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/71916
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/71916
6
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15893
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15893
7
reference_url http://www.openwall.com/lists/oss-security/2012/10/29/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/10/29/5
8
reference_url http://www.openwall.com/lists/oss-security/2012/10/30/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/10/30/9
9
reference_url http://www.osvdb.org/77975
reference_id
reference_type
scores
url http://www.osvdb.org/77975
10
reference_url http://www.securityfocus.com/bid/51231
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/51231
11
reference_url http://www.videolan.org/security/sa1108.html
reference_id
reference_type
scores
url http://www.videolan.org/security/sa1108.html
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.10:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.10.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.11:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.12:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.3:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.4:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.4.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.5:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.6:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.6.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.7:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.8:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.9:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-0023
reference_id CVE-2012-0023
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-0023
47
reference_url https://security.gentoo.org/glsa/201411-01
reference_id GLSA-201411-01
reference_type
scores
url https://security.gentoo.org/glsa/201411-01
fixed_packages
0
url pkg:deb/debian/vlc@1.1.13-1?distro=trixie
purl pkg:deb/debian/vlc@1.1.13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@1.1.13-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2012-0023
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9428-9mzj-e7ee
35
url VCID-978h-eswr-afea
vulnerability_id VCID-978h-eswr-afea
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    may allow remote attackers to execute arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-8310
reference_id
reference_type
scores
0
value 0.00183
scoring_system epss
scoring_elements 0.39625
published_at 2026-05-07T12:55:00Z
1
value 0.00183
scoring_system epss
scoring_elements 0.39903
published_at 2026-04-01T12:55:00Z
2
value 0.00183
scoring_system epss
scoring_elements 0.40051
published_at 2026-04-08T12:55:00Z
3
value 0.00183
scoring_system epss
scoring_elements 0.40077
published_at 2026-04-04T12:55:00Z
4
value 0.00183
scoring_system epss
scoring_elements 0.39998
published_at 2026-04-07T12:55:00Z
5
value 0.00183
scoring_system epss
scoring_elements 0.40066
published_at 2026-04-09T12:55:00Z
6
value 0.00183
scoring_system epss
scoring_elements 0.40076
published_at 2026-04-11T12:55:00Z
7
value 0.00183
scoring_system epss
scoring_elements 0.40039
published_at 2026-04-12T12:55:00Z
8
value 0.00183
scoring_system epss
scoring_elements 0.4002
published_at 2026-04-13T12:55:00Z
9
value 0.00183
scoring_system epss
scoring_elements 0.40069
published_at 2026-04-16T12:55:00Z
10
value 0.00183
scoring_system epss
scoring_elements 0.4004
published_at 2026-04-18T12:55:00Z
11
value 0.00183
scoring_system epss
scoring_elements 0.39962
published_at 2026-04-21T12:55:00Z
12
value 0.00183
scoring_system epss
scoring_elements 0.39791
published_at 2026-04-24T12:55:00Z
13
value 0.00183
scoring_system epss
scoring_elements 0.39777
published_at 2026-04-26T12:55:00Z
14
value 0.00183
scoring_system epss
scoring_elements 0.39692
published_at 2026-04-29T12:55:00Z
15
value 0.00183
scoring_system epss
scoring_elements 0.3956
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-8310
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8310
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8311
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8312
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8313
5
reference_url https://security.archlinux.org/ASA-201706-1
reference_id ASA-201706-1
reference_type
scores
url https://security.archlinux.org/ASA-201706-1
6
reference_url https://security.archlinux.org/AVG-283
reference_id AVG-283
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-283
7
reference_url https://security.gentoo.org/glsa/201707-10
reference_id GLSA-201707-10
reference_type
scores
url https://security.gentoo.org/glsa/201707-10
fixed_packages
0
url pkg:deb/debian/vlc@2.2.5.1-1~deb9u1?distro=trixie
purl pkg:deb/debian/vlc@2.2.5.1-1~deb9u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@2.2.5.1-1~deb9u1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2017-8310
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-978h-eswr-afea
36
url VCID-9fcx-1pdf-7ues
vulnerability_id VCID-9fcx-1pdf-7ues
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could lead to user-assisted execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3275
reference_id
reference_type
scores
0
value 0.86225
scoring_system epss
scoring_elements 0.99407
published_at 2026-04-26T12:55:00Z
1
value 0.86225
scoring_system epss
scoring_elements 0.99397
published_at 2026-04-02T12:55:00Z
2
value 0.86225
scoring_system epss
scoring_elements 0.99398
published_at 2026-04-04T12:55:00Z
3
value 0.86225
scoring_system epss
scoring_elements 0.99399
published_at 2026-04-07T12:55:00Z
4
value 0.86225
scoring_system epss
scoring_elements 0.994
published_at 2026-04-08T12:55:00Z
5
value 0.86225
scoring_system epss
scoring_elements 0.99401
published_at 2026-04-09T12:55:00Z
6
value 0.86225
scoring_system epss
scoring_elements 0.99402
published_at 2026-04-11T12:55:00Z
7
value 0.86225
scoring_system epss
scoring_elements 0.99403
published_at 2026-04-13T12:55:00Z
8
value 0.86225
scoring_system epss
scoring_elements 0.99406
published_at 2026-05-07T12:55:00Z
9
value 0.86225
scoring_system epss
scoring_elements 0.99405
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3275
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3275
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3275
2
reference_url http://secunia.com/advisories/43826
reference_id
reference_type
scores
url http://secunia.com/advisories/43826
3
reference_url http://securityreason.com/securityalert/8162
reference_id
reference_type
scores
url http://securityreason.com/securityalert/8162
4
reference_url http://securitytracker.com/id?1025250
reference_id
reference_type
scores
url http://securitytracker.com/id?1025250
5
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/66259
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/66259
6
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14718
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14718
7
reference_url http://www.coresecurity.com/content/vlc-vulnerabilities-amv-nsv-files
reference_id
reference_type
scores
url http://www.coresecurity.com/content/vlc-vulnerabilities-amv-nsv-files
8
reference_url http://www.debian.org/security/2011/dsa-2211
reference_id
reference_type
scores
url http://www.debian.org/security/2011/dsa-2211
9
reference_url http://www.exploit-db.com/exploits/17048
reference_id
reference_type
scores
url http://www.exploit-db.com/exploits/17048
10
reference_url http://www.metasploit.com/modules/exploit/windows/browser/vlc_amv
reference_id
reference_type
scores
url http://www.metasploit.com/modules/exploit/windows/browser/vlc_amv
11
reference_url http://www.osvdb.org/71277
reference_id
reference_type
scores
url http://www.osvdb.org/71277
12
reference_url http://www.securityfocus.com/archive/1/517150/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/517150/100/0/threaded
13
reference_url http://www.securityfocus.com/bid/47012
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/47012
14
reference_url http://www.videolan.org/vlc/releases/1.1.8.html
reference_id
reference_type
scores
url http://www.videolan.org/vlc/releases/1.1.8.html
15
reference_url http://www.vupen.com/english/advisories/2011/0759
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0759
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99b:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99e:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99f:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99f:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99f:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99g:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99g:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99g:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99h:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99h:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99h:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99i:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99i:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99i:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.60:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.60:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.60:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.61:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.61:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.61:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.62:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.62:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.62:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.63:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.63:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.63:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.70:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.70:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.70:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.71:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.71:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.71:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.72:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.72:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.72:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.73:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.73:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.73:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.80:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.80:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.80:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.81:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.81:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.81:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.82:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.82:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.82:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.83:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.83:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.83:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.90:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.90:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.90:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.91:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.92:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.3.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.3.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.5:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.6:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.3:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.4:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.5:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.6:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.6.1:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3275
reference_id CVE-2010-3275
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-3275
87
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/17048.rb
reference_id CVE-2010-3275;OSVDB-71277
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/17048.rb
88
reference_url https://security.gentoo.org/glsa/201411-01
reference_id GLSA-201411-01
reference_type
scores
url https://security.gentoo.org/glsa/201411-01
fixed_packages
0
url pkg:deb/debian/vlc@1.1.8-1?distro=trixie
purl pkg:deb/debian/vlc@1.1.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@1.1.8-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2010-3275
risk_score 10.0
exploitability 2.0
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9fcx-1pdf-7ues
37
url VCID-9g9m-c8sc-vfcj
vulnerability_id VCID-9g9m-c8sc-vfcj
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could result in the arbitrary execution of code.
references
0
reference_url http://git.videolan.org/?p=vlc.git&a=search&h=refs/heads/master&st=commit&s=cve-2019
reference_id
reference_type
scores
url http://git.videolan.org/?p=vlc.git&a=search&h=refs/heads/master&st=commit&s=cve-2019
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00036.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00036.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00046.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00046.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-14777
reference_id
reference_type
scores
0
value 0.00307
scoring_system epss
scoring_elements 0.53927
published_at 2026-05-07T12:55:00Z
1
value 0.00307
scoring_system epss
scoring_elements 0.53884
published_at 2026-05-05T12:55:00Z
2
value 0.00307
scoring_system epss
scoring_elements 0.53879
published_at 2026-04-01T12:55:00Z
3
value 0.00307
scoring_system epss
scoring_elements 0.53897
published_at 2026-04-02T12:55:00Z
4
value 0.00307
scoring_system epss
scoring_elements 0.53925
published_at 2026-04-04T12:55:00Z
5
value 0.00307
scoring_system epss
scoring_elements 0.539
published_at 2026-04-07T12:55:00Z
6
value 0.00307
scoring_system epss
scoring_elements 0.53952
published_at 2026-04-08T12:55:00Z
7
value 0.00307
scoring_system epss
scoring_elements 0.53951
published_at 2026-04-09T12:55:00Z
8
value 0.00307
scoring_system epss
scoring_elements 0.53998
published_at 2026-04-11T12:55:00Z
9
value 0.00307
scoring_system epss
scoring_elements 0.53981
published_at 2026-04-12T12:55:00Z
10
value 0.00307
scoring_system epss
scoring_elements 0.53963
published_at 2026-04-13T12:55:00Z
11
value 0.00307
scoring_system epss
scoring_elements 0.54001
published_at 2026-04-16T12:55:00Z
12
value 0.00307
scoring_system epss
scoring_elements 0.54006
published_at 2026-04-18T12:55:00Z
13
value 0.00307
scoring_system epss
scoring_elements 0.53987
published_at 2026-04-21T12:55:00Z
14
value 0.00307
scoring_system epss
scoring_elements 0.53954
published_at 2026-04-24T12:55:00Z
15
value 0.00307
scoring_system epss
scoring_elements 0.53966
published_at 2026-04-26T12:55:00Z
16
value 0.00307
scoring_system epss
scoring_elements 0.53936
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-14777
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13602
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13962
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14437
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14438
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14438
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14498
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14533
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14534
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14534
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14535
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14535
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14776
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14777
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14778
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14970
16
reference_url https://seclists.org/bugtraq/2019/Aug/36
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Aug/36
17
reference_url https://www.debian.org/security/2019/dsa-4504
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4504
18
reference_url https://www.videolan.org/security/sb-vlc308.html
reference_id
reference_type
scores
url https://www.videolan.org/security/sb-vlc308.html
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:3.0.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:3.0.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:3.0.7.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-14777
reference_id CVE-2019-14777
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-14777
23
reference_url https://security.gentoo.org/glsa/201909-02
reference_id GLSA-201909-02
reference_type
scores
url https://security.gentoo.org/glsa/201909-02
24
reference_url https://usn.ubuntu.com/4131-1/
reference_id USN-4131-1
reference_type
scores
url https://usn.ubuntu.com/4131-1/
fixed_packages
0
url pkg:deb/debian/vlc@3.0.8-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.8-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2019-14777
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9g9m-c8sc-vfcj
38
url VCID-9je8-nsha-kug2
vulnerability_id VCID-9je8-nsha-kug2
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-19857
reference_id
reference_type
scores
0
value 0.01486
scoring_system epss
scoring_elements 0.8097
published_at 2026-04-01T12:55:00Z
1
value 0.01486
scoring_system epss
scoring_elements 0.80979
published_at 2026-04-02T12:55:00Z
2
value 0.01486
scoring_system epss
scoring_elements 0.81003
published_at 2026-04-04T12:55:00Z
3
value 0.01486
scoring_system epss
scoring_elements 0.81001
published_at 2026-04-07T12:55:00Z
4
value 0.01486
scoring_system epss
scoring_elements 0.81029
published_at 2026-04-08T12:55:00Z
5
value 0.01486
scoring_system epss
scoring_elements 0.81036
published_at 2026-04-09T12:55:00Z
6
value 0.01486
scoring_system epss
scoring_elements 0.81053
published_at 2026-04-11T12:55:00Z
7
value 0.01486
scoring_system epss
scoring_elements 0.8104
published_at 2026-04-12T12:55:00Z
8
value 0.01486
scoring_system epss
scoring_elements 0.81032
published_at 2026-04-13T12:55:00Z
9
value 0.01486
scoring_system epss
scoring_elements 0.8107
published_at 2026-04-16T12:55:00Z
10
value 0.01486
scoring_system epss
scoring_elements 0.81071
published_at 2026-04-18T12:55:00Z
11
value 0.01486
scoring_system epss
scoring_elements 0.81068
published_at 2026-04-21T12:55:00Z
12
value 0.01486
scoring_system epss
scoring_elements 0.81091
published_at 2026-04-24T12:55:00Z
13
value 0.01486
scoring_system epss
scoring_elements 0.81099
published_at 2026-04-26T12:55:00Z
14
value 0.01486
scoring_system epss
scoring_elements 0.81107
published_at 2026-04-29T12:55:00Z
15
value 0.01486
scoring_system epss
scoring_elements 0.81121
published_at 2026-05-05T12:55:00Z
16
value 0.01486
scoring_system epss
scoring_elements 0.81143
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-19857
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19857
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=915760
reference_id 915760
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=915760
3
reference_url https://usn.ubuntu.com/4074-1/
reference_id USN-4074-1
reference_type
scores
url https://usn.ubuntu.com/4074-1/
fixed_packages
0
url pkg:deb/debian/vlc@3.0.4-4?distro=trixie
purl pkg:deb/debian/vlc@3.0.4-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.4-4%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2018-19857
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9je8-nsha-kug2
39
url VCID-a1ca-kbgh-27f5
vulnerability_id VCID-a1ca-kbgh-27f5
summary
Multiple vulnerabilities in VLC may lead to the remote execution of
    arbitrary code.
references
0
reference_url http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=5f63f1562d43f32331006c2c1a61742de031b84d
reference_id
reference_type
scores
url http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=5f63f1562d43f32331006c2c1a61742de031b84d
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5032
reference_id
reference_type
scores
0
value 0.18203
scoring_system epss
scoring_elements 0.95231
published_at 2026-05-07T12:55:00Z
1
value 0.18203
scoring_system epss
scoring_elements 0.9516
published_at 2026-04-01T12:55:00Z
2
value 0.18203
scoring_system epss
scoring_elements 0.95171
published_at 2026-04-02T12:55:00Z
3
value 0.18203
scoring_system epss
scoring_elements 0.95172
published_at 2026-04-04T12:55:00Z
4
value 0.18203
scoring_system epss
scoring_elements 0.95176
published_at 2026-04-07T12:55:00Z
5
value 0.18203
scoring_system epss
scoring_elements 0.95183
published_at 2026-04-08T12:55:00Z
6
value 0.18203
scoring_system epss
scoring_elements 0.95187
published_at 2026-04-09T12:55:00Z
7
value 0.18203
scoring_system epss
scoring_elements 0.95193
published_at 2026-04-11T12:55:00Z
8
value 0.18203
scoring_system epss
scoring_elements 0.95194
published_at 2026-04-12T12:55:00Z
9
value 0.18203
scoring_system epss
scoring_elements 0.95197
published_at 2026-04-13T12:55:00Z
10
value 0.18203
scoring_system epss
scoring_elements 0.95204
published_at 2026-04-16T12:55:00Z
11
value 0.18203
scoring_system epss
scoring_elements 0.95208
published_at 2026-04-18T12:55:00Z
12
value 0.18203
scoring_system epss
scoring_elements 0.95209
published_at 2026-04-21T12:55:00Z
13
value 0.18203
scoring_system epss
scoring_elements 0.9521
published_at 2026-04-24T12:55:00Z
14
value 0.18203
scoring_system epss
scoring_elements 0.95212
published_at 2026-04-26T12:55:00Z
15
value 0.18203
scoring_system epss
scoring_elements 0.95211
published_at 2026-04-29T12:55:00Z
16
value 0.18203
scoring_system epss
scoring_elements 0.95225
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5032
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5032
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5032
3
reference_url http://secunia.com/advisories/32569
reference_id
reference_type
scores
url http://secunia.com/advisories/32569
4
reference_url http://secunia.com/advisories/33315
reference_id
reference_type
scores
url http://secunia.com/advisories/33315
5
reference_url http://security.gentoo.org/glsa/glsa-200812-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200812-24.xml
6
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/46375
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/46375
7
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14798
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14798
8
reference_url http://www.openwall.com/lists/oss-security/2008/11/05/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/11/05/4
9
reference_url http://www.openwall.com/lists/oss-security/2008/11/05/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/11/05/5
10
reference_url http://www.openwall.com/lists/oss-security/2008/11/10/13
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/11/10/13
11
reference_url http://www.securityfocus.com/archive/1/498112/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/498112/100/0/threaded
12
reference_url http://www.securityfocus.com/bid/32125
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32125
13
reference_url http://www.trapkit.de/advisories/TKADV2008-012.txt
reference_id
reference_type
scores
url http://www.trapkit.de/advisories/TKADV2008-012.txt
14
reference_url http://www.videolan.org/security/sa0810.html
reference_id
reference_type
scores
url http://www.videolan.org/security/sa0810.html
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504639
reference_id 504639
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504639
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.1a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.1a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.1a:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:test2:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.2:test2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:test2:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:test3:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.2:test3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:test3:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:test2:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.4:test2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:test2:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:test3:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.5:test3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:test3:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:test4:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.5:test4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:test4:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5032
reference_id CVE-2008-5032
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-5032
53
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/9686.py
reference_id CVE-2008-5032;OSVDB-49808
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/9686.py
54
reference_url https://security.gentoo.org/glsa/200812-24
reference_id GLSA-200812-24
reference_type
scores
url https://security.gentoo.org/glsa/200812-24
fixed_packages
0
url pkg:deb/debian/vlc@0.8.6.h-5?distro=trixie
purl pkg:deb/debian/vlc@0.8.6.h-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0.8.6.h-5%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2008-5032
risk_score 10.0
exploitability 2.0
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a1ca-kbgh-27f5
40
url VCID-b7as-3kmj-1udd
vulnerability_id VCID-b7as-3kmj-1udd
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-13428
reference_id
reference_type
scores
0
value 0.0692
scoring_system epss
scoring_elements 0.91358
published_at 2026-04-01T12:55:00Z
1
value 0.0692
scoring_system epss
scoring_elements 0.91363
published_at 2026-04-02T12:55:00Z
2
value 0.0692
scoring_system epss
scoring_elements 0.91374
published_at 2026-04-04T12:55:00Z
3
value 0.0692
scoring_system epss
scoring_elements 0.91381
published_at 2026-04-07T12:55:00Z
4
value 0.0692
scoring_system epss
scoring_elements 0.91393
published_at 2026-04-08T12:55:00Z
5
value 0.0692
scoring_system epss
scoring_elements 0.914
published_at 2026-04-09T12:55:00Z
6
value 0.0692
scoring_system epss
scoring_elements 0.91406
published_at 2026-04-11T12:55:00Z
7
value 0.0692
scoring_system epss
scoring_elements 0.91409
published_at 2026-04-12T12:55:00Z
8
value 0.0692
scoring_system epss
scoring_elements 0.91408
published_at 2026-04-13T12:55:00Z
9
value 0.0692
scoring_system epss
scoring_elements 0.91433
published_at 2026-04-16T12:55:00Z
10
value 0.0692
scoring_system epss
scoring_elements 0.91429
published_at 2026-04-18T12:55:00Z
11
value 0.0692
scoring_system epss
scoring_elements 0.9143
published_at 2026-04-21T12:55:00Z
12
value 0.0692
scoring_system epss
scoring_elements 0.91439
published_at 2026-04-24T12:55:00Z
13
value 0.0692
scoring_system epss
scoring_elements 0.91436
published_at 2026-04-29T12:55:00Z
14
value 0.0692
scoring_system epss
scoring_elements 0.9145
published_at 2026-05-05T12:55:00Z
15
value 0.0692
scoring_system epss
scoring_elements 0.91465
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-13428
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13428
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13428
2
reference_url https://usn.ubuntu.com/6180-1/
reference_id USN-6180-1
reference_type
scores
url https://usn.ubuntu.com/6180-1/
fixed_packages
0
url pkg:deb/debian/vlc@3.0.11-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.11-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2020-13428
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b7as-3kmj-1udd
41
url VCID-bbgn-7j2m-ykcx
vulnerability_id VCID-bbgn-7j2m-ykcx
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-5459
reference_id
reference_type
scores
0
value 0.01208
scoring_system epss
scoring_elements 0.7893
published_at 2026-04-01T12:55:00Z
1
value 0.01208
scoring_system epss
scoring_elements 0.78936
published_at 2026-04-02T12:55:00Z
2
value 0.01208
scoring_system epss
scoring_elements 0.78964
published_at 2026-04-04T12:55:00Z
3
value 0.01208
scoring_system epss
scoring_elements 0.78947
published_at 2026-04-07T12:55:00Z
4
value 0.01208
scoring_system epss
scoring_elements 0.78972
published_at 2026-04-08T12:55:00Z
5
value 0.01208
scoring_system epss
scoring_elements 0.78978
published_at 2026-04-09T12:55:00Z
6
value 0.01208
scoring_system epss
scoring_elements 0.79001
published_at 2026-04-21T12:55:00Z
7
value 0.01208
scoring_system epss
scoring_elements 0.78986
published_at 2026-04-12T12:55:00Z
8
value 0.01208
scoring_system epss
scoring_elements 0.78976
published_at 2026-04-13T12:55:00Z
9
value 0.01208
scoring_system epss
scoring_elements 0.79004
published_at 2026-04-16T12:55:00Z
10
value 0.01208
scoring_system epss
scoring_elements 0.79031
published_at 2026-04-24T12:55:00Z
11
value 0.01208
scoring_system epss
scoring_elements 0.79038
published_at 2026-04-26T12:55:00Z
12
value 0.01208
scoring_system epss
scoring_elements 0.79053
published_at 2026-04-29T12:55:00Z
13
value 0.01208
scoring_system epss
scoring_elements 0.79069
published_at 2026-05-05T12:55:00Z
14
value 0.01208
scoring_system epss
scoring_elements 0.79089
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-5459
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12874
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5439
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5439
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5459
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5459
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5460
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5460
fixed_packages
0
url pkg:deb/debian/vlc@3.0.7-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.7-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2019-5459
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bbgn-7j2m-ykcx
42
url VCID-bw2j-vv6p-gqew
vulnerability_id VCID-bw2j-vv6p-gqew
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-5460
reference_id
reference_type
scores
0
value 0.00931
scoring_system epss
scoring_elements 0.76054
published_at 2026-04-01T12:55:00Z
1
value 0.00931
scoring_system epss
scoring_elements 0.76056
published_at 2026-04-02T12:55:00Z
2
value 0.00931
scoring_system epss
scoring_elements 0.76089
published_at 2026-04-04T12:55:00Z
3
value 0.00931
scoring_system epss
scoring_elements 0.7607
published_at 2026-04-07T12:55:00Z
4
value 0.00931
scoring_system epss
scoring_elements 0.76103
published_at 2026-04-08T12:55:00Z
5
value 0.00931
scoring_system epss
scoring_elements 0.76117
published_at 2026-04-09T12:55:00Z
6
value 0.00931
scoring_system epss
scoring_elements 0.76142
published_at 2026-04-11T12:55:00Z
7
value 0.00931
scoring_system epss
scoring_elements 0.76118
published_at 2026-04-12T12:55:00Z
8
value 0.00931
scoring_system epss
scoring_elements 0.76115
published_at 2026-04-13T12:55:00Z
9
value 0.00931
scoring_system epss
scoring_elements 0.76156
published_at 2026-04-16T12:55:00Z
10
value 0.00931
scoring_system epss
scoring_elements 0.7616
published_at 2026-04-18T12:55:00Z
11
value 0.00931
scoring_system epss
scoring_elements 0.76143
published_at 2026-04-21T12:55:00Z
12
value 0.00931
scoring_system epss
scoring_elements 0.76182
published_at 2026-04-24T12:55:00Z
13
value 0.00931
scoring_system epss
scoring_elements 0.76192
published_at 2026-04-26T12:55:00Z
14
value 0.00931
scoring_system epss
scoring_elements 0.76204
published_at 2026-04-29T12:55:00Z
15
value 0.00931
scoring_system epss
scoring_elements 0.76214
published_at 2026-05-05T12:55:00Z
16
value 0.00931
scoring_system epss
scoring_elements 0.76244
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-5460
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12874
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5439
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5439
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5459
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5459
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5460
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5460
fixed_packages
0
url pkg:deb/debian/vlc@3.0.7-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.7-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2019-5460
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bw2j-vv6p-gqew
43
url VCID-bxs6-czfu-77dk
vulnerability_id VCID-bxs6-czfu-77dk
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could lead to user-assisted execution of arbitrary code.
references
0
reference_url http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=6568965770f906d34d4aef83237842a5376adb55
reference_id
reference_type
scores
url http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=6568965770f906d34d4aef83237842a5376adb55
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3907
reference_id
reference_type
scores
0
value 0.03698
scoring_system epss
scoring_elements 0.88013
published_at 2026-05-07T12:55:00Z
1
value 0.03698
scoring_system epss
scoring_elements 0.87893
published_at 2026-04-01T12:55:00Z
2
value 0.03698
scoring_system epss
scoring_elements 0.87903
published_at 2026-04-02T12:55:00Z
3
value 0.03698
scoring_system epss
scoring_elements 0.87917
published_at 2026-04-04T12:55:00Z
4
value 0.03698
scoring_system epss
scoring_elements 0.8792
published_at 2026-04-07T12:55:00Z
5
value 0.03698
scoring_system epss
scoring_elements 0.87941
published_at 2026-04-08T12:55:00Z
6
value 0.03698
scoring_system epss
scoring_elements 0.87947
published_at 2026-04-09T12:55:00Z
7
value 0.03698
scoring_system epss
scoring_elements 0.87958
published_at 2026-04-11T12:55:00Z
8
value 0.03698
scoring_system epss
scoring_elements 0.8795
published_at 2026-04-13T12:55:00Z
9
value 0.03698
scoring_system epss
scoring_elements 0.87964
published_at 2026-04-18T12:55:00Z
10
value 0.03698
scoring_system epss
scoring_elements 0.87963
published_at 2026-04-21T12:55:00Z
11
value 0.03698
scoring_system epss
scoring_elements 0.8798
published_at 2026-04-24T12:55:00Z
12
value 0.03698
scoring_system epss
scoring_elements 0.87987
published_at 2026-04-26T12:55:00Z
13
value 0.03698
scoring_system epss
scoring_elements 0.87986
published_at 2026-04-29T12:55:00Z
14
value 0.03698
scoring_system epss
scoring_elements 0.87998
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3907
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3907
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3907
3
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/64461
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/64461
4
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13950
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13950
5
reference_url http://www.cs.brown.edu/people/drosenbe/research.html
reference_id
reference_type
scores
url http://www.cs.brown.edu/people/drosenbe/research.html
6
reference_url http://www.securityfocus.com/bid/45632
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45632
7
reference_url http://www.videolan.org/security/sa1007.html
reference_id
reference_type
scores
url http://www.videolan.org/security/sa1007.html
8
reference_url http://www.vupen.com/english/advisories/2010/3345
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3345
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99b:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99e:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99f:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99f:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99f:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99g:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99g:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99g:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99h:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99h:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99h:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99i:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99i:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99i:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.60:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.60:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.60:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.61:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.61:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.61:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.62:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.62:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.62:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.63:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.63:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.63:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.70:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.70:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.70:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.71:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.71:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.71:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.72:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.72:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.72:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.73:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.73:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.73:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.80:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.80:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.80:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.81:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.81:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.81:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.82:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.82:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.82:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.83:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.83:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.83:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.90:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.90:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.90:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.91:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.92:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.3.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.3.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.3:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.4:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.5:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.6:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.3:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.4:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3907
reference_id CVE-2010-3907
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-3907
77
reference_url https://security.gentoo.org/glsa/201411-01
reference_id GLSA-201411-01
reference_type
scores
url https://security.gentoo.org/glsa/201411-01
fixed_packages
0
url pkg:deb/debian/vlc@1.1.3-1squeeze1?distro=trixie
purl pkg:deb/debian/vlc@1.1.3-1squeeze1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@1.1.3-1squeeze1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2010-3907
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bxs6-czfu-77dk
44
url VCID-cgzb-rvv6-77ga
vulnerability_id VCID-cgzb-rvv6-77ga
summary
xine-lib contains several vulnerabilities potentially allowing the
    execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-1476
reference_id
reference_type
scores
0
value 0.02053
scoring_system epss
scoring_elements 0.83811
published_at 2026-04-01T12:55:00Z
1
value 0.02053
scoring_system epss
scoring_elements 0.83824
published_at 2026-04-02T12:55:00Z
2
value 0.02053
scoring_system epss
scoring_elements 0.8384
published_at 2026-04-04T12:55:00Z
3
value 0.02053
scoring_system epss
scoring_elements 0.83842
published_at 2026-04-07T12:55:00Z
4
value 0.02053
scoring_system epss
scoring_elements 0.83865
published_at 2026-04-08T12:55:00Z
5
value 0.02053
scoring_system epss
scoring_elements 0.83871
published_at 2026-04-09T12:55:00Z
6
value 0.02053
scoring_system epss
scoring_elements 0.83888
published_at 2026-04-11T12:55:00Z
7
value 0.02053
scoring_system epss
scoring_elements 0.83881
published_at 2026-04-12T12:55:00Z
8
value 0.02053
scoring_system epss
scoring_elements 0.83877
published_at 2026-04-13T12:55:00Z
9
value 0.02053
scoring_system epss
scoring_elements 0.8391
published_at 2026-04-21T12:55:00Z
10
value 0.02053
scoring_system epss
scoring_elements 0.83936
published_at 2026-04-24T12:55:00Z
11
value 0.02053
scoring_system epss
scoring_elements 0.83943
published_at 2026-04-26T12:55:00Z
12
value 0.02053
scoring_system epss
scoring_elements 0.83948
published_at 2026-04-29T12:55:00Z
13
value 0.02053
scoring_system epss
scoring_elements 0.83971
published_at 2026-05-05T12:55:00Z
14
value 0.02053
scoring_system epss
scoring_elements 0.83993
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-1476
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1476
2
reference_url https://security.gentoo.org/glsa/200409-30
reference_id GLSA-200409-30
reference_type
scores
url https://security.gentoo.org/glsa/200409-30
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2004-1476
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cgzb-rvv6-77ga
45
url VCID-cq5y-qzyq-mkbm
vulnerability_id VCID-cq5y-qzyq-mkbm
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-47359
reference_id
reference_type
scores
0
value 0.00164
scoring_system epss
scoring_elements 0.37495
published_at 2026-04-02T12:55:00Z
1
value 0.00164
scoring_system epss
scoring_elements 0.37519
published_at 2026-04-04T12:55:00Z
2
value 0.00164
scoring_system epss
scoring_elements 0.37348
published_at 2026-04-07T12:55:00Z
3
value 0.00164
scoring_system epss
scoring_elements 0.37399
published_at 2026-04-08T12:55:00Z
4
value 0.00164
scoring_system epss
scoring_elements 0.37412
published_at 2026-04-09T12:55:00Z
5
value 0.00164
scoring_system epss
scoring_elements 0.37424
published_at 2026-04-11T12:55:00Z
6
value 0.00164
scoring_system epss
scoring_elements 0.37389
published_at 2026-04-12T12:55:00Z
7
value 0.00164
scoring_system epss
scoring_elements 0.37362
published_at 2026-04-13T12:55:00Z
8
value 0.00164
scoring_system epss
scoring_elements 0.37408
published_at 2026-04-16T12:55:00Z
9
value 0.00164
scoring_system epss
scoring_elements 0.3739
published_at 2026-04-18T12:55:00Z
10
value 0.00164
scoring_system epss
scoring_elements 0.37334
published_at 2026-04-21T12:55:00Z
11
value 0.00164
scoring_system epss
scoring_elements 0.37113
published_at 2026-04-24T12:55:00Z
12
value 0.00164
scoring_system epss
scoring_elements 0.37083
published_at 2026-04-26T12:55:00Z
13
value 0.00164
scoring_system epss
scoring_elements 0.36996
published_at 2026-04-29T12:55:00Z
14
value 0.00164
scoring_system epss
scoring_elements 0.36876
published_at 2026-05-05T12:55:00Z
15
value 0.00164
scoring_system epss
scoring_elements 0.36943
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-47359
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47359
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47360
3
reference_url https://usn.ubuntu.com/6783-1/
reference_id USN-6783-1
reference_type
scores
url https://usn.ubuntu.com/6783-1/
fixed_packages
0
url pkg:deb/debian/vlc@3.0.20-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.20-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.20-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.20-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.20-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.20-0%252Bdeb12u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.20-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.20-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.20-1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
7
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2023-47359
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cq5y-qzyq-mkbm
46
url VCID-cr56-z48y-v7fh
vulnerability_id VCID-cr56-z48y-v7fh
summary xine-lib contains an exploitable buffer overflow in the VCD handling code
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-1475
reference_id
reference_type
scores
0
value 0.05483
scoring_system epss
scoring_elements 0.90167
published_at 2026-04-01T12:55:00Z
1
value 0.05483
scoring_system epss
scoring_elements 0.90169
published_at 2026-04-02T12:55:00Z
2
value 0.05483
scoring_system epss
scoring_elements 0.90181
published_at 2026-04-04T12:55:00Z
3
value 0.05483
scoring_system epss
scoring_elements 0.90187
published_at 2026-04-07T12:55:00Z
4
value 0.05483
scoring_system epss
scoring_elements 0.90203
published_at 2026-04-08T12:55:00Z
5
value 0.05483
scoring_system epss
scoring_elements 0.90208
published_at 2026-04-09T12:55:00Z
6
value 0.05483
scoring_system epss
scoring_elements 0.90217
published_at 2026-04-11T12:55:00Z
7
value 0.05483
scoring_system epss
scoring_elements 0.90216
published_at 2026-04-12T12:55:00Z
8
value 0.05483
scoring_system epss
scoring_elements 0.90211
published_at 2026-04-13T12:55:00Z
9
value 0.05483
scoring_system epss
scoring_elements 0.90229
published_at 2026-04-18T12:55:00Z
10
value 0.05483
scoring_system epss
scoring_elements 0.90225
published_at 2026-04-21T12:55:00Z
11
value 0.05483
scoring_system epss
scoring_elements 0.90239
published_at 2026-04-26T12:55:00Z
12
value 0.05483
scoring_system epss
scoring_elements 0.90235
published_at 2026-04-29T12:55:00Z
13
value 0.05483
scoring_system epss
scoring_elements 0.90248
published_at 2026-05-05T12:55:00Z
14
value 0.05483
scoring_system epss
scoring_elements 0.90263
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-1475
1
reference_url https://security.gentoo.org/glsa/200408-18
reference_id GLSA-200408-18
reference_type
scores
url https://security.gentoo.org/glsa/200408-18
2
reference_url https://security.gentoo.org/glsa/200409-30
reference_id GLSA-200409-30
reference_type
scores
url https://security.gentoo.org/glsa/200409-30
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/386.c
reference_id OSVDB-10041;CVE-2004-1475
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/386.c
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2004-1475
risk_score null
exploitability 2.0
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cr56-z48y-v7fh
47
url VCID-czjq-xn4q-qye6
vulnerability_id VCID-czjq-xn4q-qye6
summary
Multiple vulnerabilities in xine-lib might result in the remote execution
    of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
1
reference_url http://osvdb.org/47677
reference_id
reference_type
scores
url http://osvdb.org/47677
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5246
reference_id
reference_type
scores
0
value 0.04348
scoring_system epss
scoring_elements 0.88997
published_at 2026-05-07T12:55:00Z
1
value 0.04348
scoring_system epss
scoring_elements 0.88889
published_at 2026-04-01T12:55:00Z
2
value 0.04348
scoring_system epss
scoring_elements 0.88898
published_at 2026-04-02T12:55:00Z
3
value 0.04348
scoring_system epss
scoring_elements 0.88914
published_at 2026-04-04T12:55:00Z
4
value 0.04348
scoring_system epss
scoring_elements 0.88916
published_at 2026-04-07T12:55:00Z
5
value 0.04348
scoring_system epss
scoring_elements 0.88934
published_at 2026-04-08T12:55:00Z
6
value 0.04348
scoring_system epss
scoring_elements 0.88939
published_at 2026-04-09T12:55:00Z
7
value 0.04348
scoring_system epss
scoring_elements 0.88951
published_at 2026-04-11T12:55:00Z
8
value 0.04348
scoring_system epss
scoring_elements 0.88945
published_at 2026-04-12T12:55:00Z
9
value 0.04348
scoring_system epss
scoring_elements 0.88944
published_at 2026-04-13T12:55:00Z
10
value 0.04348
scoring_system epss
scoring_elements 0.88957
published_at 2026-04-16T12:55:00Z
11
value 0.04348
scoring_system epss
scoring_elements 0.88955
published_at 2026-04-18T12:55:00Z
12
value 0.04348
scoring_system epss
scoring_elements 0.88952
published_at 2026-04-21T12:55:00Z
13
value 0.04348
scoring_system epss
scoring_elements 0.88969
published_at 2026-04-24T12:55:00Z
14
value 0.04348
scoring_system epss
scoring_elements 0.88976
published_at 2026-04-29T12:55:00Z
15
value 0.04348
scoring_system epss
scoring_elements 0.88983
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5246
3
reference_url http://securitytracker.com/id?1020703
reference_id
reference_type
scores
url http://securitytracker.com/id?1020703
4
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/44468
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/44468
5
reference_url http://sourceforge.net/project/shownotes.php?release_id=619869
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?release_id=619869
6
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:020
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:020
7
reference_url http://www.securityfocus.com/bid/30698
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/30698
8
reference_url http://www.vupen.com/english/advisories/2008/2382
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2382
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5246
reference_id CVE-2008-5246
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-5246
58
reference_url https://security.gentoo.org/glsa/201006-04
reference_id GLSA-201006-04
reference_type
scores
url https://security.gentoo.org/glsa/201006-04
59
reference_url https://usn.ubuntu.com/710-1/
reference_id USN-710-1
reference_type
scores
url https://usn.ubuntu.com/710-1/
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2008-5246
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-czjq-xn4q-qye6
48
url VCID-d9ab-kte8-pkhk
vulnerability_id VCID-d9ab-kte8-pkhk
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-25801
reference_id
reference_type
scores
0
value 0.02324
scoring_system epss
scoring_elements 0.84859
published_at 2026-04-24T12:55:00Z
1
value 0.02324
scoring_system epss
scoring_elements 0.84869
published_at 2026-04-26T12:55:00Z
2
value 0.02324
scoring_system epss
scoring_elements 0.84868
published_at 2026-04-29T12:55:00Z
3
value 0.02324
scoring_system epss
scoring_elements 0.84885
published_at 2026-05-05T12:55:00Z
4
value 0.02324
scoring_system epss
scoring_elements 0.84909
published_at 2026-05-07T12:55:00Z
5
value 0.02633
scoring_system epss
scoring_elements 0.85684
published_at 2026-04-09T12:55:00Z
6
value 0.02633
scoring_system epss
scoring_elements 0.85699
published_at 2026-04-11T12:55:00Z
7
value 0.02633
scoring_system epss
scoring_elements 0.85695
published_at 2026-04-12T12:55:00Z
8
value 0.02633
scoring_system epss
scoring_elements 0.85617
published_at 2026-04-01T12:55:00Z
9
value 0.02633
scoring_system epss
scoring_elements 0.85713
published_at 2026-04-16T12:55:00Z
10
value 0.02633
scoring_system epss
scoring_elements 0.85718
published_at 2026-04-18T12:55:00Z
11
value 0.02633
scoring_system epss
scoring_elements 0.85712
published_at 2026-04-21T12:55:00Z
12
value 0.02633
scoring_system epss
scoring_elements 0.85691
published_at 2026-04-13T12:55:00Z
13
value 0.02633
scoring_system epss
scoring_elements 0.85629
published_at 2026-04-02T12:55:00Z
14
value 0.02633
scoring_system epss
scoring_elements 0.85646
published_at 2026-04-04T12:55:00Z
15
value 0.02633
scoring_system epss
scoring_elements 0.85653
published_at 2026-04-07T12:55:00Z
16
value 0.02633
scoring_system epss
scoring_elements 0.85673
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-25801
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26664
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25801
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25802
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25803
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25804
6
reference_url https://usn.ubuntu.com/6180-1/
reference_id USN-6180-1
reference_type
scores
url https://usn.ubuntu.com/6180-1/
fixed_packages
0
url pkg:deb/debian/vlc@3.0.12-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.12-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2021-25801
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d9ab-kte8-pkhk
49
url VCID-dphy-1hau-gqgz
vulnerability_id VCID-dphy-1hau-gqgz
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could lead to user-assisted execution of arbitrary code.
references
0
reference_url http://git.videolan.org/?p=vlc/vlc-1.1.git%3Ba=blobdiff%3Bf=bin/winvlc.c%3Bh=ac9b97ca9f5f9ba001f13bf61eb5127a1c1dbcbf%3Bhp=2d09cba320e3b0def7069ce1ebab25d1340161c5%3Bhb=43a31df56c37bd62c691cdbe3c1f11babd164b56%3Bhpb=2d366da738b19f8d761d7084746c6db6f52808c6
reference_id
reference_type
scores
url http://git.videolan.org/?p=vlc/vlc-1.1.git%3Ba=blobdiff%3Bf=bin/winvlc.c%3Bh=ac9b97ca9f5f9ba001f13bf61eb5127a1c1dbcbf%3Bhp=2d09cba320e3b0def7069ce1ebab25d1340161c5%3Bhb=43a31df56c37bd62c691cdbe3c1f11babd164b56%3Bhpb=2d366da738b19f8d761d7084746c6db6f52808c6
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3124
reference_id
reference_type
scores
0
value 0.08392
scoring_system epss
scoring_elements 0.92352
published_at 2026-05-07T12:55:00Z
1
value 0.08392
scoring_system epss
scoring_elements 0.92283
published_at 2026-04-01T12:55:00Z
2
value 0.08392
scoring_system epss
scoring_elements 0.9229
published_at 2026-04-02T12:55:00Z
3
value 0.08392
scoring_system epss
scoring_elements 0.92295
published_at 2026-04-04T12:55:00Z
4
value 0.08392
scoring_system epss
scoring_elements 0.92298
published_at 2026-04-07T12:55:00Z
5
value 0.08392
scoring_system epss
scoring_elements 0.9231
published_at 2026-04-08T12:55:00Z
6
value 0.08392
scoring_system epss
scoring_elements 0.92314
published_at 2026-04-09T12:55:00Z
7
value 0.08392
scoring_system epss
scoring_elements 0.9232
published_at 2026-04-11T12:55:00Z
8
value 0.08392
scoring_system epss
scoring_elements 0.92321
published_at 2026-04-12T12:55:00Z
9
value 0.08392
scoring_system epss
scoring_elements 0.92319
published_at 2026-04-13T12:55:00Z
10
value 0.08392
scoring_system epss
scoring_elements 0.92332
published_at 2026-04-29T12:55:00Z
11
value 0.08392
scoring_system epss
scoring_elements 0.92331
published_at 2026-04-18T12:55:00Z
12
value 0.08392
scoring_system epss
scoring_elements 0.92336
published_at 2026-04-24T12:55:00Z
13
value 0.08392
scoring_system epss
scoring_elements 0.92337
published_at 2026-04-26T12:55:00Z
14
value 0.08392
scoring_system epss
scoring_elements 0.92341
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3124
2
reference_url http://secunia.com/advisories/41107
reference_id
reference_type
scores
url http://secunia.com/advisories/41107
3
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12190
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12190
4
reference_url http://www.exploit-db.com/exploits/14750
reference_id
reference_type
scores
url http://www.exploit-db.com/exploits/14750
5
reference_url http://www.openwall.com/lists/oss-security/2010/08/25/10
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/08/25/10
6
reference_url http://www.openwall.com/lists/oss-security/2010/08/25/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/08/25/9
7
reference_url http://www.vupen.com/english/advisories/2010/2172
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2172
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99b:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99e:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99f:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99f:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99f:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99g:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99g:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99g:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99h:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99h:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99h:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99i:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99i:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99i:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.60:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.60:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.60:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.61:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.61:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.61:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.62:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.62:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.62:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.63:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.63:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.63:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.70:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.70:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.70:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.71:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.71:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.71:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.72:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.72:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.72:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.73:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.73:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.73:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.80:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.80:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.80:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.81:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.81:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.81:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.82:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.82:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.82:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.83:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.83:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.83:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.90:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.90:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.90:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.91:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.92:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.3.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.3.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.3:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.5:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.6:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3124
reference_id CVE-2010-3124
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-3124
74
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/14750.txt
reference_id CVE-2010-3124;OSVDB-67492
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/14750.txt
75
reference_url https://security.gentoo.org/glsa/201411-01
reference_id GLSA-201411-01
reference_type
scores
url https://security.gentoo.org/glsa/201411-01
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2010-3124
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dphy-1hau-gqgz
50
url VCID-e91v-e9w2-xkgt
vulnerability_id VCID-e91v-e9w2-xkgt
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could lead to user-assisted execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1776
reference_id
reference_type
scores
0
value 0.03903
scoring_system epss
scoring_elements 0.88312
published_at 2026-04-24T12:55:00Z
1
value 0.03903
scoring_system epss
scoring_elements 0.88318
published_at 2026-04-26T12:55:00Z
2
value 0.03903
scoring_system epss
scoring_elements 0.8832
published_at 2026-04-29T12:55:00Z
3
value 0.03903
scoring_system epss
scoring_elements 0.88331
published_at 2026-05-05T12:55:00Z
4
value 0.03903
scoring_system epss
scoring_elements 0.88347
published_at 2026-05-07T12:55:00Z
5
value 0.05025
scoring_system epss
scoring_elements 0.89738
published_at 2026-04-09T12:55:00Z
6
value 0.05025
scoring_system epss
scoring_elements 0.89745
published_at 2026-04-11T12:55:00Z
7
value 0.05025
scoring_system epss
scoring_elements 0.89743
published_at 2026-04-12T12:55:00Z
8
value 0.05025
scoring_system epss
scoring_elements 0.89694
published_at 2026-04-01T12:55:00Z
9
value 0.05025
scoring_system epss
scoring_elements 0.89753
published_at 2026-04-18T12:55:00Z
10
value 0.05025
scoring_system epss
scoring_elements 0.89748
published_at 2026-04-21T12:55:00Z
11
value 0.05025
scoring_system epss
scoring_elements 0.89736
published_at 2026-04-13T12:55:00Z
12
value 0.05025
scoring_system epss
scoring_elements 0.89697
published_at 2026-04-02T12:55:00Z
13
value 0.05025
scoring_system epss
scoring_elements 0.89712
published_at 2026-04-04T12:55:00Z
14
value 0.05025
scoring_system epss
scoring_elements 0.89714
published_at 2026-04-07T12:55:00Z
15
value 0.05025
scoring_system epss
scoring_elements 0.89732
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1776
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1776
2
reference_url https://security.gentoo.org/glsa/201411-01
reference_id GLSA-201411-01
reference_type
scores
url https://security.gentoo.org/glsa/201411-01
fixed_packages
0
url pkg:deb/debian/vlc@2.0.1-1?distro=trixie
purl pkg:deb/debian/vlc@2.0.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@2.0.1-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2012-1776
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e91v-e9w2-xkgt
51
url VCID-eae7-384g-pqc4
vulnerability_id VCID-eae7-384g-pqc4
summary
Multiple vulnerabilities have been found in libmicrodns, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6080
reference_id
reference_type
scores
0
value 0.00311
scoring_system epss
scoring_elements 0.54238
published_at 2026-05-07T12:55:00Z
1
value 0.00311
scoring_system epss
scoring_elements 0.54245
published_at 2026-04-29T12:55:00Z
2
value 0.00311
scoring_system epss
scoring_elements 0.54195
published_at 2026-05-05T12:55:00Z
3
value 0.00311
scoring_system epss
scoring_elements 0.54184
published_at 2026-04-01T12:55:00Z
4
value 0.00311
scoring_system epss
scoring_elements 0.54204
published_at 2026-04-02T12:55:00Z
5
value 0.00311
scoring_system epss
scoring_elements 0.54234
published_at 2026-04-04T12:55:00Z
6
value 0.00311
scoring_system epss
scoring_elements 0.5421
published_at 2026-04-07T12:55:00Z
7
value 0.00311
scoring_system epss
scoring_elements 0.54262
published_at 2026-04-08T12:55:00Z
8
value 0.00311
scoring_system epss
scoring_elements 0.54257
published_at 2026-04-09T12:55:00Z
9
value 0.00311
scoring_system epss
scoring_elements 0.54306
published_at 2026-04-16T12:55:00Z
10
value 0.00311
scoring_system epss
scoring_elements 0.54289
published_at 2026-04-12T12:55:00Z
11
value 0.00311
scoring_system epss
scoring_elements 0.54268
published_at 2026-04-13T12:55:00Z
12
value 0.00311
scoring_system epss
scoring_elements 0.54311
published_at 2026-04-18T12:55:00Z
13
value 0.00311
scoring_system epss
scoring_elements 0.54291
published_at 2026-04-21T12:55:00Z
14
value 0.00311
scoring_system epss
scoring_elements 0.54254
published_at 2026-04-24T12:55:00Z
15
value 0.00311
scoring_system epss
scoring_elements 0.54269
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6080
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19721
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6071
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6071
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6072
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6072
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6073
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6077
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6078
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6079
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6080
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6080
9
reference_url https://talosintelligence.com/vulnerability_reports/TALOS-2020-1002
reference_id
reference_type
scores
url https://talosintelligence.com/vulnerability_reports/TALOS-2020-1002
10
reference_url https://www.debian.org/security/2020/dsa-4671
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4671
11
reference_url https://security.archlinux.org/ASA-202004-24
reference_id ASA-202004-24
reference_type
scores
url https://security.archlinux.org/ASA-202004-24
12
reference_url https://security.archlinux.org/AVG-1136
reference_id AVG-1136
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1136
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolabs:libmicrodns:0.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolabs:libmicrodns:0.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolabs:libmicrodns:0.1.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-6080
reference_id CVE-2020-6080
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-6080
17
reference_url https://security.gentoo.org/glsa/202005-10
reference_id GLSA-202005-10
reference_type
scores
url https://security.gentoo.org/glsa/202005-10
18
reference_url https://usn.ubuntu.com/7239-1/
reference_id USN-7239-1
reference_type
scores
url https://usn.ubuntu.com/7239-1/
fixed_packages
0
url pkg:deb/debian/vlc@3.0.8-4?distro=trixie
purl pkg:deb/debian/vlc@3.0.8-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.8-4%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2020-6080
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eae7-384g-pqc4
52
url VCID-ecyu-zuz8-u3ep
vulnerability_id VCID-ecyu-zuz8-u3ep
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could result in the arbitrary execution of code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-12874
reference_id
reference_type
scores
0
value 0.00932
scoring_system epss
scoring_elements 0.76219
published_at 2026-05-05T12:55:00Z
1
value 0.00932
scoring_system epss
scoring_elements 0.76249
published_at 2026-05-07T12:55:00Z
2
value 0.01349
scoring_system epss
scoring_elements 0.80057
published_at 2026-04-07T12:55:00Z
3
value 0.01349
scoring_system epss
scoring_elements 0.80085
published_at 2026-04-08T12:55:00Z
4
value 0.01349
scoring_system epss
scoring_elements 0.80093
published_at 2026-04-09T12:55:00Z
5
value 0.01349
scoring_system epss
scoring_elements 0.80113
published_at 2026-04-11T12:55:00Z
6
value 0.01349
scoring_system epss
scoring_elements 0.80097
published_at 2026-04-12T12:55:00Z
7
value 0.01349
scoring_system epss
scoring_elements 0.80069
published_at 2026-04-04T12:55:00Z
8
value 0.01349
scoring_system epss
scoring_elements 0.80148
published_at 2026-04-24T12:55:00Z
9
value 0.01349
scoring_system epss
scoring_elements 0.80155
published_at 2026-04-26T12:55:00Z
10
value 0.01349
scoring_system epss
scoring_elements 0.8017
published_at 2026-04-29T12:55:00Z
11
value 0.01349
scoring_system epss
scoring_elements 0.80088
published_at 2026-04-13T12:55:00Z
12
value 0.01349
scoring_system epss
scoring_elements 0.80118
published_at 2026-04-18T12:55:00Z
13
value 0.01349
scoring_system epss
scoring_elements 0.8012
published_at 2026-04-21T12:55:00Z
14
value 0.01375
scoring_system epss
scoring_elements 0.80189
published_at 2026-04-01T12:55:00Z
15
value 0.01375
scoring_system epss
scoring_elements 0.80197
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-12874
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12874
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5439
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5439
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5459
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5459
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5460
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5460
5
reference_url https://security.archlinux.org/ASA-201906-22
reference_id ASA-201906-22
reference_type
scores
url https://security.archlinux.org/ASA-201906-22
6
reference_url https://security.archlinux.org/AVG-998
reference_id AVG-998
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-998
7
reference_url https://security.gentoo.org/glsa/201908-23
reference_id GLSA-201908-23
reference_type
scores
url https://security.gentoo.org/glsa/201908-23
8
reference_url https://usn.ubuntu.com/4074-1/
reference_id USN-4074-1
reference_type
scores
url https://usn.ubuntu.com/4074-1/
fixed_packages
0
url pkg:deb/debian/vlc@3.0.7-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.7-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2019-12874
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ecyu-zuz8-u3ep
53
url VCID-ed2z-6wv2-y7ek
vulnerability_id VCID-ed2z-6wv2-y7ek
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could result in the arbitrary execution of code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-5439
reference_id
reference_type
scores
0
value 0.16265
scoring_system epss
scoring_elements 0.94792
published_at 2026-04-01T12:55:00Z
1
value 0.16265
scoring_system epss
scoring_elements 0.94842
published_at 2026-04-21T12:55:00Z
2
value 0.16265
scoring_system epss
scoring_elements 0.94844
published_at 2026-04-26T12:55:00Z
3
value 0.16265
scoring_system epss
scoring_elements 0.94845
published_at 2026-04-29T12:55:00Z
4
value 0.16265
scoring_system epss
scoring_elements 0.94801
published_at 2026-04-02T12:55:00Z
5
value 0.16265
scoring_system epss
scoring_elements 0.94805
published_at 2026-04-04T12:55:00Z
6
value 0.16265
scoring_system epss
scoring_elements 0.94807
published_at 2026-04-07T12:55:00Z
7
value 0.16265
scoring_system epss
scoring_elements 0.94816
published_at 2026-04-08T12:55:00Z
8
value 0.16265
scoring_system epss
scoring_elements 0.9482
published_at 2026-04-09T12:55:00Z
9
value 0.16265
scoring_system epss
scoring_elements 0.94824
published_at 2026-04-11T12:55:00Z
10
value 0.16265
scoring_system epss
scoring_elements 0.94827
published_at 2026-04-12T12:55:00Z
11
value 0.16265
scoring_system epss
scoring_elements 0.94829
published_at 2026-04-13T12:55:00Z
12
value 0.16265
scoring_system epss
scoring_elements 0.94835
published_at 2026-04-16T12:55:00Z
13
value 0.16265
scoring_system epss
scoring_elements 0.94839
published_at 2026-04-18T12:55:00Z
14
value 0.18766
scoring_system epss
scoring_elements 0.95326
published_at 2026-05-07T12:55:00Z
15
value 0.18766
scoring_system epss
scoring_elements 0.9532
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-5439
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12874
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5439
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5439
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5459
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5459
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5460
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5460
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930276
reference_id 930276
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930276
6
reference_url https://security.archlinux.org/ASA-201906-22
reference_id ASA-201906-22
reference_type
scores
url https://security.archlinux.org/ASA-201906-22
7
reference_url https://security.archlinux.org/AVG-998
reference_id AVG-998
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-998
8
reference_url https://security.gentoo.org/glsa/201908-23
reference_id GLSA-201908-23
reference_type
scores
url https://security.gentoo.org/glsa/201908-23
9
reference_url https://usn.ubuntu.com/4074-1/
reference_id USN-4074-1
reference_type
scores
url https://usn.ubuntu.com/4074-1/
fixed_packages
0
url pkg:deb/debian/vlc@3.0.7-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.7-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2019-5439
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ed2z-6wv2-y7ek
54
url VCID-ehcj-1d1g-kbcc
vulnerability_id VCID-ehcj-1d1g-kbcc
summary Buffer overflow in the AStreamPeekStream function in input/stream.c in VideoLAN VLC media player before 2.2.0 allows remote attackers to cause a denial of service (crash) via a crafted wav file, related to "seek across EOF."
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00045.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00045.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3941
reference_id
reference_type
scores
0
value 0.00307
scoring_system epss
scoring_elements 0.53868
published_at 2026-05-07T12:55:00Z
1
value 0.00307
scoring_system epss
scoring_elements 0.53824
published_at 2026-05-05T12:55:00Z
2
value 0.00307
scoring_system epss
scoring_elements 0.5382
published_at 2026-04-01T12:55:00Z
3
value 0.00307
scoring_system epss
scoring_elements 0.53839
published_at 2026-04-02T12:55:00Z
4
value 0.00307
scoring_system epss
scoring_elements 0.53867
published_at 2026-04-04T12:55:00Z
5
value 0.00307
scoring_system epss
scoring_elements 0.53841
published_at 2026-04-07T12:55:00Z
6
value 0.00307
scoring_system epss
scoring_elements 0.53892
published_at 2026-04-08T12:55:00Z
7
value 0.00307
scoring_system epss
scoring_elements 0.53891
published_at 2026-04-09T12:55:00Z
8
value 0.00307
scoring_system epss
scoring_elements 0.53937
published_at 2026-04-11T12:55:00Z
9
value 0.00307
scoring_system epss
scoring_elements 0.5392
published_at 2026-04-12T12:55:00Z
10
value 0.00307
scoring_system epss
scoring_elements 0.53903
published_at 2026-04-13T12:55:00Z
11
value 0.00307
scoring_system epss
scoring_elements 0.53941
published_at 2026-04-16T12:55:00Z
12
value 0.00307
scoring_system epss
scoring_elements 0.53947
published_at 2026-04-18T12:55:00Z
13
value 0.00307
scoring_system epss
scoring_elements 0.53929
published_at 2026-04-21T12:55:00Z
14
value 0.00307
scoring_system epss
scoring_elements 0.53895
published_at 2026-04-24T12:55:00Z
15
value 0.00307
scoring_system epss
scoring_elements 0.53906
published_at 2026-04-26T12:55:00Z
16
value 0.00307
scoring_system epss
scoring_elements 0.53874
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3941
2
reference_url https://bugs.launchpad.net/ubuntu/+source/vlc/+bug/1533633
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/+source/vlc/+bug/1533633
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3941
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3941
4
reference_url https://mailman.videolan.org/pipermail/vlc-commits/2015-January/028938.html
reference_id
reference_type
scores
url https://mailman.videolan.org/pipermail/vlc-commits/2015-January/028938.html
5
reference_url http://www.securitytracker.com/id/1035456
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035456
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3941
reference_id CVE-2016-3941
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-3941
fixed_packages
0
url pkg:deb/debian/vlc@2.2.0-1?distro=trixie
purl pkg:deb/debian/vlc@2.2.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@2.2.0-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2016-3941
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ehcj-1d1g-kbcc
55
url VCID-exyx-11dd-vyc7
vulnerability_id VCID-exyx-11dd-vyc7
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could lead to user-assisted execution of arbitrary code.
references
0
reference_url http://openwall.com/lists/oss-security/2011/03/02/3
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/02/3
1
reference_url http://openwall.com/lists/oss-security/2011/03/03/8
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/03/8
2
reference_url http://openwall.com/lists/oss-security/2011/03/03/9
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/03/9
3
reference_url http://openwall.com/lists/oss-security/2011/03/28/7
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/28/7
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1087
reference_id
reference_type
scores
0
value 0.09054
scoring_system epss
scoring_elements 0.92609
published_at 2026-04-01T12:55:00Z
1
value 0.09054
scoring_system epss
scoring_elements 0.92615
published_at 2026-04-02T12:55:00Z
2
value 0.09054
scoring_system epss
scoring_elements 0.92621
published_at 2026-04-07T12:55:00Z
3
value 0.09054
scoring_system epss
scoring_elements 0.92632
published_at 2026-04-08T12:55:00Z
4
value 0.09054
scoring_system epss
scoring_elements 0.92637
published_at 2026-04-09T12:55:00Z
5
value 0.09054
scoring_system epss
scoring_elements 0.92642
published_at 2026-04-12T12:55:00Z
6
value 0.09054
scoring_system epss
scoring_elements 0.92641
published_at 2026-04-13T12:55:00Z
7
value 0.09054
scoring_system epss
scoring_elements 0.92655
published_at 2026-04-16T12:55:00Z
8
value 0.11007
scoring_system epss
scoring_elements 0.93458
published_at 2026-04-26T12:55:00Z
9
value 0.11007
scoring_system epss
scoring_elements 0.93476
published_at 2026-05-07T12:55:00Z
10
value 0.11007
scoring_system epss
scoring_elements 0.93452
published_at 2026-04-18T12:55:00Z
11
value 0.11007
scoring_system epss
scoring_elements 0.93463
published_at 2026-05-05T12:55:00Z
12
value 0.11007
scoring_system epss
scoring_elements 0.93462
published_at 2026-04-24T12:55:00Z
13
value 0.11007
scoring_system epss
scoring_elements 0.93457
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1087
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1087
6
reference_url http://secunia.com/advisories/38853
reference_id
reference_type
scores
url http://secunia.com/advisories/38853
7
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14532
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14532
8
reference_url http://www.osvdb.org/62728
reference_id
reference_type
scores
url http://www.osvdb.org/62728
9
reference_url http://www.securityfocus.com/bid/38569
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/38569
10
reference_url http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4931.php
reference_id
reference_type
scores
url http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4931.php
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=616156
reference_id 616156
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=616156
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1087
reference_id CVE-2011-1087
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-1087
14
reference_url https://security.gentoo.org/glsa/201411-01
reference_id GLSA-201411-01
reference_type
scores
url https://security.gentoo.org/glsa/201411-01
fixed_packages
0
url pkg:deb/debian/vlc@1.1.10-1?distro=trixie
purl pkg:deb/debian/vlc@1.1.10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@1.1.10-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2011-1087
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-exyx-11dd-vyc7
56
url VCID-eymb-phr9-23ht
vulnerability_id VCID-eymb-phr9-23ht
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could lead to user-assisted execution of arbitrary code.
references
0
reference_url http://git.videolan.org/gitweb.cgi?p=vlc/vlc-1.1.git%3Ba=tag%3Bh=bb16813ddb61a53113c71bccc525559405785452
reference_id
reference_type
scores
url http://git.videolan.org/gitweb.cgi?p=vlc/vlc-1.1.git%3Ba=tag%3Bh=bb16813ddb61a53113c71bccc525559405785452
1
reference_url http://mailman.videolan.org/pipermail/vlc-devel/2011-January/078607.html
reference_id
reference_type
scores
url http://mailman.videolan.org/pipermail/vlc-devel/2011-January/078607.html
2
reference_url http://mailman.videolan.org/pipermail/vlc-devel/2011-January/078614.html
reference_id
reference_type
scores
url http://mailman.videolan.org/pipermail/vlc-devel/2011-January/078614.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0522
reference_id
reference_type
scores
0
value 0.66189
scoring_system epss
scoring_elements 0.98538
published_at 2026-05-07T12:55:00Z
1
value 0.66189
scoring_system epss
scoring_elements 0.98534
published_at 2026-04-29T12:55:00Z
2
value 0.6639
scoring_system epss
scoring_elements 0.98524
published_at 2026-04-07T12:55:00Z
3
value 0.6639
scoring_system epss
scoring_elements 0.98528
published_at 2026-04-08T12:55:00Z
4
value 0.6639
scoring_system epss
scoring_elements 0.98529
published_at 2026-04-09T12:55:00Z
5
value 0.6639
scoring_system epss
scoring_elements 0.9852
published_at 2026-04-01T12:55:00Z
6
value 0.6639
scoring_system epss
scoring_elements 0.98531
published_at 2026-04-13T12:55:00Z
7
value 0.6639
scoring_system epss
scoring_elements 0.98536
published_at 2026-04-16T12:55:00Z
8
value 0.6639
scoring_system epss
scoring_elements 0.98537
published_at 2026-04-21T12:55:00Z
9
value 0.6639
scoring_system epss
scoring_elements 0.98541
published_at 2026-04-24T12:55:00Z
10
value 0.6639
scoring_system epss
scoring_elements 0.9853
published_at 2026-04-12T12:55:00Z
11
value 0.6639
scoring_system epss
scoring_elements 0.98522
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0522
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0522
5
reference_url http://securityreason.com/securityalert/8064
reference_id
reference_type
scores
url http://securityreason.com/securityalert/8064
6
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/65029
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/65029
7
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12414
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12414
8
reference_url http://www.exploit-db.com/exploits/16108
reference_id
reference_type
scores
url http://www.exploit-db.com/exploits/16108
9
reference_url http://www.openwall.com/lists/oss-security/2011/01/25/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2011/01/25/7
10
reference_url http://www.openwall.com/lists/oss-security/2011/01/25/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2011/01/25/9
11
reference_url http://www.securityfocus.com/bid/46008
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46008
12
reference_url http://www.vupen.com/english/advisories/2011/0225
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0225
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.3:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.4:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.5:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.6:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0522
reference_id CVE-2011-0522
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2011-0522
21
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/16108.txt
reference_id CVE-2011-0522;OSVDB-72906;OSVDB-72905
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/16108.txt
22
reference_url https://security.gentoo.org/glsa/201411-01
reference_id GLSA-201411-01
reference_type
scores
url https://security.gentoo.org/glsa/201411-01
fixed_packages
0
url pkg:deb/debian/vlc@1.1.3-1squeeze2?distro=trixie
purl pkg:deb/debian/vlc@1.1.3-1squeeze2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@1.1.3-1squeeze2%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2011-0522
risk_score 10.0
exploitability 2.0
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eymb-phr9-23ht
57
url VCID-f75g-5ga6-7qgh
vulnerability_id VCID-f75g-5ga6-7qgh
summary codec\libpng_plugin.dll in VideoLAN VLC Media Player 2.1.3 allows remote attackers to cause a denial of service (crash) via a crafted .png file, as demonstrated by a png in a .wave file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3441
reference_id
reference_type
scores
0
value 0.07967
scoring_system epss
scoring_elements 0.92042
published_at 2026-04-01T12:55:00Z
1
value 0.07967
scoring_system epss
scoring_elements 0.92048
published_at 2026-04-02T12:55:00Z
2
value 0.07967
scoring_system epss
scoring_elements 0.92055
published_at 2026-04-04T12:55:00Z
3
value 0.07967
scoring_system epss
scoring_elements 0.9206
published_at 2026-04-07T12:55:00Z
4
value 0.07967
scoring_system epss
scoring_elements 0.92072
published_at 2026-04-08T12:55:00Z
5
value 0.07967
scoring_system epss
scoring_elements 0.92075
published_at 2026-04-13T12:55:00Z
6
value 0.07967
scoring_system epss
scoring_elements 0.92079
published_at 2026-04-12T12:55:00Z
7
value 0.07967
scoring_system epss
scoring_elements 0.92086
published_at 2026-04-26T12:55:00Z
8
value 0.07967
scoring_system epss
scoring_elements 0.92084
published_at 2026-04-18T12:55:00Z
9
value 0.07967
scoring_system epss
scoring_elements 0.92082
published_at 2026-04-21T12:55:00Z
10
value 0.07967
scoring_system epss
scoring_elements 0.92083
published_at 2026-04-29T12:55:00Z
11
value 0.07967
scoring_system epss
scoring_elements 0.92094
published_at 2026-05-05T12:55:00Z
12
value 0.07967
scoring_system epss
scoring_elements 0.92106
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3441
1
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/39177.py
reference_id CVE-2014-3441;OSVDB-106843
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/39177.py
2
reference_url https://www.securityfocus.com/bid/67315/info
reference_id CVE-2014-3441;OSVDB-106843
reference_type exploit
scores
url https://www.securityfocus.com/bid/67315/info
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2014-3441
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f75g-5ga6-7qgh
58
url VCID-f8gy-t4tp-8ugv
vulnerability_id VCID-f8gy-t4tp-8ugv
summary Buffer overflow in the open_aiff_file function in demux_aiff.c for xine-lib (libxine) 1-rc7 allows remote attackers to execute arbitrary code via a crafted AIFF file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-1300
reference_id
reference_type
scores
0
value 0.09687
scoring_system epss
scoring_elements 0.92959
published_at 2026-05-07T12:55:00Z
1
value 0.09687
scoring_system epss
scoring_elements 0.92892
published_at 2026-04-01T12:55:00Z
2
value 0.09687
scoring_system epss
scoring_elements 0.929
published_at 2026-04-02T12:55:00Z
3
value 0.09687
scoring_system epss
scoring_elements 0.92904
published_at 2026-04-07T12:55:00Z
4
value 0.09687
scoring_system epss
scoring_elements 0.92911
published_at 2026-04-08T12:55:00Z
5
value 0.09687
scoring_system epss
scoring_elements 0.92916
published_at 2026-04-09T12:55:00Z
6
value 0.09687
scoring_system epss
scoring_elements 0.92921
published_at 2026-04-11T12:55:00Z
7
value 0.09687
scoring_system epss
scoring_elements 0.92919
published_at 2026-04-12T12:55:00Z
8
value 0.09687
scoring_system epss
scoring_elements 0.9292
published_at 2026-04-13T12:55:00Z
9
value 0.09687
scoring_system epss
scoring_elements 0.92931
published_at 2026-04-16T12:55:00Z
10
value 0.09687
scoring_system epss
scoring_elements 0.92933
published_at 2026-04-18T12:55:00Z
11
value 0.09687
scoring_system epss
scoring_elements 0.92938
published_at 2026-04-21T12:55:00Z
12
value 0.09687
scoring_system epss
scoring_elements 0.92941
published_at 2026-04-24T12:55:00Z
13
value 0.09687
scoring_system epss
scoring_elements 0.92943
published_at 2026-04-26T12:55:00Z
14
value 0.09687
scoring_system epss
scoring_elements 0.92939
published_at 2026-04-29T12:55:00Z
15
value 0.09687
scoring_system epss
scoring_elements 0.92946
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-1300
1
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/18611
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/18611
2
reference_url http://tigger.uic.edu/~jlongs2/holes/xine-lib.txt
reference_id
reference_type
scores
url http://tigger.uic.edu/~jlongs2/holes/xine-lib.txt
3
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:011
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:011
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_rc7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc7:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2004-1300
reference_id CVE-2004-1300
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2004-1300
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/24978.txt
reference_id CVE-2004-1300;OSVDB-12474
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/24978.txt
7
reference_url https://www.securityfocus.com/bid/11969/info
reference_id CVE-2004-1300;OSVDB-12474
reference_type exploit
scores
url https://www.securityfocus.com/bid/11969/info
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2004-1300
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f8gy-t4tp-8ugv
59
url VCID-fdyp-w9g7-xkhb
vulnerability_id VCID-fdyp-w9g7-xkhb
summary Stack-based buffer overflow in VideoLAN VLC Media Player 0.8.6 allows user-assisted remote attackers to execute arbitrary code via an ogg file with a crafted Advanced SubStation Alpha Subtitle (.ass) file, probably involving the Dialogue field.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0364
reference_id
reference_type
scores
0
value 0.06665
scoring_system epss
scoring_elements 0.91169
published_at 2026-04-01T12:55:00Z
1
value 0.06665
scoring_system epss
scoring_elements 0.91175
published_at 2026-04-02T12:55:00Z
2
value 0.06665
scoring_system epss
scoring_elements 0.91183
published_at 2026-04-04T12:55:00Z
3
value 0.06665
scoring_system epss
scoring_elements 0.9119
published_at 2026-04-07T12:55:00Z
4
value 0.06665
scoring_system epss
scoring_elements 0.91203
published_at 2026-04-08T12:55:00Z
5
value 0.06665
scoring_system epss
scoring_elements 0.9121
published_at 2026-04-09T12:55:00Z
6
value 0.06665
scoring_system epss
scoring_elements 0.91217
published_at 2026-04-11T12:55:00Z
7
value 0.06665
scoring_system epss
scoring_elements 0.9122
published_at 2026-04-13T12:55:00Z
8
value 0.06665
scoring_system epss
scoring_elements 0.91244
published_at 2026-04-16T12:55:00Z
9
value 0.06665
scoring_system epss
scoring_elements 0.91243
published_at 2026-04-18T12:55:00Z
10
value 0.06665
scoring_system epss
scoring_elements 0.91245
published_at 2026-04-21T12:55:00Z
11
value 0.06665
scoring_system epss
scoring_elements 0.91255
published_at 2026-04-24T12:55:00Z
12
value 0.06665
scoring_system epss
scoring_elements 0.91254
published_at 2026-04-26T12:55:00Z
13
value 0.06665
scoring_system epss
scoring_elements 0.91253
published_at 2026-04-29T12:55:00Z
14
value 0.06665
scoring_system epss
scoring_elements 0.91269
published_at 2026-05-05T12:55:00Z
15
value 0.06665
scoring_system epss
scoring_elements 0.91286
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0364
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0364
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=458318
reference_id 458318
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=458318
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/11174.c
reference_id OSVDB-61895;CVE-2010-0364
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/11174.c
fixed_packages
0
url pkg:deb/debian/vlc@0.8.6.c-4.1?distro=trixie
purl pkg:deb/debian/vlc@0.8.6.c-4.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0.8.6.c-4.1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2010-0364
risk_score 0.2
exploitability 2.0
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fdyp-w9g7-xkhb
60
url VCID-fkhy-sgyz-cke9
vulnerability_id VCID-fkhy-sgyz-cke9
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could lead to user-assisted execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-3245
reference_id
reference_type
scores
0
value 0.01865
scoring_system epss
scoring_elements 0.82996
published_at 2026-04-01T12:55:00Z
1
value 0.01865
scoring_system epss
scoring_elements 0.83012
published_at 2026-04-02T12:55:00Z
2
value 0.01865
scoring_system epss
scoring_elements 0.83026
published_at 2026-04-04T12:55:00Z
3
value 0.01865
scoring_system epss
scoring_elements 0.83024
published_at 2026-04-07T12:55:00Z
4
value 0.01865
scoring_system epss
scoring_elements 0.83048
published_at 2026-04-08T12:55:00Z
5
value 0.01865
scoring_system epss
scoring_elements 0.83055
published_at 2026-04-09T12:55:00Z
6
value 0.01865
scoring_system epss
scoring_elements 0.83071
published_at 2026-04-11T12:55:00Z
7
value 0.01865
scoring_system epss
scoring_elements 0.83065
published_at 2026-04-12T12:55:00Z
8
value 0.01865
scoring_system epss
scoring_elements 0.83061
published_at 2026-04-13T12:55:00Z
9
value 0.01865
scoring_system epss
scoring_elements 0.83099
published_at 2026-04-16T12:55:00Z
10
value 0.01865
scoring_system epss
scoring_elements 0.831
published_at 2026-04-18T12:55:00Z
11
value 0.01865
scoring_system epss
scoring_elements 0.83103
published_at 2026-04-21T12:55:00Z
12
value 0.01865
scoring_system epss
scoring_elements 0.83126
published_at 2026-04-24T12:55:00Z
13
value 0.01865
scoring_system epss
scoring_elements 0.83134
published_at 2026-04-26T12:55:00Z
14
value 0.01865
scoring_system epss
scoring_elements 0.83141
published_at 2026-04-29T12:55:00Z
15
value 0.01865
scoring_system epss
scoring_elements 0.83165
published_at 2026-05-05T12:55:00Z
16
value 0.01865
scoring_system epss
scoring_elements 0.83187
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-3245
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3245
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3245
2
reference_url http://seclists.org/fulldisclosure/2013/Jul/71
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:20:26Z/
url http://seclists.org/fulldisclosure/2013/Jul/71
3
reference_url http://seclists.org/fulldisclosure/2013/Jul/77
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:20:26Z/
url http://seclists.org/fulldisclosure/2013/Jul/77
4
reference_url http://seclists.org/fulldisclosure/2013/Jul/79
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:20:26Z/
url http://seclists.org/fulldisclosure/2013/Jul/79
5
reference_url http://secunia.com/advisories/52956
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:20:26Z/
url http://secunia.com/advisories/52956
6
reference_url http://secunia.com/blog/372/
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:20:26Z/
url http://secunia.com/blog/372/
7
reference_url http://www.jbkempf.com/blog/post/2013/More-lies-from-Secunia
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:20:26Z/
url http://www.jbkempf.com/blog/post/2013/More-lies-from-Secunia
8
reference_url http://www.securityfocus.com/bid/61032
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T20:20:26Z/
url http://www.securityfocus.com/bid/61032
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:2.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.7:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-3245
reference_id CVE-2013-3245
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2013-3245
11
reference_url https://security.gentoo.org/glsa/201411-01
reference_id GLSA-201411-01
reference_type
scores
url https://security.gentoo.org/glsa/201411-01
fixed_packages
0
url pkg:deb/debian/vlc@2.0.7-1?distro=trixie
purl pkg:deb/debian/vlc@2.0.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@2.0.7-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2013-3245
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fkhy-sgyz-cke9
61
url VCID-g8tx-7ssq-pqb4
vulnerability_id VCID-g8tx-7ssq-pqb4
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-46461
reference_id
reference_type
scores
0
value 0.00353
scoring_system epss
scoring_elements 0.57624
published_at 2026-05-07T12:55:00Z
1
value 0.00353
scoring_system epss
scoring_elements 0.57623
published_at 2026-04-29T12:55:00Z
2
value 0.00353
scoring_system epss
scoring_elements 0.57579
published_at 2026-05-05T12:55:00Z
3
value 0.00353
scoring_system epss
scoring_elements 0.57634
published_at 2026-04-02T12:55:00Z
4
value 0.00353
scoring_system epss
scoring_elements 0.57656
published_at 2026-04-04T12:55:00Z
5
value 0.00353
scoring_system epss
scoring_elements 0.57632
published_at 2026-04-07T12:55:00Z
6
value 0.00353
scoring_system epss
scoring_elements 0.57686
published_at 2026-04-08T12:55:00Z
7
value 0.00353
scoring_system epss
scoring_elements 0.57689
published_at 2026-04-09T12:55:00Z
8
value 0.00353
scoring_system epss
scoring_elements 0.57704
published_at 2026-04-11T12:55:00Z
9
value 0.00353
scoring_system epss
scoring_elements 0.57683
published_at 2026-04-12T12:55:00Z
10
value 0.00353
scoring_system epss
scoring_elements 0.57663
published_at 2026-04-13T12:55:00Z
11
value 0.00353
scoring_system epss
scoring_elements 0.57692
published_at 2026-04-16T12:55:00Z
12
value 0.00353
scoring_system epss
scoring_elements 0.57688
published_at 2026-04-18T12:55:00Z
13
value 0.00353
scoring_system epss
scoring_elements 0.57667
published_at 2026-04-21T12:55:00Z
14
value 0.00353
scoring_system epss
scoring_elements 0.57625
published_at 2026-04-24T12:55:00Z
15
value 0.00353
scoring_system epss
scoring_elements 0.57644
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-46461
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46461
2
reference_url https://www.videolan.org/security/sb-vlc3021.html
reference_id sb-vlc3021.html
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T15:37:59Z/
url https://www.videolan.org/security/sb-vlc3021.html
3
reference_url https://usn.ubuntu.com/7243-1/
reference_id USN-7243-1
reference_type
scores
url https://usn.ubuntu.com/7243-1/
fixed_packages
0
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb12u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.21-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
6
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2024-46461
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g8tx-7ssq-pqb4
62
url VCID-gh5m-y7mb-rkgf
vulnerability_id VCID-gh5m-y7mb-rkgf
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could result in the arbitrary execution of code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-13602
reference_id
reference_type
scores
0
value 0.00537
scoring_system epss
scoring_elements 0.67603
published_at 2026-05-07T12:55:00Z
1
value 0.00537
scoring_system epss
scoring_elements 0.67586
published_at 2026-04-29T12:55:00Z
2
value 0.00537
scoring_system epss
scoring_elements 0.6756
published_at 2026-05-05T12:55:00Z
3
value 0.00548
scoring_system epss
scoring_elements 0.67895
published_at 2026-04-08T12:55:00Z
4
value 0.00548
scoring_system epss
scoring_elements 0.67908
published_at 2026-04-09T12:55:00Z
5
value 0.00548
scoring_system epss
scoring_elements 0.67932
published_at 2026-04-11T12:55:00Z
6
value 0.00548
scoring_system epss
scoring_elements 0.67919
published_at 2026-04-12T12:55:00Z
7
value 0.00548
scoring_system epss
scoring_elements 0.67821
published_at 2026-04-01T12:55:00Z
8
value 0.00548
scoring_system epss
scoring_elements 0.6792
published_at 2026-04-16T12:55:00Z
9
value 0.00548
scoring_system epss
scoring_elements 0.67933
published_at 2026-04-18T12:55:00Z
10
value 0.00548
scoring_system epss
scoring_elements 0.67913
published_at 2026-04-21T12:55:00Z
11
value 0.00548
scoring_system epss
scoring_elements 0.67958
published_at 2026-04-24T12:55:00Z
12
value 0.00548
scoring_system epss
scoring_elements 0.67967
published_at 2026-04-26T12:55:00Z
13
value 0.00548
scoring_system epss
scoring_elements 0.67883
published_at 2026-04-13T12:55:00Z
14
value 0.00548
scoring_system epss
scoring_elements 0.67845
published_at 2026-04-07T12:55:00Z
15
value 0.00548
scoring_system epss
scoring_elements 0.67864
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-13602
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13602
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13962
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14437
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14438
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14438
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14498
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14533
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14534
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14534
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14535
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14535
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14776
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14777
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14778
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14970
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=932131
reference_id 932131
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=932131
15
reference_url https://security.gentoo.org/glsa/201909-02
reference_id GLSA-201909-02
reference_type
scores
url https://security.gentoo.org/glsa/201909-02
16
reference_url https://usn.ubuntu.com/4074-1/
reference_id USN-4074-1
reference_type
scores
url https://usn.ubuntu.com/4074-1/
fixed_packages
0
url pkg:deb/debian/vlc@3.0.7.1-2?distro=trixie
purl pkg:deb/debian/vlc@3.0.7.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.7.1-2%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2019-13602
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gh5m-y7mb-rkgf
63
url VCID-gmxm-6t1r-qkd9
vulnerability_id VCID-gmxm-6t1r-qkd9
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could lead to user-assisted execution of arbitrary code.
references
0
reference_url http://openwall.com/lists/oss-security/2010/04/28/4
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/04/28/4
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1442
reference_id
reference_type
scores
0
value 0.0182
scoring_system epss
scoring_elements 0.82983
published_at 2026-05-07T12:55:00Z
1
value 0.0182
scoring_system epss
scoring_elements 0.82802
published_at 2026-04-01T12:55:00Z
2
value 0.0182
scoring_system epss
scoring_elements 0.82818
published_at 2026-04-02T12:55:00Z
3
value 0.0182
scoring_system epss
scoring_elements 0.82832
published_at 2026-04-04T12:55:00Z
4
value 0.0182
scoring_system epss
scoring_elements 0.82827
published_at 2026-04-07T12:55:00Z
5
value 0.0182
scoring_system epss
scoring_elements 0.82852
published_at 2026-04-08T12:55:00Z
6
value 0.0182
scoring_system epss
scoring_elements 0.82859
published_at 2026-04-09T12:55:00Z
7
value 0.0182
scoring_system epss
scoring_elements 0.82875
published_at 2026-04-11T12:55:00Z
8
value 0.0182
scoring_system epss
scoring_elements 0.8287
published_at 2026-04-12T12:55:00Z
9
value 0.0182
scoring_system epss
scoring_elements 0.82866
published_at 2026-04-13T12:55:00Z
10
value 0.0182
scoring_system epss
scoring_elements 0.82905
published_at 2026-04-16T12:55:00Z
11
value 0.0182
scoring_system epss
scoring_elements 0.82904
published_at 2026-04-18T12:55:00Z
12
value 0.0182
scoring_system epss
scoring_elements 0.82906
published_at 2026-04-21T12:55:00Z
13
value 0.0182
scoring_system epss
scoring_elements 0.82928
published_at 2026-04-24T12:55:00Z
14
value 0.0182
scoring_system epss
scoring_elements 0.82937
published_at 2026-04-26T12:55:00Z
15
value 0.0182
scoring_system epss
scoring_elements 0.82941
published_at 2026-04-29T12:55:00Z
16
value 0.0182
scoring_system epss
scoring_elements 0.82962
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1442
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1442
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1442
3
reference_url http://www.videolan.org/security/sa1003.html
reference_id
reference_type
scores
url http://www.videolan.org/security/sa1003.html
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1337:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.1337:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1337:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-1442
reference_id CVE-2010-1442
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-1442
49
reference_url https://security.gentoo.org/glsa/201411-01
reference_id GLSA-201411-01
reference_type
scores
url https://security.gentoo.org/glsa/201411-01
fixed_packages
0
url pkg:deb/debian/vlc@1.0.6-1?distro=trixie
purl pkg:deb/debian/vlc@1.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@1.0.6-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2010-1442
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gmxm-6t1r-qkd9
64
url VCID-h5s9-fa77-pyc6
vulnerability_id VCID-h5s9-fa77-pyc6
summary
Multiple vulnerabilities were found in VLC, allowing for the execution of
    arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1769
reference_id
reference_type
scores
0
value 0.26634
scoring_system epss
scoring_elements 0.96299
published_at 2026-04-01T12:55:00Z
1
value 0.26634
scoring_system epss
scoring_elements 0.96307
published_at 2026-04-02T12:55:00Z
2
value 0.26634
scoring_system epss
scoring_elements 0.96315
published_at 2026-04-04T12:55:00Z
3
value 0.26634
scoring_system epss
scoring_elements 0.96319
published_at 2026-04-07T12:55:00Z
4
value 0.26634
scoring_system epss
scoring_elements 0.96327
published_at 2026-04-08T12:55:00Z
5
value 0.26634
scoring_system epss
scoring_elements 0.9633
published_at 2026-04-09T12:55:00Z
6
value 0.26634
scoring_system epss
scoring_elements 0.96334
published_at 2026-04-12T12:55:00Z
7
value 0.26634
scoring_system epss
scoring_elements 0.96337
published_at 2026-04-13T12:55:00Z
8
value 0.26634
scoring_system epss
scoring_elements 0.96346
published_at 2026-04-16T12:55:00Z
9
value 0.26634
scoring_system epss
scoring_elements 0.9635
published_at 2026-04-18T12:55:00Z
10
value 0.26634
scoring_system epss
scoring_elements 0.96351
published_at 2026-04-21T12:55:00Z
11
value 0.26634
scoring_system epss
scoring_elements 0.96353
published_at 2026-04-24T12:55:00Z
12
value 0.26634
scoring_system epss
scoring_elements 0.96354
published_at 2026-04-29T12:55:00Z
13
value 0.26634
scoring_system epss
scoring_elements 0.96364
published_at 2026-05-05T12:55:00Z
14
value 0.26634
scoring_system epss
scoring_elements 0.96369
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1769
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1769
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1769
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=478140
reference_id 478140
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=478140
3
reference_url https://security.gentoo.org/glsa/200804-25
reference_id GLSA-200804-25
reference_type
scores
url https://security.gentoo.org/glsa/200804-25
fixed_packages
0
url pkg:deb/debian/vlc@0.8.6.e-2.1?distro=trixie
purl pkg:deb/debian/vlc@0.8.6.e-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0.8.6.e-2.1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2008-1769
risk_score 0.4
exploitability 2.0
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h5s9-fa77-pyc6
65
url VCID-h7rr-z9zz-p7hr
vulnerability_id VCID-h7rr-z9zz-p7hr
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could lead to user-assisted execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1775
reference_id
reference_type
scores
0
value 0.72888
scoring_system epss
scoring_elements 0.98767
published_at 2026-04-01T12:55:00Z
1
value 0.72888
scoring_system epss
scoring_elements 0.98768
published_at 2026-04-02T12:55:00Z
2
value 0.72888
scoring_system epss
scoring_elements 0.98771
published_at 2026-04-04T12:55:00Z
3
value 0.72888
scoring_system epss
scoring_elements 0.98773
published_at 2026-04-07T12:55:00Z
4
value 0.72888
scoring_system epss
scoring_elements 0.98774
published_at 2026-04-09T12:55:00Z
5
value 0.72888
scoring_system epss
scoring_elements 0.98776
published_at 2026-04-11T12:55:00Z
6
value 0.72888
scoring_system epss
scoring_elements 0.98777
published_at 2026-04-12T12:55:00Z
7
value 0.72888
scoring_system epss
scoring_elements 0.98778
published_at 2026-04-13T12:55:00Z
8
value 0.72888
scoring_system epss
scoring_elements 0.98782
published_at 2026-04-18T12:55:00Z
9
value 0.72888
scoring_system epss
scoring_elements 0.98784
published_at 2026-04-21T12:55:00Z
10
value 0.72888
scoring_system epss
scoring_elements 0.98787
published_at 2026-04-24T12:55:00Z
11
value 0.72888
scoring_system epss
scoring_elements 0.98789
published_at 2026-04-29T12:55:00Z
12
value 0.72888
scoring_system epss
scoring_elements 0.98794
published_at 2026-05-05T12:55:00Z
13
value 0.72888
scoring_system epss
scoring_elements 0.98795
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1775
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1775
2
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/18825.rb
reference_id CVE-2012-1775;OSVDB-80188
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/18825.rb
3
reference_url https://security.gentoo.org/glsa/201411-01
reference_id GLSA-201411-01
reference_type
scores
url https://security.gentoo.org/glsa/201411-01
fixed_packages
0
url pkg:deb/debian/vlc@2.0.1-1?distro=trixie
purl pkg:deb/debian/vlc@2.0.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@2.0.1-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2012-1775
risk_score 1.4
exploitability 2.0
weighted_severity 0.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h7rr-z9zz-p7hr
66
url VCID-h7tu-k4wc-gbhz
vulnerability_id VCID-h7tu-k4wc-gbhz
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-25802
reference_id
reference_type
scores
0
value 0.00282
scoring_system epss
scoring_elements 0.51496
published_at 2026-04-01T12:55:00Z
1
value 0.00282
scoring_system epss
scoring_elements 0.51547
published_at 2026-04-02T12:55:00Z
2
value 0.00282
scoring_system epss
scoring_elements 0.51574
published_at 2026-04-04T12:55:00Z
3
value 0.00282
scoring_system epss
scoring_elements 0.51536
published_at 2026-05-07T12:55:00Z
4
value 0.00282
scoring_system epss
scoring_elements 0.5159
published_at 2026-04-08T12:55:00Z
5
value 0.00282
scoring_system epss
scoring_elements 0.51586
published_at 2026-04-09T12:55:00Z
6
value 0.00282
scoring_system epss
scoring_elements 0.51636
published_at 2026-04-11T12:55:00Z
7
value 0.00282
scoring_system epss
scoring_elements 0.51615
published_at 2026-04-12T12:55:00Z
8
value 0.00282
scoring_system epss
scoring_elements 0.51599
published_at 2026-04-13T12:55:00Z
9
value 0.00282
scoring_system epss
scoring_elements 0.5164
published_at 2026-04-16T12:55:00Z
10
value 0.00282
scoring_system epss
scoring_elements 0.51647
published_at 2026-04-18T12:55:00Z
11
value 0.00282
scoring_system epss
scoring_elements 0.51626
published_at 2026-04-21T12:55:00Z
12
value 0.00282
scoring_system epss
scoring_elements 0.51577
published_at 2026-04-24T12:55:00Z
13
value 0.00282
scoring_system epss
scoring_elements 0.51583
published_at 2026-04-26T12:55:00Z
14
value 0.00282
scoring_system epss
scoring_elements 0.51543
published_at 2026-04-29T12:55:00Z
15
value 0.00282
scoring_system epss
scoring_elements 0.51487
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-25802
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26664
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25801
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25802
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25803
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25804
6
reference_url https://usn.ubuntu.com/6180-1/
reference_id USN-6180-1
reference_type
scores
url https://usn.ubuntu.com/6180-1/
fixed_packages
0
url pkg:deb/debian/vlc@3.0.12-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.12-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2021-25802
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h7tu-k4wc-gbhz
67
url VCID-h7w3-pwwq-dfdd
vulnerability_id VCID-h7w3-pwwq-dfdd
summary
VLC media player improperly handles format strings, allowing for the
    execution of arbitrary code.
references
0
reference_url http://applefun.blogspot.com/2007/01/moab-02-01-2007-vlc-media-player-udp.html
reference_id
reference_type
scores
url http://applefun.blogspot.com/2007/01/moab-02-01-2007-vlc-media-player-udp.html
1
reference_url http://landonf.bikemonkey.org/code/macosx/MOAB_Day_2.20070103045559.6753.timor.html
reference_id
reference_type
scores
url http://landonf.bikemonkey.org/code/macosx/MOAB_Day_2.20070103045559.6753.timor.html
2
reference_url http://osvdb.org/31163
reference_id
reference_type
scores
url http://osvdb.org/31163
3
reference_url http://projects.info-pull.com/moab/MOAB-02-01-2007.html
reference_id
reference_type
scores
url http://projects.info-pull.com/moab/MOAB-02-01-2007.html
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-0017
reference_id
reference_type
scores
0
value 0.51215
scoring_system epss
scoring_elements 0.97894
published_at 2026-05-07T12:55:00Z
1
value 0.51215
scoring_system epss
scoring_elements 0.97858
published_at 2026-04-01T12:55:00Z
2
value 0.51215
scoring_system epss
scoring_elements 0.97864
published_at 2026-04-02T12:55:00Z
3
value 0.51215
scoring_system epss
scoring_elements 0.97865
published_at 2026-04-04T12:55:00Z
4
value 0.51215
scoring_system epss
scoring_elements 0.97869
published_at 2026-04-07T12:55:00Z
5
value 0.51215
scoring_system epss
scoring_elements 0.97873
published_at 2026-04-08T12:55:00Z
6
value 0.51215
scoring_system epss
scoring_elements 0.97876
published_at 2026-04-09T12:55:00Z
7
value 0.51215
scoring_system epss
scoring_elements 0.97879
published_at 2026-04-11T12:55:00Z
8
value 0.51215
scoring_system epss
scoring_elements 0.9788
published_at 2026-04-12T12:55:00Z
9
value 0.51215
scoring_system epss
scoring_elements 0.97881
published_at 2026-04-13T12:55:00Z
10
value 0.51215
scoring_system epss
scoring_elements 0.97888
published_at 2026-04-21T12:55:00Z
11
value 0.51215
scoring_system epss
scoring_elements 0.97889
published_at 2026-04-18T12:55:00Z
12
value 0.51215
scoring_system epss
scoring_elements 0.97886
published_at 2026-04-24T12:55:00Z
13
value 0.51215
scoring_system epss
scoring_elements 0.97887
published_at 2026-04-26T12:55:00Z
14
value 0.51215
scoring_system epss
scoring_elements 0.97891
published_at 2026-04-29T12:55:00Z
15
value 0.51215
scoring_system epss
scoring_elements 0.97895
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-0017
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0017
6
reference_url http://secunia.com/advisories/23592
reference_id
reference_type
scores
url http://secunia.com/advisories/23592
7
reference_url http://secunia.com/advisories/23829
reference_id
reference_type
scores
url http://secunia.com/advisories/23829
8
reference_url http://secunia.com/advisories/23910
reference_id
reference_type
scores
url http://secunia.com/advisories/23910
9
reference_url http://secunia.com/advisories/23971
reference_id
reference_type
scores
url http://secunia.com/advisories/23971
10
reference_url http://security.gentoo.org/glsa/glsa-200701-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200701-24.xml
11
reference_url http://securitytracker.com/id?1017464
reference_id
reference_type
scores
url http://securitytracker.com/id?1017464
12
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/31226
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/31226
13
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14313
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14313
14
reference_url http://trac.videolan.org/vlc/changeset/18481
reference_id
reference_type
scores
url http://trac.videolan.org/vlc/changeset/18481
15
reference_url http://www.debian.org/security/2007/dsa-1252
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1252
16
reference_url http://www.novell.com/linux/security/advisories/2007_13_xine.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_13_xine.html
17
reference_url http://www.securityfocus.com/bid/21852
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/21852
18
reference_url http://www.via.ecp.fr/via/ml/vlc-devel/2007-01/msg00005.html
reference_id
reference_type
scores
url http://www.via.ecp.fr/via/ml/vlc-devel/2007-01/msg00005.html
19
reference_url http://www.videolan.org/patches/vlc-0.8.6-MOAB-02-01-2007.patch
reference_id
reference_type
scores
url http://www.videolan.org/patches/vlc-0.8.6-MOAB-02-01-2007.patch
20
reference_url http://www.videolan.org/sa0701.html
reference_id
reference_type
scores
url http://www.videolan.org/sa0701.html
21
reference_url http://www.vupen.com/english/advisories/2007/0026
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0026
22
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=405425
reference_id 405425
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=405425
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
33
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/osx/dos/3069.pl
reference_id CVE-2007-0017
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/osx/dos/3069.pl
34
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/osx/local/3070.pl
reference_id CVE-2007-0017
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/osx/local/3070.pl
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-0017
reference_id CVE-2007-0017
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-0017
36
reference_url https://security.gentoo.org/glsa/200701-24
reference_id GLSA-200701-24
reference_type
scores
url https://security.gentoo.org/glsa/200701-24
fixed_packages
0
url pkg:deb/debian/vlc@0.8.6-svn20061012.debian-1.2?distro=trixie
purl pkg:deb/debian/vlc@0.8.6-svn20061012.debian-1.2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0.8.6-svn20061012.debian-1.2%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2007-0017
risk_score 10.0
exploitability 2.0
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h7w3-pwwq-dfdd
68
url VCID-h9ks-v96k-wkf7
vulnerability_id VCID-h9ks-v96k-wkf7
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6933
reference_id
reference_type
scores
0
value 0.03355
scoring_system epss
scoring_elements 0.87278
published_at 2026-04-01T12:55:00Z
1
value 0.03355
scoring_system epss
scoring_elements 0.87288
published_at 2026-04-02T12:55:00Z
2
value 0.03355
scoring_system epss
scoring_elements 0.87304
published_at 2026-04-04T12:55:00Z
3
value 0.03355
scoring_system epss
scoring_elements 0.87303
published_at 2026-04-07T12:55:00Z
4
value 0.03355
scoring_system epss
scoring_elements 0.87322
published_at 2026-04-08T12:55:00Z
5
value 0.03355
scoring_system epss
scoring_elements 0.87329
published_at 2026-04-09T12:55:00Z
6
value 0.03355
scoring_system epss
scoring_elements 0.87342
published_at 2026-04-11T12:55:00Z
7
value 0.03355
scoring_system epss
scoring_elements 0.87336
published_at 2026-04-12T12:55:00Z
8
value 0.03355
scoring_system epss
scoring_elements 0.87332
published_at 2026-04-13T12:55:00Z
9
value 0.03355
scoring_system epss
scoring_elements 0.87346
published_at 2026-04-16T12:55:00Z
10
value 0.03355
scoring_system epss
scoring_elements 0.8735
published_at 2026-04-18T12:55:00Z
11
value 0.03355
scoring_system epss
scoring_elements 0.87344
published_at 2026-04-21T12:55:00Z
12
value 0.03355
scoring_system epss
scoring_elements 0.87361
published_at 2026-04-24T12:55:00Z
13
value 0.03355
scoring_system epss
scoring_elements 0.87368
published_at 2026-04-26T12:55:00Z
14
value 0.03355
scoring_system epss
scoring_elements 0.87369
published_at 2026-04-29T12:55:00Z
15
value 0.03355
scoring_system epss
scoring_elements 0.87385
published_at 2026-05-05T12:55:00Z
16
value 0.03355
scoring_system epss
scoring_elements 0.87397
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6933
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6933
fixed_packages
0
url pkg:deb/debian/vlc@2.1.4-1?distro=trixie
purl pkg:deb/debian/vlc@2.1.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@2.1.4-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2013-6933
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h9ks-v96k-wkf7
69
url VCID-hbf8-542g-k3gr
vulnerability_id VCID-hbf8-542g-k3gr
summary
Multiple vulnerabilities were found in VLC, allowing for the execution of
    arbitrary code and Denial of Service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-6684
reference_id
reference_type
scores
0
value 0.00877
scoring_system epss
scoring_elements 0.75419
published_at 2026-05-07T12:55:00Z
1
value 0.00877
scoring_system epss
scoring_elements 0.75383
published_at 2026-04-29T12:55:00Z
2
value 0.00877
scoring_system epss
scoring_elements 0.7539
published_at 2026-05-05T12:55:00Z
3
value 0.00877
scoring_system epss
scoring_elements 0.75284
published_at 2026-04-04T12:55:00Z
4
value 0.00877
scoring_system epss
scoring_elements 0.75262
published_at 2026-04-07T12:55:00Z
5
value 0.00877
scoring_system epss
scoring_elements 0.75305
published_at 2026-04-08T12:55:00Z
6
value 0.00877
scoring_system epss
scoring_elements 0.75315
published_at 2026-04-12T12:55:00Z
7
value 0.00877
scoring_system epss
scoring_elements 0.75336
published_at 2026-04-11T12:55:00Z
8
value 0.00877
scoring_system epss
scoring_elements 0.75303
published_at 2026-04-13T12:55:00Z
9
value 0.00877
scoring_system epss
scoring_elements 0.75343
published_at 2026-04-16T12:55:00Z
10
value 0.00877
scoring_system epss
scoring_elements 0.7535
published_at 2026-04-18T12:55:00Z
11
value 0.00877
scoring_system epss
scoring_elements 0.75339
published_at 2026-04-21T12:55:00Z
12
value 0.00877
scoring_system epss
scoring_elements 0.75374
published_at 2026-04-24T12:55:00Z
13
value 0.00877
scoring_system epss
scoring_elements 0.75379
published_at 2026-04-26T12:55:00Z
14
value 0.00887
scoring_system epss
scoring_elements 0.75425
published_at 2026-04-02T12:55:00Z
15
value 0.00887
scoring_system epss
scoring_elements 0.75422
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-6684
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6684
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6684
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=458318
reference_id 458318
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=458318
3
reference_url https://security.gentoo.org/glsa/200803-13
reference_id GLSA-200803-13
reference_type
scores
url https://security.gentoo.org/glsa/200803-13
fixed_packages
0
url pkg:deb/debian/vlc@0.8.6.c-4.1?distro=trixie
purl pkg:deb/debian/vlc@0.8.6.c-4.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0.8.6.c-4.1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2007-6684
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hbf8-542g-k3gr
70
url VCID-hc13-gs1j-suhs
vulnerability_id VCID-hc13-gs1j-suhs
summary
MPlayer is vulnerable to integer overflows in FFmpeg and ASF decoding that
    could potentially result in the execution of arbitrary code.
references
0
reference_url http://article.gmane.org/gmane.comp.video.ffmpeg.devel/26558
reference_id
reference_type
scores
url http://article.gmane.org/gmane.comp.video.ffmpeg.devel/26558
1
reference_url http://cvs.freedesktop.org/gstreamer/gst-ffmpeg/ChangeLog?rev=1.239&view=markup
reference_id
reference_type
scores
url http://cvs.freedesktop.org/gstreamer/gst-ffmpeg/ChangeLog?rev=1.239&view=markup
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-4048
reference_id
reference_type
scores
0
value 0.05247
scoring_system epss
scoring_elements 0.90033
published_at 2026-05-07T12:55:00Z
1
value 0.05247
scoring_system epss
scoring_elements 0.89936
published_at 2026-04-01T12:55:00Z
2
value 0.05247
scoring_system epss
scoring_elements 0.89939
published_at 2026-04-02T12:55:00Z
3
value 0.05247
scoring_system epss
scoring_elements 0.89952
published_at 2026-04-04T12:55:00Z
4
value 0.05247
scoring_system epss
scoring_elements 0.89959
published_at 2026-04-07T12:55:00Z
5
value 0.05247
scoring_system epss
scoring_elements 0.89975
published_at 2026-04-08T12:55:00Z
6
value 0.05247
scoring_system epss
scoring_elements 0.8998
published_at 2026-04-09T12:55:00Z
7
value 0.05247
scoring_system epss
scoring_elements 0.89988
published_at 2026-04-11T12:55:00Z
8
value 0.05247
scoring_system epss
scoring_elements 0.89986
published_at 2026-04-12T12:55:00Z
9
value 0.05247
scoring_system epss
scoring_elements 0.89979
published_at 2026-04-13T12:55:00Z
10
value 0.05247
scoring_system epss
scoring_elements 0.89994
published_at 2026-04-16T12:55:00Z
11
value 0.05247
scoring_system epss
scoring_elements 0.89995
published_at 2026-04-18T12:55:00Z
12
value 0.05247
scoring_system epss
scoring_elements 0.89991
published_at 2026-04-21T12:55:00Z
13
value 0.05247
scoring_system epss
scoring_elements 0.90008
published_at 2026-04-24T12:55:00Z
14
value 0.05247
scoring_system epss
scoring_elements 0.90007
published_at 2026-04-26T12:55:00Z
15
value 0.05247
scoring_system epss
scoring_elements 0.90006
published_at 2026-04-29T12:55:00Z
16
value 0.05247
scoring_system epss
scoring_elements 0.90019
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-4048
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4048
4
reference_url http://secunia.com/advisories/17892
reference_id
reference_type
scores
url http://secunia.com/advisories/17892
5
reference_url http://secunia.com/advisories/18066
reference_id
reference_type
scores
url http://secunia.com/advisories/18066
6
reference_url http://secunia.com/advisories/18087
reference_id
reference_type
scores
url http://secunia.com/advisories/18087
7
reference_url http://secunia.com/advisories/18107
reference_id
reference_type
scores
url http://secunia.com/advisories/18107
8
reference_url http://secunia.com/advisories/18400
reference_id
reference_type
scores
url http://secunia.com/advisories/18400
9
reference_url http://secunia.com/advisories/18739
reference_id
reference_type
scores
url http://secunia.com/advisories/18739
10
reference_url http://secunia.com/advisories/18746
reference_id
reference_type
scores
url http://secunia.com/advisories/18746
11
reference_url http://secunia.com/advisories/19114
reference_id
reference_type
scores
url http://secunia.com/advisories/19114
12
reference_url http://secunia.com/advisories/19192
reference_id
reference_type
scores
url http://secunia.com/advisories/19192
13
reference_url http://secunia.com/advisories/19272
reference_id
reference_type
scores
url http://secunia.com/advisories/19272
14
reference_url http://secunia.com/advisories/19279
reference_id
reference_type
scores
url http://secunia.com/advisories/19279
15
reference_url http://www1.mplayerhq.hu/cgi-bin/cvsweb.cgi/ffmpeg/libavcodec/utils.c.diff?r1=1.161&r2=1.162&cvsroot=FFMpeg
reference_id
reference_type
scores
url http://www1.mplayerhq.hu/cgi-bin/cvsweb.cgi/ffmpeg/libavcodec/utils.c.diff?r1=1.161&r2=1.162&cvsroot=FFMpeg
16
reference_url http://www1.mplayerhq.hu/cgi-bin/cvsweb.cgi/ffmpeg/libavcodec/utils.c?rev=1.162&content-type=text/x-cvsweb-markup&cvsroot=FFMpeg
reference_id
reference_type
scores
url http://www1.mplayerhq.hu/cgi-bin/cvsweb.cgi/ffmpeg/libavcodec/utils.c?rev=1.162&content-type=text/x-cvsweb-markup&cvsroot=FFMpeg
17
reference_url http://www.debian.org/security/2006/dsa-1004
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-1004
18
reference_url http://www.debian.org/security/2006/dsa-1005
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-1005
19
reference_url http://www.gentoo.org/security/en/glsa/glsa-200601-06.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200601-06.xml
20
reference_url http://www.gentoo.org/security/en/glsa/glsa-200602-01.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200602-01.xml
21
reference_url http://www.gentoo.org/security/en/glsa/glsa-200603-03.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200603-03.xml
22
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:228
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:228
23
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:229
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:229
24
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:230
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:230
25
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:231
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:231
26
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:232
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:232
27
reference_url http://www.securityfocus.com/bid/15743
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/15743
28
reference_url http://www.us.debian.org/security/2006/dsa-992
reference_id
reference_type
scores
url http://www.us.debian.org/security/2006/dsa-992
29
reference_url http://www.vupen.com/english/advisories/2005/2770
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2770
30
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342207
reference_id 342207
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342207
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:cvs:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ffmpeg:ffmpeg:cvs:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:cvs:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-4048
reference_id CVE-2005-4048
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-4048
37
reference_url https://security.gentoo.org/glsa/200601-06
reference_id GLSA-200601-06
reference_type
scores
url https://security.gentoo.org/glsa/200601-06
38
reference_url https://security.gentoo.org/glsa/200602-01
reference_id GLSA-200602-01
reference_type
scores
url https://security.gentoo.org/glsa/200602-01
39
reference_url https://security.gentoo.org/glsa/200603-03
reference_id GLSA-200603-03
reference_type
scores
url https://security.gentoo.org/glsa/200603-03
40
reference_url https://usn.ubuntu.com/230-1/
reference_id USN-230-1
reference_type
scores
url https://usn.ubuntu.com/230-1/
41
reference_url https://usn.ubuntu.com/230-2/
reference_id USN-230-2
reference_type
scores
url https://usn.ubuntu.com/230-2/
fixed_packages
0
url pkg:deb/debian/vlc@0.8.4.debian-2?distro=trixie
purl pkg:deb/debian/vlc@0.8.4.debian-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0.8.4.debian-2%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2005-4048
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hc13-gs1j-suhs
71
url VCID-hjn4-swbf-y3au
vulnerability_id VCID-hjn4-swbf-y3au
summary security update
references
0
reference_url http://openwall.com/lists/oss-security/2017/12/15/1
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2017/12/15/1
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17670
reference_id
reference_type
scores
0
value 0.01254
scoring_system epss
scoring_elements 0.79485
published_at 2026-05-07T12:55:00Z
1
value 0.01254
scoring_system epss
scoring_elements 0.79463
published_at 2026-05-05T12:55:00Z
2
value 0.01254
scoring_system epss
scoring_elements 0.79314
published_at 2026-04-01T12:55:00Z
3
value 0.01254
scoring_system epss
scoring_elements 0.7932
published_at 2026-04-02T12:55:00Z
4
value 0.01254
scoring_system epss
scoring_elements 0.79344
published_at 2026-04-04T12:55:00Z
5
value 0.01254
scoring_system epss
scoring_elements 0.79329
published_at 2026-04-07T12:55:00Z
6
value 0.01254
scoring_system epss
scoring_elements 0.79356
published_at 2026-04-08T12:55:00Z
7
value 0.01254
scoring_system epss
scoring_elements 0.79365
published_at 2026-04-09T12:55:00Z
8
value 0.01254
scoring_system epss
scoring_elements 0.79388
published_at 2026-04-11T12:55:00Z
9
value 0.01254
scoring_system epss
scoring_elements 0.79373
published_at 2026-04-12T12:55:00Z
10
value 0.01254
scoring_system epss
scoring_elements 0.79362
published_at 2026-04-13T12:55:00Z
11
value 0.01254
scoring_system epss
scoring_elements 0.79394
published_at 2026-04-21T12:55:00Z
12
value 0.01254
scoring_system epss
scoring_elements 0.79391
published_at 2026-04-18T12:55:00Z
13
value 0.01254
scoring_system epss
scoring_elements 0.79427
published_at 2026-04-24T12:55:00Z
14
value 0.01254
scoring_system epss
scoring_elements 0.79432
published_at 2026-04-26T12:55:00Z
15
value 0.01254
scoring_system epss
scoring_elements 0.79448
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17670
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17670
3
reference_url https://www.debian.org/security/2018/dsa-4203
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4203
4
reference_url http://www.securityfocus.com/bid/102214
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102214
5
reference_url http://www.securitytracker.com/id/1040938
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1040938
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17670
reference_id CVE-2017-17670
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-17670
fixed_packages
0
url pkg:deb/debian/vlc@3.0.0~rc2-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.0~rc2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.0~rc2-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2017-17670
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hjn4-swbf-y3au
72
url VCID-j214-d79n-nucs
vulnerability_id VCID-j214-d79n-nucs
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could lead to user-assisted execution of arbitrary code.
references
0
reference_url http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=59491dcedffbf97612d2c572943b56ee4289dd07
reference_id
reference_type
scores
url http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=59491dcedffbf97612d2c572943b56ee4289dd07
1
reference_url http://osvdb.org/70698
reference_id
reference_type
scores
url http://osvdb.org/70698
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0531
reference_id
reference_type
scores
0
value 0.7325
scoring_system epss
scoring_elements 0.98809
published_at 2026-05-07T12:55:00Z
1
value 0.7325
scoring_system epss
scoring_elements 0.9878
published_at 2026-04-01T12:55:00Z
2
value 0.7325
scoring_system epss
scoring_elements 0.98781
published_at 2026-04-02T12:55:00Z
3
value 0.7325
scoring_system epss
scoring_elements 0.98784
published_at 2026-04-04T12:55:00Z
4
value 0.7325
scoring_system epss
scoring_elements 0.98787
published_at 2026-04-09T12:55:00Z
5
value 0.7325
scoring_system epss
scoring_elements 0.98788
published_at 2026-04-08T12:55:00Z
6
value 0.7325
scoring_system epss
scoring_elements 0.9879
published_at 2026-04-11T12:55:00Z
7
value 0.7325
scoring_system epss
scoring_elements 0.98791
published_at 2026-04-12T12:55:00Z
8
value 0.7325
scoring_system epss
scoring_elements 0.98792
published_at 2026-04-13T12:55:00Z
9
value 0.7325
scoring_system epss
scoring_elements 0.98796
published_at 2026-04-18T12:55:00Z
10
value 0.7325
scoring_system epss
scoring_elements 0.98798
published_at 2026-04-21T12:55:00Z
11
value 0.7325
scoring_system epss
scoring_elements 0.98801
published_at 2026-04-24T12:55:00Z
12
value 0.7325
scoring_system epss
scoring_elements 0.98803
published_at 2026-04-26T12:55:00Z
13
value 0.7325
scoring_system epss
scoring_elements 0.98804
published_at 2026-04-29T12:55:00Z
14
value 0.7325
scoring_system epss
scoring_elements 0.98808
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0531
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0531
4
reference_url http://secunia.com/advisories/43131
reference_id
reference_type
scores
url http://secunia.com/advisories/43131
5
reference_url http://secunia.com/advisories/43242
reference_id
reference_type
scores
url http://secunia.com/advisories/43242
6
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/65045
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/65045
7
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12415
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12415
8
reference_url http://www.debian.org/security/2011/dsa-2159
reference_id
reference_type
scores
url http://www.debian.org/security/2011/dsa-2159
9
reference_url http://www.openwall.com/lists/oss-security/2011/01/31/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2011/01/31/4
10
reference_url http://www.openwall.com/lists/oss-security/2011/01/31/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2011/01/31/8
11
reference_url http://www.securityfocus.com/bid/46060
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46060
12
reference_url http://www.securitytracker.com/id?1025018
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1025018
13
reference_url http://www.videolan.org/security/sa1102.html
reference_id
reference_type
scores
url http://www.videolan.org/security/sa1102.html
14
reference_url http://www.vupen.com/english/advisories/2011/0363
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0363
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99b:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99e:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99f:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99f:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99f:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99g:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99g:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99g:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99h:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99h:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99h:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99i:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99i:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99i:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.60:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.60:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.60:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.61:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.61:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.61:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.62:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.62:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.62:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.63:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.63:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.63:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.70:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.70:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.70:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.71:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.71:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.71:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.72:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.72:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.72:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.73:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.73:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.73:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.80:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.80:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.80:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.81:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.81:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.81:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.82:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.82:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.82:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.83:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.83:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.83:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.90:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.90:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.90:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.91:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.92:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.3.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.3.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.3:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.4:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.5:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.6:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.3:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.4:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.5:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.6:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0531
reference_id CVE-2011-0531
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-0531
85
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/16637.rb
reference_id CVE-2011-0531;OSVDB-70698
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/16637.rb
86
reference_url https://security.gentoo.org/glsa/201411-01
reference_id GLSA-201411-01
reference_type
scores
url https://security.gentoo.org/glsa/201411-01
fixed_packages
0
url pkg:deb/debian/vlc@1.1.7-1?distro=trixie
purl pkg:deb/debian/vlc@1.1.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@1.1.7-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2011-0531
risk_score 10.0
exploitability 2.0
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j214-d79n-nucs
73
url VCID-j4vw-cnqw-1ygz
vulnerability_id VCID-j4vw-cnqw-1ygz
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could result in the arbitrary execution of code.
references
0
reference_url http://git.videolan.org/?p=vlc.git&a=search&h=refs/heads/master&st=commit&s=cve-2019
reference_id
reference_type
scores
url http://git.videolan.org/?p=vlc.git&a=search&h=refs/heads/master&st=commit&s=cve-2019
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00036.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00036.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00046.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00046.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-14776
reference_id
reference_type
scores
0
value 0.00651
scoring_system epss
scoring_elements 0.70963
published_at 2026-05-07T12:55:00Z
1
value 0.00651
scoring_system epss
scoring_elements 0.70924
published_at 2026-05-05T12:55:00Z
2
value 0.00651
scoring_system epss
scoring_elements 0.70789
published_at 2026-04-01T12:55:00Z
3
value 0.00651
scoring_system epss
scoring_elements 0.70803
published_at 2026-04-02T12:55:00Z
4
value 0.00651
scoring_system epss
scoring_elements 0.70821
published_at 2026-04-04T12:55:00Z
5
value 0.00651
scoring_system epss
scoring_elements 0.70796
published_at 2026-04-07T12:55:00Z
6
value 0.00651
scoring_system epss
scoring_elements 0.7084
published_at 2026-04-08T12:55:00Z
7
value 0.00651
scoring_system epss
scoring_elements 0.70856
published_at 2026-04-09T12:55:00Z
8
value 0.00651
scoring_system epss
scoring_elements 0.70878
published_at 2026-04-11T12:55:00Z
9
value 0.00651
scoring_system epss
scoring_elements 0.70863
published_at 2026-04-12T12:55:00Z
10
value 0.00651
scoring_system epss
scoring_elements 0.70847
published_at 2026-04-13T12:55:00Z
11
value 0.00651
scoring_system epss
scoring_elements 0.70893
published_at 2026-04-16T12:55:00Z
12
value 0.00651
scoring_system epss
scoring_elements 0.709
published_at 2026-04-18T12:55:00Z
13
value 0.00651
scoring_system epss
scoring_elements 0.70879
published_at 2026-04-21T12:55:00Z
14
value 0.00651
scoring_system epss
scoring_elements 0.70934
published_at 2026-04-24T12:55:00Z
15
value 0.00651
scoring_system epss
scoring_elements 0.70944
published_at 2026-04-26T12:55:00Z
16
value 0.00651
scoring_system epss
scoring_elements 0.70942
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-14776
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13602
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13962
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14437
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14438
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14438
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14498
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14533
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14534
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14534
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14535
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14535
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14776
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14777
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14778
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14970
16
reference_url https://seclists.org/bugtraq/2019/Aug/36
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Aug/36
17
reference_url https://www.debian.org/security/2019/dsa-4504
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4504
18
reference_url https://www.videolan.org/security/sb-vlc308.html
reference_id
reference_type
scores
url https://www.videolan.org/security/sb-vlc308.html
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:3.0.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:3.0.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:3.0.7.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-14776
reference_id CVE-2019-14776
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-14776
23
reference_url https://security.gentoo.org/glsa/201909-02
reference_id GLSA-201909-02
reference_type
scores
url https://security.gentoo.org/glsa/201909-02
24
reference_url https://usn.ubuntu.com/4131-1/
reference_id USN-4131-1
reference_type
scores
url https://usn.ubuntu.com/4131-1/
fixed_packages
0
url pkg:deb/debian/vlc@3.0.8-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.8-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2019-14776
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j4vw-cnqw-1ygz
74
url VCID-jc5x-s8ej-87bf
vulnerability_id VCID-jc5x-s8ej-87bf
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9627
reference_id
reference_type
scores
0
value 0.00338
scoring_system epss
scoring_elements 0.56547
published_at 2026-04-01T12:55:00Z
1
value 0.00338
scoring_system epss
scoring_elements 0.56643
published_at 2026-04-02T12:55:00Z
2
value 0.00338
scoring_system epss
scoring_elements 0.56665
published_at 2026-04-21T12:55:00Z
3
value 0.00338
scoring_system epss
scoring_elements 0.56644
published_at 2026-04-07T12:55:00Z
4
value 0.00338
scoring_system epss
scoring_elements 0.56696
published_at 2026-04-08T12:55:00Z
5
value 0.00338
scoring_system epss
scoring_elements 0.56701
published_at 2026-04-09T12:55:00Z
6
value 0.00338
scoring_system epss
scoring_elements 0.56709
published_at 2026-04-11T12:55:00Z
7
value 0.00338
scoring_system epss
scoring_elements 0.56684
published_at 2026-04-12T12:55:00Z
8
value 0.00338
scoring_system epss
scoring_elements 0.56663
published_at 2026-04-13T12:55:00Z
9
value 0.00338
scoring_system epss
scoring_elements 0.56694
published_at 2026-04-16T12:55:00Z
10
value 0.00338
scoring_system epss
scoring_elements 0.56692
published_at 2026-04-18T12:55:00Z
11
value 0.00338
scoring_system epss
scoring_elements 0.56602
published_at 2026-04-24T12:55:00Z
12
value 0.00338
scoring_system epss
scoring_elements 0.5662
published_at 2026-04-26T12:55:00Z
13
value 0.00338
scoring_system epss
scoring_elements 0.56603
published_at 2026-04-29T12:55:00Z
14
value 0.00338
scoring_system epss
scoring_elements 0.56558
published_at 2026-05-05T12:55:00Z
15
value 0.00338
scoring_system epss
scoring_elements 0.56605
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9627
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9626
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9627
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9627
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9628
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9629
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9630
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9630
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775866
reference_id 775866
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775866
7
reference_url https://security.gentoo.org/glsa/201603-08
reference_id GLSA-201603-08
reference_type
scores
url https://security.gentoo.org/glsa/201603-08
fixed_packages
0
url pkg:deb/debian/vlc@2.2.0~rc2-2?distro=trixie
purl pkg:deb/debian/vlc@2.2.0~rc2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@2.2.0~rc2-2%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2014-9627
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jc5x-s8ej-87bf
75
url VCID-jhnk-gw11-3kc1
vulnerability_id VCID-jhnk-gw11-3kc1
summary
Multiple vulnerabilities were found in VLC, allowing for the execution of
    arbitrary code and Denial of Service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-6683
reference_id
reference_type
scores
0
value 0.00838
scoring_system epss
scoring_elements 0.74639
published_at 2026-04-01T12:55:00Z
1
value 0.00838
scoring_system epss
scoring_elements 0.74643
published_at 2026-04-02T12:55:00Z
2
value 0.00895
scoring_system epss
scoring_elements 0.7558
published_at 2026-04-04T12:55:00Z
3
value 0.00895
scoring_system epss
scoring_elements 0.75559
published_at 2026-04-07T12:55:00Z
4
value 0.00895
scoring_system epss
scoring_elements 0.75594
published_at 2026-04-08T12:55:00Z
5
value 0.00895
scoring_system epss
scoring_elements 0.75604
published_at 2026-04-13T12:55:00Z
6
value 0.00895
scoring_system epss
scoring_elements 0.75629
published_at 2026-04-11T12:55:00Z
7
value 0.00895
scoring_system epss
scoring_elements 0.75611
published_at 2026-04-12T12:55:00Z
8
value 0.00895
scoring_system epss
scoring_elements 0.75641
published_at 2026-04-16T12:55:00Z
9
value 0.00895
scoring_system epss
scoring_elements 0.75645
published_at 2026-04-18T12:55:00Z
10
value 0.00895
scoring_system epss
scoring_elements 0.7563
published_at 2026-04-21T12:55:00Z
11
value 0.00895
scoring_system epss
scoring_elements 0.75669
published_at 2026-04-24T12:55:00Z
12
value 0.00895
scoring_system epss
scoring_elements 0.75674
published_at 2026-04-26T12:55:00Z
13
value 0.00895
scoring_system epss
scoring_elements 0.75686
published_at 2026-04-29T12:55:00Z
14
value 0.00895
scoring_system epss
scoring_elements 0.75689
published_at 2026-05-05T12:55:00Z
15
value 0.00895
scoring_system epss
scoring_elements 0.75719
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-6683
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6683
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6683
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=458318
reference_id 458318
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=458318
3
reference_url https://security.gentoo.org/glsa/200803-13
reference_id GLSA-200803-13
reference_type
scores
url https://security.gentoo.org/glsa/200803-13
fixed_packages
0
url pkg:deb/debian/vlc@0.8.6.c-4.1?distro=trixie
purl pkg:deb/debian/vlc@0.8.6.c-4.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0.8.6.c-4.1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2007-6683
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jhnk-gw11-3kc1
76
url VCID-jx3e-tv9f-4uay
vulnerability_id VCID-jx3e-tv9f-4uay
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could lead to user-assisted execution of arbitrary code.
references
0
reference_url http://download.videolan.org/pub/videolan/vlc/1.1.6/vlc-1.1.6.tar.bz2
reference_id
reference_type
scores
url http://download.videolan.org/pub/videolan/vlc/1.1.6/vlc-1.1.6.tar.bz2
1
reference_url http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=f9b664eac0e1a7bceed9d7b5854fd9fc351b4aab
reference_id
reference_type
scores
url http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=f9b664eac0e1a7bceed9d7b5854fd9fc351b4aab
2
reference_url http://openwall.com/lists/oss-security/2011/01/19/6
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/01/19/6
3
reference_url http://openwall.com/lists/oss-security/2011/01/20/3
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/01/20/3
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0021
reference_id
reference_type
scores
0
value 0.10195
scoring_system epss
scoring_elements 0.9318
published_at 2026-05-07T12:55:00Z
1
value 0.10195
scoring_system epss
scoring_elements 0.93157
published_at 2026-04-21T12:55:00Z
2
value 0.10195
scoring_system epss
scoring_elements 0.93163
published_at 2026-04-26T12:55:00Z
3
value 0.10195
scoring_system epss
scoring_elements 0.93159
published_at 2026-04-29T12:55:00Z
4
value 0.10195
scoring_system epss
scoring_elements 0.93165
published_at 2026-05-05T12:55:00Z
5
value 0.10313
scoring_system epss
scoring_elements 0.93175
published_at 2026-04-09T12:55:00Z
6
value 0.10313
scoring_system epss
scoring_elements 0.9318
published_at 2026-04-13T12:55:00Z
7
value 0.10313
scoring_system epss
scoring_elements 0.9315
published_at 2026-04-01T12:55:00Z
8
value 0.10313
scoring_system epss
scoring_elements 0.93196
published_at 2026-04-16T12:55:00Z
9
value 0.10313
scoring_system epss
scoring_elements 0.932
published_at 2026-04-18T12:55:00Z
10
value 0.10313
scoring_system epss
scoring_elements 0.93178
published_at 2026-04-12T12:55:00Z
11
value 0.10313
scoring_system epss
scoring_elements 0.93159
published_at 2026-04-02T12:55:00Z
12
value 0.10313
scoring_system epss
scoring_elements 0.93163
published_at 2026-04-04T12:55:00Z
13
value 0.10313
scoring_system epss
scoring_elements 0.93162
published_at 2026-04-07T12:55:00Z
14
value 0.10313
scoring_system epss
scoring_elements 0.93171
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0021
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0021
6
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/64879
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/64879
7
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12460
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12460
8
reference_url http://www.securityfocus.com/bid/45927
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45927
9
reference_url http://www.vupen.com/english/advisories/2011/0185
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0185
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99b:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99e:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99f:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99f:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99f:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99g:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99g:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99g:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99h:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99h:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99h:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99i:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99i:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99i:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.60:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.60:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.60:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.61:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.61:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.61:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.62:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.62:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.62:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.63:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.63:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.63:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.70:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.70:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.70:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.71:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.71:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.71:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.72:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.72:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.72:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.73:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.73:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.73:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.80:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.80:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.80:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.81:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.81:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.81:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.82:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.82:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.82:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.83:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.83:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.83:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.90:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.90:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.90:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.91:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.92:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.3.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.3.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.2:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.3:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.4:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.5:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.6:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.3:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.4:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0021
reference_id CVE-2011-0021
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-0021
78
reference_url https://security.gentoo.org/glsa/201411-01
reference_id GLSA-201411-01
reference_type
scores
url https://security.gentoo.org/glsa/201411-01
fixed_packages
0
url pkg:deb/debian/vlc@1.1.3-1squeeze2?distro=trixie
purl pkg:deb/debian/vlc@1.1.3-1squeeze2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@1.1.3-1squeeze2%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2011-0021
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jx3e-tv9f-4uay
77
url VCID-k2t1-64sd-uqde
vulnerability_id VCID-k2t1-64sd-uqde
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could lead to user-assisted execution of arbitrary code.
references
0
reference_url http://git.videolan.org/?p=vlc/vlc-1.0.git%3Ba=commit%3Bh=22a22e356c9d93993086810b2e25b59b55925b3a
reference_id
reference_type
scores
url http://git.videolan.org/?p=vlc/vlc-1.0.git%3Ba=commit%3Bh=22a22e356c9d93993086810b2e25b59b55925b3a
1
reference_url http://git.videolan.org/?p=vlc/vlc-1.1.git%3Ba=commit%3Bh=24918843e57c7962e28fcb01845adce82bed6516
reference_id
reference_type
scores
url http://git.videolan.org/?p=vlc/vlc-1.1.git%3Ba=commit%3Bh=24918843e57c7962e28fcb01845adce82bed6516
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2937
reference_id
reference_type
scores
0
value 0.01382
scoring_system epss
scoring_elements 0.80417
published_at 2026-05-07T12:55:00Z
1
value 0.01382
scoring_system epss
scoring_elements 0.80243
published_at 2026-04-01T12:55:00Z
2
value 0.01382
scoring_system epss
scoring_elements 0.8025
published_at 2026-04-02T12:55:00Z
3
value 0.01382
scoring_system epss
scoring_elements 0.8027
published_at 2026-04-04T12:55:00Z
4
value 0.01382
scoring_system epss
scoring_elements 0.80259
published_at 2026-04-07T12:55:00Z
5
value 0.01382
scoring_system epss
scoring_elements 0.80286
published_at 2026-04-08T12:55:00Z
6
value 0.01382
scoring_system epss
scoring_elements 0.80296
published_at 2026-04-09T12:55:00Z
7
value 0.01382
scoring_system epss
scoring_elements 0.80315
published_at 2026-04-11T12:55:00Z
8
value 0.01382
scoring_system epss
scoring_elements 0.803
published_at 2026-04-12T12:55:00Z
9
value 0.01382
scoring_system epss
scoring_elements 0.80294
published_at 2026-04-13T12:55:00Z
10
value 0.01382
scoring_system epss
scoring_elements 0.80324
published_at 2026-04-16T12:55:00Z
11
value 0.01382
scoring_system epss
scoring_elements 0.80326
published_at 2026-04-18T12:55:00Z
12
value 0.01382
scoring_system epss
scoring_elements 0.8033
published_at 2026-04-21T12:55:00Z
13
value 0.01382
scoring_system epss
scoring_elements 0.80356
published_at 2026-04-24T12:55:00Z
14
value 0.01382
scoring_system epss
scoring_elements 0.80362
published_at 2026-04-26T12:55:00Z
15
value 0.01382
scoring_system epss
scoring_elements 0.80379
published_at 2026-04-29T12:55:00Z
16
value 0.01382
scoring_system epss
scoring_elements 0.80395
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2937
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2937
4
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14676
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14676
5
reference_url http://www.securityfocus.com/bid/42386
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/42386
6
reference_url http://www.videolan.org/security/sa1004.html
reference_id
reference_type
scores
url http://www.videolan.org/security/sa1004.html
7
reference_url http://www.vupen.com/english/advisories/2010/2087
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2087
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.7:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2937
reference_id CVE-2010-2937
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2937
31
reference_url https://security.gentoo.org/glsa/201411-01
reference_id GLSA-201411-01
reference_type
scores
url https://security.gentoo.org/glsa/201411-01
fixed_packages
0
url pkg:deb/debian/vlc@1.1.3-1?distro=trixie
purl pkg:deb/debian/vlc@1.1.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@1.1.3-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2010-2937
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k2t1-64sd-uqde
78
url VCID-kfcd-n3mf-2kaa
vulnerability_id VCID-kfcd-n3mf-2kaa
summary requests/status.xml in VLC 0.9.8a allows remote attackers to cause a denial of service (stack consumption and crash) via a long input argument in an in_play action.
references
0
reference_url http://bugs.gentoo.org/show_bug.cgi?id=262708
reference_id
reference_type
scores
url http://bugs.gentoo.org/show_bug.cgi?id=262708
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1045
reference_id
reference_type
scores
0
value 0.09983
scoring_system epss
scoring_elements 0.9309
published_at 2026-05-07T12:55:00Z
1
value 0.09983
scoring_system epss
scoring_elements 0.93017
published_at 2026-04-01T12:55:00Z
2
value 0.09983
scoring_system epss
scoring_elements 0.93026
published_at 2026-04-02T12:55:00Z
3
value 0.09983
scoring_system epss
scoring_elements 0.9303
published_at 2026-04-04T12:55:00Z
4
value 0.09983
scoring_system epss
scoring_elements 0.93029
published_at 2026-04-07T12:55:00Z
5
value 0.09983
scoring_system epss
scoring_elements 0.93037
published_at 2026-04-08T12:55:00Z
6
value 0.09983
scoring_system epss
scoring_elements 0.93042
published_at 2026-04-09T12:55:00Z
7
value 0.09983
scoring_system epss
scoring_elements 0.93047
published_at 2026-04-11T12:55:00Z
8
value 0.09983
scoring_system epss
scoring_elements 0.93044
published_at 2026-04-12T12:55:00Z
9
value 0.09983
scoring_system epss
scoring_elements 0.93046
published_at 2026-04-13T12:55:00Z
10
value 0.09983
scoring_system epss
scoring_elements 0.93056
published_at 2026-04-16T12:55:00Z
11
value 0.09983
scoring_system epss
scoring_elements 0.93059
published_at 2026-04-18T12:55:00Z
12
value 0.09983
scoring_system epss
scoring_elements 0.93067
published_at 2026-04-21T12:55:00Z
13
value 0.09983
scoring_system epss
scoring_elements 0.93073
published_at 2026-04-26T12:55:00Z
14
value 0.09983
scoring_system epss
scoring_elements 0.93069
published_at 2026-04-29T12:55:00Z
15
value 0.09983
scoring_system epss
scoring_elements 0.93074
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1045
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1045
3
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/49249
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/49249
4
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14357
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14357
5
reference_url https://www.exploit-db.com/exploits/8213
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/8213
6
reference_url http://www.openwall.com/lists/oss-security/2009/03/17/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2009/03/17/4
7
reference_url http://www.securityfocus.com/bid/34126
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/34126
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=522170
reference_id 522170
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=522170
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2009-1045
reference_id CVE-2009-1045
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2009-1045
11
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/8213.pl
reference_id OSVDB-52897;CVE-2009-1045
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/8213.pl
fixed_packages
0
url pkg:deb/debian/vlc@0.9.9a-1?distro=trixie
purl pkg:deb/debian/vlc@0.9.9a-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0.9.9a-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2009-1045
risk_score 9.0
exploitability 2.0
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kfcd-n3mf-2kaa
79
url VCID-kka1-ncqu-73cc
vulnerability_id VCID-kka1-ncqu-73cc
summary Multiple cross-site scripting (XSS) vulnerabilities in the HTTP Interface in VideoLAN VLC Media Player before 2.0.7 allow remote attackers to inject arbitrary web script or HTML via the (1) command parameter to requests/vlm_cmd.xml, (2) dir parameter to requests/browse.xml, or (3) URI in a request, which is returned in an error message through share/lua/intf/http.lua.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-3565
reference_id
reference_type
scores
0
value 0.00282
scoring_system epss
scoring_elements 0.516
published_at 2026-04-24T12:55:00Z
1
value 0.00282
scoring_system epss
scoring_elements 0.51606
published_at 2026-04-26T12:55:00Z
2
value 0.00282
scoring_system epss
scoring_elements 0.51566
published_at 2026-04-29T12:55:00Z
3
value 0.00282
scoring_system epss
scoring_elements 0.5151
published_at 2026-05-05T12:55:00Z
4
value 0.00282
scoring_system epss
scoring_elements 0.51559
published_at 2026-05-07T12:55:00Z
5
value 0.00396
scoring_system epss
scoring_elements 0.60442
published_at 2026-04-09T12:55:00Z
6
value 0.00396
scoring_system epss
scoring_elements 0.60463
published_at 2026-04-11T12:55:00Z
7
value 0.00396
scoring_system epss
scoring_elements 0.60449
published_at 2026-04-12T12:55:00Z
8
value 0.00396
scoring_system epss
scoring_elements 0.60307
published_at 2026-04-01T12:55:00Z
9
value 0.00396
scoring_system epss
scoring_elements 0.6047
published_at 2026-04-16T12:55:00Z
10
value 0.00396
scoring_system epss
scoring_elements 0.60479
published_at 2026-04-18T12:55:00Z
11
value 0.00396
scoring_system epss
scoring_elements 0.60469
published_at 2026-04-21T12:55:00Z
12
value 0.00396
scoring_system epss
scoring_elements 0.6043
published_at 2026-04-13T12:55:00Z
13
value 0.00396
scoring_system epss
scoring_elements 0.60382
published_at 2026-04-02T12:55:00Z
14
value 0.00396
scoring_system epss
scoring_elements 0.60409
published_at 2026-04-04T12:55:00Z
15
value 0.00396
scoring_system epss
scoring_elements 0.60377
published_at 2026-04-07T12:55:00Z
16
value 0.00396
scoring_system epss
scoring_elements 0.60426
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-3565
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3565
fixed_packages
0
url pkg:deb/debian/vlc@2.0.7-1?distro=trixie
purl pkg:deb/debian/vlc@2.0.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@2.0.7-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2013-3565
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kka1-ncqu-73cc
80
url VCID-kwv3-vghc-zubx
vulnerability_id VCID-kwv3-vghc-zubx
summary
Multiple vulnerabilities have been found in libmicrodns, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6078
reference_id
reference_type
scores
0
value 0.00369
scoring_system epss
scoring_elements 0.58823
published_at 2026-05-07T12:55:00Z
1
value 0.00369
scoring_system epss
scoring_elements 0.58814
published_at 2026-04-29T12:55:00Z
2
value 0.00369
scoring_system epss
scoring_elements 0.58778
published_at 2026-05-05T12:55:00Z
3
value 0.00369
scoring_system epss
scoring_elements 0.58713
published_at 2026-04-01T12:55:00Z
4
value 0.00369
scoring_system epss
scoring_elements 0.58787
published_at 2026-04-02T12:55:00Z
5
value 0.00369
scoring_system epss
scoring_elements 0.58809
published_at 2026-04-04T12:55:00Z
6
value 0.00369
scoring_system epss
scoring_elements 0.58777
published_at 2026-04-07T12:55:00Z
7
value 0.00369
scoring_system epss
scoring_elements 0.58829
published_at 2026-04-26T12:55:00Z
8
value 0.00369
scoring_system epss
scoring_elements 0.58836
published_at 2026-04-12T12:55:00Z
9
value 0.00369
scoring_system epss
scoring_elements 0.58854
published_at 2026-04-18T12:55:00Z
10
value 0.00369
scoring_system epss
scoring_elements 0.58817
published_at 2026-04-13T12:55:00Z
11
value 0.00369
scoring_system epss
scoring_elements 0.58849
published_at 2026-04-16T12:55:00Z
12
value 0.00369
scoring_system epss
scoring_elements 0.58831
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6078
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19721
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6071
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6071
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6072
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6072
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6073
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6077
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6078
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6079
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6080
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6080
9
reference_url https://talosintelligence.com/vulnerability_reports/TALOS-2020-1001
reference_id
reference_type
scores
url https://talosintelligence.com/vulnerability_reports/TALOS-2020-1001
10
reference_url https://www.debian.org/security/2020/dsa-4671
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4671
11
reference_url https://security.archlinux.org/ASA-202004-24
reference_id ASA-202004-24
reference_type
scores
url https://security.archlinux.org/ASA-202004-24
12
reference_url https://security.archlinux.org/AVG-1136
reference_id AVG-1136
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1136
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolabs:libmicrodns:0.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolabs:libmicrodns:0.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolabs:libmicrodns:0.1.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-6078
reference_id CVE-2020-6078
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-6078
17
reference_url https://security.gentoo.org/glsa/202005-10
reference_id GLSA-202005-10
reference_type
scores
url https://security.gentoo.org/glsa/202005-10
18
reference_url https://usn.ubuntu.com/7239-1/
reference_id USN-7239-1
reference_type
scores
url https://usn.ubuntu.com/7239-1/
fixed_packages
0
url pkg:deb/debian/vlc@3.0.8-4?distro=trixie
purl pkg:deb/debian/vlc@3.0.8-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.8-4%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2020-6078
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kwv3-vghc-zubx
81
url VCID-mk9u-3hd7-kbha
vulnerability_id VCID-mk9u-3hd7-kbha
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could lead to user-assisted execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2194
reference_id
reference_type
scores
0
value 0.14436
scoring_system epss
scoring_elements 0.94392
published_at 2026-04-01T12:55:00Z
1
value 0.14436
scoring_system epss
scoring_elements 0.94399
published_at 2026-04-02T12:55:00Z
2
value 0.14436
scoring_system epss
scoring_elements 0.94411
published_at 2026-04-04T12:55:00Z
3
value 0.14436
scoring_system epss
scoring_elements 0.94413
published_at 2026-04-07T12:55:00Z
4
value 0.14436
scoring_system epss
scoring_elements 0.94422
published_at 2026-04-08T12:55:00Z
5
value 0.14436
scoring_system epss
scoring_elements 0.94426
published_at 2026-04-09T12:55:00Z
6
value 0.14436
scoring_system epss
scoring_elements 0.94429
published_at 2026-04-11T12:55:00Z
7
value 0.14436
scoring_system epss
scoring_elements 0.9443
published_at 2026-04-12T12:55:00Z
8
value 0.14436
scoring_system epss
scoring_elements 0.94431
published_at 2026-04-13T12:55:00Z
9
value 0.14436
scoring_system epss
scoring_elements 0.94446
published_at 2026-04-16T12:55:00Z
10
value 0.14436
scoring_system epss
scoring_elements 0.9445
published_at 2026-04-18T12:55:00Z
11
value 0.14436
scoring_system epss
scoring_elements 0.94453
published_at 2026-04-21T12:55:00Z
12
value 0.14436
scoring_system epss
scoring_elements 0.94454
published_at 2026-04-24T12:55:00Z
13
value 0.14436
scoring_system epss
scoring_elements 0.94452
published_at 2026-04-26T12:55:00Z
14
value 0.14436
scoring_system epss
scoring_elements 0.94451
published_at 2026-04-29T12:55:00Z
15
value 0.14436
scoring_system epss
scoring_elements 0.94455
published_at 2026-05-05T12:55:00Z
16
value 0.14436
scoring_system epss
scoring_elements 0.94462
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2194
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2194
2
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/17372.txt
reference_id CVE-2011-2194;OSVDB-73450
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/17372.txt
3
reference_url https://security.gentoo.org/glsa/201411-01
reference_id GLSA-201411-01
reference_type
scores
url https://security.gentoo.org/glsa/201411-01
fixed_packages
0
url pkg:deb/debian/vlc@1.1.10-1?distro=trixie
purl pkg:deb/debian/vlc@1.1.10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@1.1.10-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2011-2194
risk_score 0.2
exploitability 2.0
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mk9u-3hd7-kbha
82
url VCID-mqhd-5hv6-wfdp
vulnerability_id VCID-mqhd-5hv6-wfdp
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9300
reference_id
reference_type
scores
0
value 0.00339
scoring_system epss
scoring_elements 0.56618
published_at 2026-05-07T12:55:00Z
1
value 0.00339
scoring_system epss
scoring_elements 0.56705
published_at 2026-04-18T12:55:00Z
2
value 0.00339
scoring_system epss
scoring_elements 0.56678
published_at 2026-04-21T12:55:00Z
3
value 0.00339
scoring_system epss
scoring_elements 0.56616
published_at 2026-04-29T12:55:00Z
4
value 0.00339
scoring_system epss
scoring_elements 0.56633
published_at 2026-04-26T12:55:00Z
5
value 0.00339
scoring_system epss
scoring_elements 0.56572
published_at 2026-05-05T12:55:00Z
6
value 0.00438
scoring_system epss
scoring_elements 0.63146
published_at 2026-04-11T12:55:00Z
7
value 0.00438
scoring_system epss
scoring_elements 0.63007
published_at 2026-04-01T12:55:00Z
8
value 0.00438
scoring_system epss
scoring_elements 0.63109
published_at 2026-04-13T12:55:00Z
9
value 0.00438
scoring_system epss
scoring_elements 0.63144
published_at 2026-04-16T12:55:00Z
10
value 0.00438
scoring_system epss
scoring_elements 0.63131
published_at 2026-04-12T12:55:00Z
11
value 0.00438
scoring_system epss
scoring_elements 0.63066
published_at 2026-04-02T12:55:00Z
12
value 0.00438
scoring_system epss
scoring_elements 0.63095
published_at 2026-04-04T12:55:00Z
13
value 0.00438
scoring_system epss
scoring_elements 0.6306
published_at 2026-04-07T12:55:00Z
14
value 0.00438
scoring_system epss
scoring_elements 0.63112
published_at 2026-04-08T12:55:00Z
15
value 0.00438
scoring_system epss
scoring_elements 0.63129
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9300
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10699
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10699
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9300
3
reference_url https://security.archlinux.org/ASA-201712-4
reference_id ASA-201712-4
reference_type
scores
url https://security.archlinux.org/ASA-201712-4
4
reference_url https://security.archlinux.org/AVG-533
reference_id AVG-533
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-533
fixed_packages
0
url pkg:deb/debian/vlc@2.2.6-3?distro=trixie
purl pkg:deb/debian/vlc@2.2.6-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@2.2.6-3%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2017-9300
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mqhd-5hv6-wfdp
83
url VCID-mv5q-5yep-auga
vulnerability_id VCID-mv5q-5yep-auga
summary
Multiple vulnerabilities were found in VLC, allowing for the execution of
    arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1881
reference_id
reference_type
scores
0
value 0.53989
scoring_system epss
scoring_elements 0.97991
published_at 2026-04-01T12:55:00Z
1
value 0.53989
scoring_system epss
scoring_elements 0.97996
published_at 2026-04-02T12:55:00Z
2
value 0.53989
scoring_system epss
scoring_elements 0.97998
published_at 2026-04-04T12:55:00Z
3
value 0.53989
scoring_system epss
scoring_elements 0.98
published_at 2026-04-07T12:55:00Z
4
value 0.53989
scoring_system epss
scoring_elements 0.98004
published_at 2026-04-08T12:55:00Z
5
value 0.53989
scoring_system epss
scoring_elements 0.98006
published_at 2026-04-09T12:55:00Z
6
value 0.53989
scoring_system epss
scoring_elements 0.9801
published_at 2026-04-11T12:55:00Z
7
value 0.53989
scoring_system epss
scoring_elements 0.98011
published_at 2026-04-12T12:55:00Z
8
value 0.53989
scoring_system epss
scoring_elements 0.98012
published_at 2026-04-13T12:55:00Z
9
value 0.53989
scoring_system epss
scoring_elements 0.98017
published_at 2026-04-29T12:55:00Z
10
value 0.53989
scoring_system epss
scoring_elements 0.98014
published_at 2026-04-26T12:55:00Z
11
value 0.53989
scoring_system epss
scoring_elements 0.98024
published_at 2026-05-05T12:55:00Z
12
value 0.53989
scoring_system epss
scoring_elements 0.98021
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1881
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1881
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=477805
reference_id 477805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=477805
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/5250.cpp
reference_id CVE-2008-1881
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/5250.cpp
4
reference_url https://security.gentoo.org/glsa/200804-25
reference_id GLSA-200804-25
reference_type
scores
url https://security.gentoo.org/glsa/200804-25
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/5667.py
reference_id OSVDB-44461;CVE-2008-1881
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/5667.py
fixed_packages
0
url pkg:deb/debian/vlc@0.8.6.e-2.1?distro=trixie
purl pkg:deb/debian/vlc@0.8.6.e-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0.8.6.e-2.1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2008-1881
risk_score 1.0
exploitability 2.0
weighted_severity 0.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mv5q-5yep-auga
84
url VCID-n7b1-57e8-m3bg
vulnerability_id VCID-n7b1-57e8-m3bg
summary
A vulnerability has been discovered in VLC media player, allowing for the
    remote execution of arbitrary code.
references
0
reference_url http://osvdb.org/37379
reference_id
reference_type
scores
url http://osvdb.org/37379
1
reference_url http://osvdb.org/37380
reference_id
reference_type
scores
url http://osvdb.org/37380
2
reference_url http://osvdb.org/37381
reference_id
reference_type
scores
url http://osvdb.org/37381
3
reference_url http://osvdb.org/37382
reference_id
reference_type
scores
url http://osvdb.org/37382
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3316
reference_id
reference_type
scores
0
value 0.30256
scoring_system epss
scoring_elements 0.9671
published_at 2026-05-07T12:55:00Z
1
value 0.30256
scoring_system epss
scoring_elements 0.96649
published_at 2026-04-01T12:55:00Z
2
value 0.30256
scoring_system epss
scoring_elements 0.96658
published_at 2026-04-02T12:55:00Z
3
value 0.30256
scoring_system epss
scoring_elements 0.96663
published_at 2026-04-04T12:55:00Z
4
value 0.30256
scoring_system epss
scoring_elements 0.96667
published_at 2026-04-07T12:55:00Z
5
value 0.30256
scoring_system epss
scoring_elements 0.96675
published_at 2026-04-08T12:55:00Z
6
value 0.30256
scoring_system epss
scoring_elements 0.96677
published_at 2026-04-09T12:55:00Z
7
value 0.30256
scoring_system epss
scoring_elements 0.96679
published_at 2026-04-12T12:55:00Z
8
value 0.30256
scoring_system epss
scoring_elements 0.96682
published_at 2026-04-13T12:55:00Z
9
value 0.30256
scoring_system epss
scoring_elements 0.96688
published_at 2026-04-16T12:55:00Z
10
value 0.30256
scoring_system epss
scoring_elements 0.96693
published_at 2026-04-18T12:55:00Z
11
value 0.30256
scoring_system epss
scoring_elements 0.96696
published_at 2026-04-21T12:55:00Z
12
value 0.30256
scoring_system epss
scoring_elements 0.96695
published_at 2026-04-24T12:55:00Z
13
value 0.30256
scoring_system epss
scoring_elements 0.96698
published_at 2026-04-26T12:55:00Z
14
value 0.30256
scoring_system epss
scoring_elements 0.967
published_at 2026-04-29T12:55:00Z
15
value 0.30256
scoring_system epss
scoring_elements 0.96707
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3316
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3316
6
reference_url http://secunia.com/advisories/25753
reference_id
reference_type
scores
url http://secunia.com/advisories/25753
7
reference_url http://secunia.com/advisories/25980
reference_id
reference_type
scores
url http://secunia.com/advisories/25980
8
reference_url http://secunia.com/advisories/26269
reference_id
reference_type
scores
url http://secunia.com/advisories/26269
9
reference_url http://security.gentoo.org/glsa/glsa-200707-12.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200707-12.xml
10
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14600
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14600
11
reference_url http://www.debian.org/security/2007/dsa-1332
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1332
12
reference_url http://www.isecpartners.com/advisories/2007-001-vlc.txt
reference_id
reference_type
scores
url http://www.isecpartners.com/advisories/2007-001-vlc.txt
13
reference_url http://www.kb.cert.org/vuls/id/200928
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/200928
14
reference_url http://www.securityfocus.com/archive/1/471933/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/471933/100/0/threaded
15
reference_url http://www.securityfocus.com/bid/24555
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24555
16
reference_url http://www.videolan.org/sa0702.html
reference_id
reference_type
scores
url http://www.videolan.org/sa0702.html
17
reference_url http://www.vupen.com/english/advisories/2007/2262
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2262
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=429726
reference_id 429726
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=429726
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-3316
reference_id CVE-2007-3316
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-3316
22
reference_url https://security.gentoo.org/glsa/200707-12
reference_id GLSA-200707-12
reference_type
scores
url https://security.gentoo.org/glsa/200707-12
fixed_packages
0
url pkg:deb/debian/vlc@0.8.6.c-1?distro=trixie
purl pkg:deb/debian/vlc@0.8.6.c-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0.8.6.c-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2007-3316
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n7b1-57e8-m3bg
85
url VCID-nj42-shvd-wugk
vulnerability_id VCID-nj42-shvd-wugk
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could lead to user-assisted execution of arbitrary code.
references
0
reference_url http://openwall.com/lists/oss-security/2012/10/24/3
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2012/10/24/3
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-5470
reference_id
reference_type
scores
0
value 0.16977
scoring_system epss
scoring_elements 0.95008
published_at 2026-05-07T12:55:00Z
1
value 0.16977
scoring_system epss
scoring_elements 0.94943
published_at 2026-04-01T12:55:00Z
2
value 0.16977
scoring_system epss
scoring_elements 0.94952
published_at 2026-04-02T12:55:00Z
3
value 0.16977
scoring_system epss
scoring_elements 0.94954
published_at 2026-04-04T12:55:00Z
4
value 0.16977
scoring_system epss
scoring_elements 0.94956
published_at 2026-04-07T12:55:00Z
5
value 0.16977
scoring_system epss
scoring_elements 0.94965
published_at 2026-04-08T12:55:00Z
6
value 0.16977
scoring_system epss
scoring_elements 0.94969
published_at 2026-04-09T12:55:00Z
7
value 0.16977
scoring_system epss
scoring_elements 0.94974
published_at 2026-04-11T12:55:00Z
8
value 0.16977
scoring_system epss
scoring_elements 0.94976
published_at 2026-04-12T12:55:00Z
9
value 0.16977
scoring_system epss
scoring_elements 0.94978
published_at 2026-04-13T12:55:00Z
10
value 0.16977
scoring_system epss
scoring_elements 0.94986
published_at 2026-04-16T12:55:00Z
11
value 0.16977
scoring_system epss
scoring_elements 0.9499
published_at 2026-04-18T12:55:00Z
12
value 0.16977
scoring_system epss
scoring_elements 0.94992
published_at 2026-04-26T12:55:00Z
13
value 0.16977
scoring_system epss
scoring_elements 0.94993
published_at 2026-04-29T12:55:00Z
14
value 0.16977
scoring_system epss
scoring_elements 0.95001
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-5470
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5470
3
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15540
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15540
4
reference_url http://www.exploit-db.com/exploits/21889/
reference_id
reference_type
scores
url http://www.exploit-db.com/exploits/21889/
5
reference_url http://www.securityfocus.com/bid/55850
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55850
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692130
reference_id 692130
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692130
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.3:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-5470
reference_id CVE-2012-5470
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-5470
9
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/21889.pl
reference_id CVE-2012-5470;OSVDB-86685
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/21889.pl
10
reference_url https://security.gentoo.org/glsa/201411-01
reference_id GLSA-201411-01
reference_type
scores
url https://security.gentoo.org/glsa/201411-01
fixed_packages
0
url pkg:deb/debian/vlc@2.0.4-1?distro=trixie
purl pkg:deb/debian/vlc@2.0.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@2.0.4-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2012-5470
risk_score 7.8
exploitability 2.0
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nj42-shvd-wugk
86
url VCID-nnx3-tewc-vfgx
vulnerability_id VCID-nnx3-tewc-vfgx
summary VLC media player 1.1.11 allows remote attackers to cause a denial of service (crash) via a long string in an amr file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0904
reference_id
reference_type
scores
0
value 0.08336
scoring_system epss
scoring_elements 0.92251
published_at 2026-04-01T12:55:00Z
1
value 0.08336
scoring_system epss
scoring_elements 0.92258
published_at 2026-04-02T12:55:00Z
2
value 0.08336
scoring_system epss
scoring_elements 0.92264
published_at 2026-04-04T12:55:00Z
3
value 0.08336
scoring_system epss
scoring_elements 0.92266
published_at 2026-04-07T12:55:00Z
4
value 0.08336
scoring_system epss
scoring_elements 0.92278
published_at 2026-04-08T12:55:00Z
5
value 0.08336
scoring_system epss
scoring_elements 0.92282
published_at 2026-04-09T12:55:00Z
6
value 0.08336
scoring_system epss
scoring_elements 0.92288
published_at 2026-04-11T12:55:00Z
7
value 0.08336
scoring_system epss
scoring_elements 0.92289
published_at 2026-04-12T12:55:00Z
8
value 0.08336
scoring_system epss
scoring_elements 0.92286
published_at 2026-04-13T12:55:00Z
9
value 0.08336
scoring_system epss
scoring_elements 0.92298
published_at 2026-04-21T12:55:00Z
10
value 0.08336
scoring_system epss
scoring_elements 0.92303
published_at 2026-04-24T12:55:00Z
11
value 0.08336
scoring_system epss
scoring_elements 0.92304
published_at 2026-04-26T12:55:00Z
12
value 0.08336
scoring_system epss
scoring_elements 0.923
published_at 2026-04-29T12:55:00Z
13
value 0.08336
scoring_system epss
scoring_elements 0.9231
published_at 2026-05-05T12:55:00Z
14
value 0.08336
scoring_system epss
scoring_elements 0.92321
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0904
1
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/18309.pl
reference_id OSVDB-78618;CVE-2012-0904
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/18309.pl
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2012-0904
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nnx3-tewc-vfgx
87
url VCID-p7du-wut5-1qb7
vulnerability_id VCID-p7du-wut5-1qb7
summary plugins\audio_filter\libmpgatofixed32_plugin.dll in VideoLAN VLC media player 2.2.4 allows remote attackers to cause a denial of service (invalid read and application crash) or possibly have unspecified other impact via a crafted file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9301
reference_id
reference_type
scores
0
value 0.00421
scoring_system epss
scoring_elements 0.61871
published_at 2026-04-01T12:55:00Z
1
value 0.00421
scoring_system epss
scoring_elements 0.61944
published_at 2026-04-02T12:55:00Z
2
value 0.00421
scoring_system epss
scoring_elements 0.61974
published_at 2026-04-04T12:55:00Z
3
value 0.00421
scoring_system epss
scoring_elements 0.61943
published_at 2026-04-07T12:55:00Z
4
value 0.00421
scoring_system epss
scoring_elements 0.61993
published_at 2026-04-08T12:55:00Z
5
value 0.00421
scoring_system epss
scoring_elements 0.6201
published_at 2026-04-09T12:55:00Z
6
value 0.00421
scoring_system epss
scoring_elements 0.62031
published_at 2026-04-11T12:55:00Z
7
value 0.00421
scoring_system epss
scoring_elements 0.6202
published_at 2026-04-12T12:55:00Z
8
value 0.00421
scoring_system epss
scoring_elements 0.61999
published_at 2026-04-13T12:55:00Z
9
value 0.00421
scoring_system epss
scoring_elements 0.62042
published_at 2026-04-16T12:55:00Z
10
value 0.00421
scoring_system epss
scoring_elements 0.62047
published_at 2026-04-18T12:55:00Z
11
value 0.00421
scoring_system epss
scoring_elements 0.62029
published_at 2026-04-21T12:55:00Z
12
value 0.00421
scoring_system epss
scoring_elements 0.62027
published_at 2026-04-24T12:55:00Z
13
value 0.00421
scoring_system epss
scoring_elements 0.62044
published_at 2026-04-26T12:55:00Z
14
value 0.00421
scoring_system epss
scoring_elements 0.62036
published_at 2026-04-29T12:55:00Z
15
value 0.00421
scoring_system epss
scoring_elements 0.61982
published_at 2026-05-05T12:55:00Z
16
value 0.00421
scoring_system epss
scoring_elements 0.6203
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9301
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9301
fixed_packages
0
url pkg:deb/debian/vlc@2.2.5.1-1?distro=trixie
purl pkg:deb/debian/vlc@2.2.5.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@2.2.5.1-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2017-9301
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p7du-wut5-1qb7
88
url VCID-pcrh-w3mj-f7ax
vulnerability_id VCID-pcrh-w3mj-f7ax
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could lead to user-assisted execution of arbitrary code.
references
0
reference_url http://openwall.com/lists/oss-security/2010/04/28/4
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/04/28/4
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1445
reference_id
reference_type
scores
0
value 0.01795
scoring_system epss
scoring_elements 0.82885
published_at 2026-05-07T12:55:00Z
1
value 0.01795
scoring_system epss
scoring_elements 0.82702
published_at 2026-04-01T12:55:00Z
2
value 0.01795
scoring_system epss
scoring_elements 0.82718
published_at 2026-04-02T12:55:00Z
3
value 0.01795
scoring_system epss
scoring_elements 0.82731
published_at 2026-04-04T12:55:00Z
4
value 0.01795
scoring_system epss
scoring_elements 0.82728
published_at 2026-04-07T12:55:00Z
5
value 0.01795
scoring_system epss
scoring_elements 0.82753
published_at 2026-04-08T12:55:00Z
6
value 0.01795
scoring_system epss
scoring_elements 0.8276
published_at 2026-04-09T12:55:00Z
7
value 0.01795
scoring_system epss
scoring_elements 0.82776
published_at 2026-04-11T12:55:00Z
8
value 0.01795
scoring_system epss
scoring_elements 0.82771
published_at 2026-04-12T12:55:00Z
9
value 0.01795
scoring_system epss
scoring_elements 0.82767
published_at 2026-04-13T12:55:00Z
10
value 0.01795
scoring_system epss
scoring_elements 0.82805
published_at 2026-04-18T12:55:00Z
11
value 0.01795
scoring_system epss
scoring_elements 0.82808
published_at 2026-04-21T12:55:00Z
12
value 0.01795
scoring_system epss
scoring_elements 0.8283
published_at 2026-04-24T12:55:00Z
13
value 0.01795
scoring_system epss
scoring_elements 0.82839
published_at 2026-04-26T12:55:00Z
14
value 0.01795
scoring_system epss
scoring_elements 0.82845
published_at 2026-04-29T12:55:00Z
15
value 0.01795
scoring_system epss
scoring_elements 0.82864
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1445
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1445
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1445
3
reference_url http://www.videolan.org/security/sa1003.html
reference_id
reference_type
scores
url http://www.videolan.org/security/sa1003.html
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1337:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.1337:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1337:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-1445
reference_id CVE-2010-1445
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-1445
49
reference_url https://security.gentoo.org/glsa/201411-01
reference_id GLSA-201411-01
reference_type
scores
url https://security.gentoo.org/glsa/201411-01
fixed_packages
0
url pkg:deb/debian/vlc@1.0.6-1?distro=trixie
purl pkg:deb/debian/vlc@1.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@1.0.6-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2010-1445
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pcrh-w3mj-f7ax
89
url VCID-ph4f-3u7p-f3d8
vulnerability_id VCID-ph4f-3u7p-f3d8
summary Integer overflow in the __status_Update function in stats.c VideoLAN VLC Media Player before 0.8.6c allows remote attackers to cause a denial of service (crash) via a WAV file with a large sample rate.
references
0
reference_url http://osvdb.org/42189
reference_id
reference_type
scores
url http://osvdb.org/42189
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3467
reference_id
reference_type
scores
0
value 0.0103
scoring_system epss
scoring_elements 0.77438
published_at 2026-05-07T12:55:00Z
1
value 0.0103
scoring_system epss
scoring_elements 0.77258
published_at 2026-04-01T12:55:00Z
2
value 0.0103
scoring_system epss
scoring_elements 0.77265
published_at 2026-04-02T12:55:00Z
3
value 0.0103
scoring_system epss
scoring_elements 0.77293
published_at 2026-04-04T12:55:00Z
4
value 0.0103
scoring_system epss
scoring_elements 0.77275
published_at 2026-04-07T12:55:00Z
5
value 0.0103
scoring_system epss
scoring_elements 0.77306
published_at 2026-04-08T12:55:00Z
6
value 0.0103
scoring_system epss
scoring_elements 0.77315
published_at 2026-04-09T12:55:00Z
7
value 0.0103
scoring_system epss
scoring_elements 0.77342
published_at 2026-04-11T12:55:00Z
8
value 0.0103
scoring_system epss
scoring_elements 0.77321
published_at 2026-04-12T12:55:00Z
9
value 0.0103
scoring_system epss
scoring_elements 0.77318
published_at 2026-04-13T12:55:00Z
10
value 0.0103
scoring_system epss
scoring_elements 0.77358
published_at 2026-04-16T12:55:00Z
11
value 0.0103
scoring_system epss
scoring_elements 0.77357
published_at 2026-04-18T12:55:00Z
12
value 0.0103
scoring_system epss
scoring_elements 0.77349
published_at 2026-04-21T12:55:00Z
13
value 0.0103
scoring_system epss
scoring_elements 0.77384
published_at 2026-04-24T12:55:00Z
14
value 0.0103
scoring_system epss
scoring_elements 0.7739
published_at 2026-04-26T12:55:00Z
15
value 0.0103
scoring_system epss
scoring_elements 0.77403
published_at 2026-04-29T12:55:00Z
16
value 0.0103
scoring_system epss
scoring_elements 0.77411
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3467
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3467
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3467
3
reference_url http://secunia.com/advisories/25980
reference_id
reference_type
scores
url http://secunia.com/advisories/25980
4
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14863
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14863
5
reference_url http://www.debian.org/security/2007/dsa-1332
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1332
6
reference_url http://www.isecpartners.com/advisories/2007-001-vlc.txt
reference_id
reference_type
scores
url http://www.isecpartners.com/advisories/2007-001-vlc.txt
7
reference_url http://www.securityfocus.com/archive/1/471933/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/471933/100/0/threaded
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=429726
reference_id 429726
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=429726
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-3467
reference_id CVE-2007-3467
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-3467
fixed_packages
0
url pkg:deb/debian/vlc@0.8.6.c-1?distro=trixie
purl pkg:deb/debian/vlc@0.8.6.c-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0.8.6.c-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2007-3467
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ph4f-3u7p-f3d8
90
url VCID-pmkx-83qk-tkhs
vulnerability_id VCID-pmkx-83qk-tkhs
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-11529
reference_id
reference_type
scores
0
value 0.73818
scoring_system epss
scoring_elements 0.98838
published_at 2026-05-07T12:55:00Z
1
value 0.73818
scoring_system epss
scoring_elements 0.98833
published_at 2026-04-29T12:55:00Z
2
value 0.73818
scoring_system epss
scoring_elements 0.98837
published_at 2026-05-05T12:55:00Z
3
value 0.73818
scoring_system epss
scoring_elements 0.98808
published_at 2026-04-01T12:55:00Z
4
value 0.73818
scoring_system epss
scoring_elements 0.98809
published_at 2026-04-02T12:55:00Z
5
value 0.73818
scoring_system epss
scoring_elements 0.98812
published_at 2026-04-04T12:55:00Z
6
value 0.73818
scoring_system epss
scoring_elements 0.98815
published_at 2026-04-07T12:55:00Z
7
value 0.73818
scoring_system epss
scoring_elements 0.98816
published_at 2026-04-09T12:55:00Z
8
value 0.73818
scoring_system epss
scoring_elements 0.98818
published_at 2026-04-11T12:55:00Z
9
value 0.73818
scoring_system epss
scoring_elements 0.98819
published_at 2026-04-12T12:55:00Z
10
value 0.73818
scoring_system epss
scoring_elements 0.9882
published_at 2026-04-13T12:55:00Z
11
value 0.73818
scoring_system epss
scoring_elements 0.98824
published_at 2026-04-16T12:55:00Z
12
value 0.73818
scoring_system epss
scoring_elements 0.98826
published_at 2026-04-18T12:55:00Z
13
value 0.73818
scoring_system epss
scoring_elements 0.98828
published_at 2026-04-21T12:55:00Z
14
value 0.73818
scoring_system epss
scoring_elements 0.98832
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-11529
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11529
2
reference_url http://seclists.org/fulldisclosure/2018/Jul/28
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2018/Jul/28
3
reference_url https://www.debian.org/security/2018/dsa-4251
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4251
4
reference_url https://www.exploit-db.com/exploits/45626/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/45626/
5
reference_url http://www.securitytracker.com/id/1041311
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1041311
6
reference_url https://security.archlinux.org/AVG-755
reference_id AVG-755
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-755
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
9
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/45626.rb
reference_id CVE-2018-11529
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/45626.rb
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-11529
reference_id CVE-2018-11529
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-11529
11
reference_url https://raw.githubusercontent.com/rapid7/metasploit-framework/fb689da24c9de2ccda6707c6cfe0d053a4844dfd/modules/exploits/windows/fileformat/vlc_mkv.rb
reference_id CVE-2018-11529
reference_type exploit
scores
url https://raw.githubusercontent.com/rapid7/metasploit-framework/fb689da24c9de2ccda6707c6cfe0d053a4844dfd/modules/exploits/windows/fileformat/vlc_mkv.rb
12
reference_url https://usn.ubuntu.com/USN-4805-1/
reference_id USN-USN-4805-1
reference_type
scores
url https://usn.ubuntu.com/USN-4805-1/
fixed_packages
0
url pkg:deb/debian/vlc@3.0.3-1-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.3-1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.3-1-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2018-11529
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pmkx-83qk-tkhs
91
url VCID-pwwt-2djv-nfdj
vulnerability_id VCID-pwwt-2djv-nfdj
summary Stack-based buffer overflow in the Win32AddConnection function in modules/access/smb.c in VideoLAN VLC media player 0.9.9, when running on Microsoft Windows, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a long smb URI in a playlist file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-2484
reference_id
reference_type
scores
0
value 0.71229
scoring_system epss
scoring_elements 0.98702
published_at 2026-04-01T12:55:00Z
1
value 0.71229
scoring_system epss
scoring_elements 0.98703
published_at 2026-04-02T12:55:00Z
2
value 0.71229
scoring_system epss
scoring_elements 0.98706
published_at 2026-04-04T12:55:00Z
3
value 0.71229
scoring_system epss
scoring_elements 0.9871
published_at 2026-04-09T12:55:00Z
4
value 0.71229
scoring_system epss
scoring_elements 0.98713
published_at 2026-04-12T12:55:00Z
5
value 0.71229
scoring_system epss
scoring_elements 0.98714
published_at 2026-04-13T12:55:00Z
6
value 0.71229
scoring_system epss
scoring_elements 0.98716
published_at 2026-04-16T12:55:00Z
7
value 0.71229
scoring_system epss
scoring_elements 0.98718
published_at 2026-04-18T12:55:00Z
8
value 0.71229
scoring_system epss
scoring_elements 0.98719
published_at 2026-04-21T12:55:00Z
9
value 0.71229
scoring_system epss
scoring_elements 0.98723
published_at 2026-04-26T12:55:00Z
10
value 0.71229
scoring_system epss
scoring_elements 0.98725
published_at 2026-04-29T12:55:00Z
11
value 0.71229
scoring_system epss
scoring_elements 0.9873
published_at 2026-05-05T12:55:00Z
12
value 0.71229
scoring_system epss
scoring_elements 0.98732
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-2484
1
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows_x86/local/16678.rb
reference_id CVE-2009-2484;OSVDB-55509
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows_x86/local/16678.rb
2
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/9029.rb
reference_id OSVDB-55509;CVE-2009-2484
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/9029.rb
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2009-2484
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pwwt-2djv-nfdj
92
url VCID-q6jt-16jx-kyf3
vulnerability_id VCID-q6jt-16jx-kyf3
summary A binary hijacking vulnerability exists within the VideoLAN VLC media player before 3.0.19 on Windows. The uninstaller attempts to execute code with elevated privileges out of a standard user writable location. Standard users may use this to gain arbitrary code execution as SYSTEM.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-46814
reference_id
reference_type
scores
0
value 0.00107
scoring_system epss
scoring_elements 0.28479
published_at 2026-05-07T12:55:00Z
1
value 0.00107
scoring_system epss
scoring_elements 0.29045
published_at 2026-04-02T12:55:00Z
2
value 0.00107
scoring_system epss
scoring_elements 0.29095
published_at 2026-04-04T12:55:00Z
3
value 0.00107
scoring_system epss
scoring_elements 0.28904
published_at 2026-04-07T12:55:00Z
4
value 0.00107
scoring_system epss
scoring_elements 0.28971
published_at 2026-04-08T12:55:00Z
5
value 0.00107
scoring_system epss
scoring_elements 0.29014
published_at 2026-04-09T12:55:00Z
6
value 0.00107
scoring_system epss
scoring_elements 0.29018
published_at 2026-04-11T12:55:00Z
7
value 0.00107
scoring_system epss
scoring_elements 0.28973
published_at 2026-04-12T12:55:00Z
8
value 0.00107
scoring_system epss
scoring_elements 0.28923
published_at 2026-04-13T12:55:00Z
9
value 0.00107
scoring_system epss
scoring_elements 0.28948
published_at 2026-04-16T12:55:00Z
10
value 0.00107
scoring_system epss
scoring_elements 0.28924
published_at 2026-04-18T12:55:00Z
11
value 0.00107
scoring_system epss
scoring_elements 0.28878
published_at 2026-04-21T12:55:00Z
12
value 0.00107
scoring_system epss
scoring_elements 0.28758
published_at 2026-04-24T12:55:00Z
13
value 0.00107
scoring_system epss
scoring_elements 0.28647
published_at 2026-04-26T12:55:00Z
14
value 0.00107
scoring_system epss
scoring_elements 0.28578
published_at 2026-04-29T12:55:00Z
15
value 0.00107
scoring_system epss
scoring_elements 0.28421
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-46814
1
reference_url https://www.videolan.org/security/sb-vlc3019.html
reference_id sb-vlc3019.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T15:15:48Z/
url https://www.videolan.org/security/sb-vlc3019.html
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2023-46814
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q6jt-16jx-kyf3
93
url VCID-q6tb-dwn6-jbht
vulnerability_id VCID-q6tb-dwn6-jbht
summary
Multiple vulnerabilities have been found in VLC allowing remote
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1684
reference_id
reference_type
scores
0
value 0.1275
scoring_system epss
scoring_elements 0.93965
published_at 2026-04-01T12:55:00Z
1
value 0.1275
scoring_system epss
scoring_elements 0.93974
published_at 2026-04-02T12:55:00Z
2
value 0.1275
scoring_system epss
scoring_elements 0.93983
published_at 2026-04-04T12:55:00Z
3
value 0.1275
scoring_system epss
scoring_elements 0.93986
published_at 2026-04-07T12:55:00Z
4
value 0.1275
scoring_system epss
scoring_elements 0.93995
published_at 2026-04-08T12:55:00Z
5
value 0.1275
scoring_system epss
scoring_elements 0.93998
published_at 2026-04-09T12:55:00Z
6
value 0.1275
scoring_system epss
scoring_elements 0.94003
published_at 2026-04-13T12:55:00Z
7
value 0.1275
scoring_system epss
scoring_elements 0.94018
published_at 2026-04-16T12:55:00Z
8
value 0.1275
scoring_system epss
scoring_elements 0.94023
published_at 2026-04-29T12:55:00Z
9
value 0.1275
scoring_system epss
scoring_elements 0.94025
published_at 2026-04-24T12:55:00Z
10
value 0.1275
scoring_system epss
scoring_elements 0.94024
published_at 2026-04-26T12:55:00Z
11
value 0.1275
scoring_system epss
scoring_elements 0.94032
published_at 2026-05-05T12:55:00Z
12
value 0.1275
scoring_system epss
scoring_elements 0.94045
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1684
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1684
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1684
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=743033
reference_id 743033
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=743033
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/31429.py
reference_id CVE-2014-1684;OSVDB-103019
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/31429.py
4
reference_url https://security.gentoo.org/glsa/201603-08
reference_id GLSA-201603-08
reference_type
scores
url https://security.gentoo.org/glsa/201603-08
fixed_packages
0
url pkg:deb/debian/vlc@2.1.4-1?distro=trixie
purl pkg:deb/debian/vlc@2.1.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@2.1.4-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2014-1684
risk_score 0.2
exploitability 2.0
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q6tb-dwn6-jbht
94
url VCID-q8b1-xhw4-8qhh
vulnerability_id VCID-q8b1-xhw4-8qhh
summary
Multiple vulnerabilities in VLC may lead to the remote execution of
    arbitrary code.
references
0
reference_url http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=d19de4e9f2211cbe5bde00726b66c47a424f4e07
reference_id
reference_type
scores
url http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=d19de4e9f2211cbe5bde00726b66c47a424f4e07
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5276
reference_id
reference_type
scores
0
value 0.05924
scoring_system epss
scoring_elements 0.90674
published_at 2026-05-07T12:55:00Z
1
value 0.05924
scoring_system epss
scoring_elements 0.9057
published_at 2026-04-01T12:55:00Z
2
value 0.05924
scoring_system epss
scoring_elements 0.90575
published_at 2026-04-02T12:55:00Z
3
value 0.05924
scoring_system epss
scoring_elements 0.90585
published_at 2026-04-04T12:55:00Z
4
value 0.05924
scoring_system epss
scoring_elements 0.90594
published_at 2026-04-07T12:55:00Z
5
value 0.05924
scoring_system epss
scoring_elements 0.90605
published_at 2026-04-08T12:55:00Z
6
value 0.05924
scoring_system epss
scoring_elements 0.90611
published_at 2026-04-09T12:55:00Z
7
value 0.05924
scoring_system epss
scoring_elements 0.9062
published_at 2026-04-12T12:55:00Z
8
value 0.05924
scoring_system epss
scoring_elements 0.90615
published_at 2026-04-13T12:55:00Z
9
value 0.05924
scoring_system epss
scoring_elements 0.90634
published_at 2026-04-16T12:55:00Z
10
value 0.05924
scoring_system epss
scoring_elements 0.90631
published_at 2026-04-18T12:55:00Z
11
value 0.05924
scoring_system epss
scoring_elements 0.90628
published_at 2026-04-21T12:55:00Z
12
value 0.05924
scoring_system epss
scoring_elements 0.90643
published_at 2026-04-24T12:55:00Z
13
value 0.05924
scoring_system epss
scoring_elements 0.90645
published_at 2026-04-26T12:55:00Z
14
value 0.05924
scoring_system epss
scoring_elements 0.90642
published_at 2026-04-29T12:55:00Z
15
value 0.05924
scoring_system epss
scoring_elements 0.90655
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5276
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5276
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5276
3
reference_url http://secunia.com/advisories/32942
reference_id
reference_type
scores
url http://secunia.com/advisories/32942
4
reference_url http://secunia.com/advisories/33315
reference_id
reference_type
scores
url http://secunia.com/advisories/33315
5
reference_url http://security.gentoo.org/glsa/glsa-200812-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200812-24.xml
6
reference_url http://securityreason.com/securityalert/4680
reference_id
reference_type
scores
url http://securityreason.com/securityalert/4680
7
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14793
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14793
8
reference_url http://www.osvdb.org/50333
reference_id
reference_type
scores
url http://www.osvdb.org/50333
9
reference_url http://www.securityfocus.com/archive/1/498768/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/498768/100/0/threaded
10
reference_url http://www.securityfocus.com/bid/32545
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32545
11
reference_url http://www.trapkit.de/advisories/TKADV2008-013.txt
reference_id
reference_type
scores
url http://www.trapkit.de/advisories/TKADV2008-013.txt
12
reference_url http://www.videolan.org/security/sa0811.html
reference_id
reference_type
scores
url http://www.videolan.org/security/sa0811.html
13
reference_url http://www.vupen.com/english/advisories/2008/3287
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/3287
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.7:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5276
reference_id CVE-2008-5276
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-5276
24
reference_url https://security.gentoo.org/glsa/200812-24
reference_id GLSA-200812-24
reference_type
scores
url https://security.gentoo.org/glsa/200812-24
fixed_packages
0
url pkg:deb/debian/vlc@0.9.8a-1?distro=trixie
purl pkg:deb/debian/vlc@0.9.8a-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0.9.8a-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2008-5276
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q8b1-xhw4-8qhh
95
url VCID-q98q-a3hk-zke5
vulnerability_id VCID-q98q-a3hk-zke5
summary input.c in VideoLAN VLC Media Player before 0.8.6c allows remote attackers to cause a denial of service (crash) via a crafted WAV file that causes an uninitialized i_nb_resamplers variable to be used.
references
0
reference_url http://osvdb.org/38992
reference_id
reference_type
scores
url http://osvdb.org/38992
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3468
reference_id
reference_type
scores
0
value 0.0103
scoring_system epss
scoring_elements 0.77438
published_at 2026-05-07T12:55:00Z
1
value 0.0103
scoring_system epss
scoring_elements 0.77258
published_at 2026-04-01T12:55:00Z
2
value 0.0103
scoring_system epss
scoring_elements 0.77265
published_at 2026-04-02T12:55:00Z
3
value 0.0103
scoring_system epss
scoring_elements 0.77293
published_at 2026-04-04T12:55:00Z
4
value 0.0103
scoring_system epss
scoring_elements 0.77275
published_at 2026-04-07T12:55:00Z
5
value 0.0103
scoring_system epss
scoring_elements 0.77306
published_at 2026-04-08T12:55:00Z
6
value 0.0103
scoring_system epss
scoring_elements 0.77315
published_at 2026-04-09T12:55:00Z
7
value 0.0103
scoring_system epss
scoring_elements 0.77342
published_at 2026-04-11T12:55:00Z
8
value 0.0103
scoring_system epss
scoring_elements 0.77321
published_at 2026-04-12T12:55:00Z
9
value 0.0103
scoring_system epss
scoring_elements 0.77318
published_at 2026-04-13T12:55:00Z
10
value 0.0103
scoring_system epss
scoring_elements 0.77358
published_at 2026-04-16T12:55:00Z
11
value 0.0103
scoring_system epss
scoring_elements 0.77357
published_at 2026-04-18T12:55:00Z
12
value 0.0103
scoring_system epss
scoring_elements 0.77349
published_at 2026-04-21T12:55:00Z
13
value 0.0103
scoring_system epss
scoring_elements 0.77384
published_at 2026-04-24T12:55:00Z
14
value 0.0103
scoring_system epss
scoring_elements 0.7739
published_at 2026-04-26T12:55:00Z
15
value 0.0103
scoring_system epss
scoring_elements 0.77403
published_at 2026-04-29T12:55:00Z
16
value 0.0103
scoring_system epss
scoring_elements 0.77411
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3468
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3468
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3468
3
reference_url http://secunia.com/advisories/25980
reference_id
reference_type
scores
url http://secunia.com/advisories/25980
4
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14744
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14744
5
reference_url http://www.debian.org/security/2007/dsa-1332
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1332
6
reference_url http://www.isecpartners.com/advisories/2007-001-vlc.txt
reference_id
reference_type
scores
url http://www.isecpartners.com/advisories/2007-001-vlc.txt
7
reference_url http://www.securityfocus.com/archive/1/471933/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/471933/100/0/threaded
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=429726
reference_id 429726
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=429726
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-3468
reference_id CVE-2007-3468
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-3468
fixed_packages
0
url pkg:deb/debian/vlc@0.8.6.c.debian-1?distro=trixie
purl pkg:deb/debian/vlc@0.8.6.c.debian-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0.8.6.c.debian-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2007-3468
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q98q-a3hk-zke5
96
url VCID-qb91-xxjz-7ka2
vulnerability_id VCID-qb91-xxjz-7ka2
summary
Multiple vulnerabilities in xine-lib might result in the remote execution
    of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5248
reference_id
reference_type
scores
0
value 0.00564
scoring_system epss
scoring_elements 0.68513
published_at 2026-05-07T12:55:00Z
1
value 0.00564
scoring_system epss
scoring_elements 0.68339
published_at 2026-04-01T12:55:00Z
2
value 0.00564
scoring_system epss
scoring_elements 0.68359
published_at 2026-04-02T12:55:00Z
3
value 0.00564
scoring_system epss
scoring_elements 0.68378
published_at 2026-04-04T12:55:00Z
4
value 0.00564
scoring_system epss
scoring_elements 0.68355
published_at 2026-04-07T12:55:00Z
5
value 0.00564
scoring_system epss
scoring_elements 0.68406
published_at 2026-04-08T12:55:00Z
6
value 0.00564
scoring_system epss
scoring_elements 0.68423
published_at 2026-04-09T12:55:00Z
7
value 0.00564
scoring_system epss
scoring_elements 0.68449
published_at 2026-04-11T12:55:00Z
8
value 0.00564
scoring_system epss
scoring_elements 0.68437
published_at 2026-04-12T12:55:00Z
9
value 0.00564
scoring_system epss
scoring_elements 0.68404
published_at 2026-04-13T12:55:00Z
10
value 0.00564
scoring_system epss
scoring_elements 0.68442
published_at 2026-04-16T12:55:00Z
11
value 0.00564
scoring_system epss
scoring_elements 0.68456
published_at 2026-04-18T12:55:00Z
12
value 0.00564
scoring_system epss
scoring_elements 0.68434
published_at 2026-04-21T12:55:00Z
13
value 0.00564
scoring_system epss
scoring_elements 0.68482
published_at 2026-04-24T12:55:00Z
14
value 0.00564
scoring_system epss
scoring_elements 0.68487
published_at 2026-04-26T12:55:00Z
15
value 0.00564
scoring_system epss
scoring_elements 0.68493
published_at 2026-04-29T12:55:00Z
16
value 0.00564
scoring_system epss
scoring_elements 0.68471
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5248
2
reference_url http://sourceforge.net/project/shownotes.php?release_id=619869
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?release_id=619869
3
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:298
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:298
4
reference_url http://www.securityfocus.com/bid/32505
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32505
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.14:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5248
reference_id CVE-2008-5248
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-5248
55
reference_url https://security.gentoo.org/glsa/201006-04
reference_id GLSA-201006-04
reference_type
scores
url https://security.gentoo.org/glsa/201006-04
56
reference_url https://usn.ubuntu.com/710-1/
reference_id USN-710-1
reference_type
scores
url https://usn.ubuntu.com/710-1/
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2008-5248
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qb91-xxjz-7ka2
97
url VCID-qnpn-fsz2-gqg4
vulnerability_id VCID-qnpn-fsz2-gqg4
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could lead to user-assisted execution of arbitrary code.
references
0
reference_url http://openwall.com/lists/oss-security/2010/04/28/4
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/04/28/4
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1441
reference_id
reference_type
scores
0
value 0.01795
scoring_system epss
scoring_elements 0.82885
published_at 2026-05-07T12:55:00Z
1
value 0.01795
scoring_system epss
scoring_elements 0.82702
published_at 2026-04-01T12:55:00Z
2
value 0.01795
scoring_system epss
scoring_elements 0.82718
published_at 2026-04-02T12:55:00Z
3
value 0.01795
scoring_system epss
scoring_elements 0.82731
published_at 2026-04-04T12:55:00Z
4
value 0.01795
scoring_system epss
scoring_elements 0.82728
published_at 2026-04-07T12:55:00Z
5
value 0.01795
scoring_system epss
scoring_elements 0.82753
published_at 2026-04-08T12:55:00Z
6
value 0.01795
scoring_system epss
scoring_elements 0.8276
published_at 2026-04-09T12:55:00Z
7
value 0.01795
scoring_system epss
scoring_elements 0.82776
published_at 2026-04-11T12:55:00Z
8
value 0.01795
scoring_system epss
scoring_elements 0.82771
published_at 2026-04-12T12:55:00Z
9
value 0.01795
scoring_system epss
scoring_elements 0.82767
published_at 2026-04-13T12:55:00Z
10
value 0.01795
scoring_system epss
scoring_elements 0.82805
published_at 2026-04-18T12:55:00Z
11
value 0.01795
scoring_system epss
scoring_elements 0.82808
published_at 2026-04-21T12:55:00Z
12
value 0.01795
scoring_system epss
scoring_elements 0.8283
published_at 2026-04-24T12:55:00Z
13
value 0.01795
scoring_system epss
scoring_elements 0.82839
published_at 2026-04-26T12:55:00Z
14
value 0.01795
scoring_system epss
scoring_elements 0.82845
published_at 2026-04-29T12:55:00Z
15
value 0.01795
scoring_system epss
scoring_elements 0.82864
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1441
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1441
3
reference_url http://www.videolan.org/security/sa1003.html
reference_id
reference_type
scores
url http://www.videolan.org/security/sa1003.html
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1337:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.1337:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1337:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-1441
reference_id CVE-2010-1441
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-1441
49
reference_url https://security.gentoo.org/glsa/201411-01
reference_id GLSA-201411-01
reference_type
scores
url https://security.gentoo.org/glsa/201411-01
fixed_packages
0
url pkg:deb/debian/vlc@1.0.6-1?distro=trixie
purl pkg:deb/debian/vlc@1.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@1.0.6-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2010-1441
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qnpn-fsz2-gqg4
98
url VCID-qq2u-797n-w7h4
vulnerability_id VCID-qq2u-797n-w7h4
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-47360
reference_id
reference_type
scores
0
value 0.00094
scoring_system epss
scoring_elements 0.26299
published_at 2026-04-02T12:55:00Z
1
value 0.00094
scoring_system epss
scoring_elements 0.2634
published_at 2026-04-04T12:55:00Z
2
value 0.00094
scoring_system epss
scoring_elements 0.26111
published_at 2026-04-07T12:55:00Z
3
value 0.00094
scoring_system epss
scoring_elements 0.26179
published_at 2026-04-08T12:55:00Z
4
value 0.00094
scoring_system epss
scoring_elements 0.26227
published_at 2026-04-09T12:55:00Z
5
value 0.00094
scoring_system epss
scoring_elements 0.26234
published_at 2026-04-11T12:55:00Z
6
value 0.00094
scoring_system epss
scoring_elements 0.26189
published_at 2026-04-12T12:55:00Z
7
value 0.00094
scoring_system epss
scoring_elements 0.2613
published_at 2026-04-13T12:55:00Z
8
value 0.00094
scoring_system epss
scoring_elements 0.26135
published_at 2026-04-16T12:55:00Z
9
value 0.00094
scoring_system epss
scoring_elements 0.26112
published_at 2026-04-18T12:55:00Z
10
value 0.00094
scoring_system epss
scoring_elements 0.26075
published_at 2026-04-21T12:55:00Z
11
value 0.00094
scoring_system epss
scoring_elements 0.26014
published_at 2026-04-24T12:55:00Z
12
value 0.00094
scoring_system epss
scoring_elements 0.2601
published_at 2026-04-26T12:55:00Z
13
value 0.00094
scoring_system epss
scoring_elements 0.25961
published_at 2026-04-29T12:55:00Z
14
value 0.00094
scoring_system epss
scoring_elements 0.25853
published_at 2026-05-05T12:55:00Z
15
value 0.00094
scoring_system epss
scoring_elements 0.25913
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-47360
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47359
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47360
3
reference_url https://usn.ubuntu.com/6783-1/
reference_id USN-6783-1
reference_type
scores
url https://usn.ubuntu.com/6783-1/
fixed_packages
0
url pkg:deb/debian/vlc@3.0.20-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.20-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.20-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.20-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.20-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.20-0%252Bdeb12u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.20-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.20-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.20-1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
7
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2023-47360
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qq2u-797n-w7h4
99
url VCID-r2yd-q1e1-tkhd
vulnerability_id VCID-r2yd-q1e1-tkhd
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could lead to user-assisted execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4388
reference_id
reference_type
scores
0
value 0.03905
scoring_system epss
scoring_elements 0.88232
published_at 2026-04-01T12:55:00Z
1
value 0.03905
scoring_system epss
scoring_elements 0.8824
published_at 2026-04-02T12:55:00Z
2
value 0.03905
scoring_system epss
scoring_elements 0.88255
published_at 2026-04-04T12:55:00Z
3
value 0.03905
scoring_system epss
scoring_elements 0.8826
published_at 2026-04-07T12:55:00Z
4
value 0.03905
scoring_system epss
scoring_elements 0.88279
published_at 2026-04-08T12:55:00Z
5
value 0.03905
scoring_system epss
scoring_elements 0.88285
published_at 2026-04-09T12:55:00Z
6
value 0.03905
scoring_system epss
scoring_elements 0.88297
published_at 2026-04-11T12:55:00Z
7
value 0.03905
scoring_system epss
scoring_elements 0.88289
published_at 2026-04-13T12:55:00Z
8
value 0.03905
scoring_system epss
scoring_elements 0.88302
published_at 2026-04-16T12:55:00Z
9
value 0.03905
scoring_system epss
scoring_elements 0.88301
published_at 2026-04-18T12:55:00Z
10
value 0.03905
scoring_system epss
scoring_elements 0.883
published_at 2026-04-21T12:55:00Z
11
value 0.03905
scoring_system epss
scoring_elements 0.88318
published_at 2026-04-24T12:55:00Z
12
value 0.03905
scoring_system epss
scoring_elements 0.88323
published_at 2026-04-26T12:55:00Z
13
value 0.03905
scoring_system epss
scoring_elements 0.88326
published_at 2026-04-29T12:55:00Z
14
value 0.03905
scoring_system epss
scoring_elements 0.88336
published_at 2026-05-05T12:55:00Z
15
value 0.03905
scoring_system epss
scoring_elements 0.88352
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4388
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1868
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1868
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1954
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4388
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=726528
reference_id 726528
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=726528
5
reference_url https://security.gentoo.org/glsa/201411-01
reference_id GLSA-201411-01
reference_type
scores
url https://security.gentoo.org/glsa/201411-01
fixed_packages
0
url pkg:deb/debian/vlc@2.1.0-1?distro=trixie
purl pkg:deb/debian/vlc@2.1.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@2.1.0-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2013-4388
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r2yd-q1e1-tkhd
100
url VCID-r4z4-61hf-3bfx
vulnerability_id VCID-r4z4-61hf-3bfx
summary
A buffer overflow in VLC might allow local or remote attacker(s) to
    execute arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19721
reference_id
reference_type
scores
0
value 0.01303
scoring_system epss
scoring_elements 0.79872
published_at 2026-05-07T12:55:00Z
1
value 0.01303
scoring_system epss
scoring_elements 0.79701
published_at 2026-04-01T12:55:00Z
2
value 0.01303
scoring_system epss
scoring_elements 0.79708
published_at 2026-04-02T12:55:00Z
3
value 0.01303
scoring_system epss
scoring_elements 0.7973
published_at 2026-04-04T12:55:00Z
4
value 0.01303
scoring_system epss
scoring_elements 0.79715
published_at 2026-04-07T12:55:00Z
5
value 0.01303
scoring_system epss
scoring_elements 0.79743
published_at 2026-04-08T12:55:00Z
6
value 0.01303
scoring_system epss
scoring_elements 0.7975
published_at 2026-04-09T12:55:00Z
7
value 0.01303
scoring_system epss
scoring_elements 0.79772
published_at 2026-04-11T12:55:00Z
8
value 0.01303
scoring_system epss
scoring_elements 0.79756
published_at 2026-04-12T12:55:00Z
9
value 0.01303
scoring_system epss
scoring_elements 0.79749
published_at 2026-04-13T12:55:00Z
10
value 0.01303
scoring_system epss
scoring_elements 0.79776
published_at 2026-04-16T12:55:00Z
11
value 0.01303
scoring_system epss
scoring_elements 0.79778
published_at 2026-04-18T12:55:00Z
12
value 0.01303
scoring_system epss
scoring_elements 0.79781
published_at 2026-04-21T12:55:00Z
13
value 0.01303
scoring_system epss
scoring_elements 0.79811
published_at 2026-04-24T12:55:00Z
14
value 0.01303
scoring_system epss
scoring_elements 0.79818
published_at 2026-04-26T12:55:00Z
15
value 0.01303
scoring_system epss
scoring_elements 0.79833
published_at 2026-04-29T12:55:00Z
16
value 0.01303
scoring_system epss
scoring_elements 0.79847
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19721
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19721
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6071
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6071
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6072
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6072
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6073
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6077
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6078
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6079
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6080
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6080
9
reference_url https://security.archlinux.org/AVG-1145
reference_id AVG-1145
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1145
10
reference_url https://security.gentoo.org/glsa/202005-11
reference_id GLSA-202005-11
reference_type
scores
url https://security.gentoo.org/glsa/202005-11
11
reference_url https://usn.ubuntu.com/6180-1/
reference_id USN-6180-1
reference_type
scores
url https://usn.ubuntu.com/6180-1/
fixed_packages
0
url pkg:deb/debian/vlc@3.0.9.2-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.9.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.9.2-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2019-19721
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r4z4-61hf-3bfx
101
url VCID-rygp-vyhd-x7f7
vulnerability_id VCID-rygp-vyhd-x7f7
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-25803
reference_id
reference_type
scores
0
value 0.00282
scoring_system epss
scoring_elements 0.51496
published_at 2026-04-01T12:55:00Z
1
value 0.00282
scoring_system epss
scoring_elements 0.51547
published_at 2026-04-02T12:55:00Z
2
value 0.00282
scoring_system epss
scoring_elements 0.51574
published_at 2026-04-04T12:55:00Z
3
value 0.00282
scoring_system epss
scoring_elements 0.51536
published_at 2026-05-07T12:55:00Z
4
value 0.00282
scoring_system epss
scoring_elements 0.5159
published_at 2026-04-08T12:55:00Z
5
value 0.00282
scoring_system epss
scoring_elements 0.51586
published_at 2026-04-09T12:55:00Z
6
value 0.00282
scoring_system epss
scoring_elements 0.51636
published_at 2026-04-11T12:55:00Z
7
value 0.00282
scoring_system epss
scoring_elements 0.51615
published_at 2026-04-12T12:55:00Z
8
value 0.00282
scoring_system epss
scoring_elements 0.51599
published_at 2026-04-13T12:55:00Z
9
value 0.00282
scoring_system epss
scoring_elements 0.5164
published_at 2026-04-16T12:55:00Z
10
value 0.00282
scoring_system epss
scoring_elements 0.51647
published_at 2026-04-18T12:55:00Z
11
value 0.00282
scoring_system epss
scoring_elements 0.51626
published_at 2026-04-21T12:55:00Z
12
value 0.00282
scoring_system epss
scoring_elements 0.51577
published_at 2026-04-24T12:55:00Z
13
value 0.00282
scoring_system epss
scoring_elements 0.51583
published_at 2026-04-26T12:55:00Z
14
value 0.00282
scoring_system epss
scoring_elements 0.51543
published_at 2026-04-29T12:55:00Z
15
value 0.00282
scoring_system epss
scoring_elements 0.51487
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-25803
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26664
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25801
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25802
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25803
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25804
6
reference_url https://usn.ubuntu.com/6180-1/
reference_id USN-6180-1
reference_type
scores
url https://usn.ubuntu.com/6180-1/
fixed_packages
0
url pkg:deb/debian/vlc@3.0.12-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.12-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2021-25803
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rygp-vyhd-x7f7
102
url VCID-s24v-pgr6-mucf
vulnerability_id VCID-s24v-pgr6-mucf
summary Multiple integer overflows in ty.c in the TY demux plugin (aka the TiVo demuxer) in VideoLAN VLC media player, probably 0.9.4, might allow remote attackers to execute arbitrary code via a crafted .ty file, a different vulnerability than CVE-2008-4654.
references
0
reference_url http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=d859e6b9537af2d7326276f70de25a840f554dc3
reference_id
reference_type
scores
url http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=d859e6b9537af2d7326276f70de25a840f554dc3
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4686
reference_id
reference_type
scores
0
value 0.08258
scoring_system epss
scoring_elements 0.92267
published_at 2026-05-07T12:55:00Z
1
value 0.08258
scoring_system epss
scoring_elements 0.92198
published_at 2026-04-01T12:55:00Z
2
value 0.08258
scoring_system epss
scoring_elements 0.92205
published_at 2026-04-02T12:55:00Z
3
value 0.08258
scoring_system epss
scoring_elements 0.92211
published_at 2026-04-04T12:55:00Z
4
value 0.08258
scoring_system epss
scoring_elements 0.92214
published_at 2026-04-07T12:55:00Z
5
value 0.08258
scoring_system epss
scoring_elements 0.92225
published_at 2026-04-08T12:55:00Z
6
value 0.08258
scoring_system epss
scoring_elements 0.92229
published_at 2026-04-09T12:55:00Z
7
value 0.08258
scoring_system epss
scoring_elements 0.92234
published_at 2026-04-11T12:55:00Z
8
value 0.08258
scoring_system epss
scoring_elements 0.92235
published_at 2026-04-12T12:55:00Z
9
value 0.08258
scoring_system epss
scoring_elements 0.92232
published_at 2026-04-13T12:55:00Z
10
value 0.08258
scoring_system epss
scoring_elements 0.92244
published_at 2026-04-16T12:55:00Z
11
value 0.08258
scoring_system epss
scoring_elements 0.92243
published_at 2026-04-18T12:55:00Z
12
value 0.08258
scoring_system epss
scoring_elements 0.92245
published_at 2026-04-21T12:55:00Z
13
value 0.08258
scoring_system epss
scoring_elements 0.9225
published_at 2026-04-24T12:55:00Z
14
value 0.08258
scoring_system epss
scoring_elements 0.92251
published_at 2026-04-26T12:55:00Z
15
value 0.08258
scoring_system epss
scoring_elements 0.92246
published_at 2026-04-29T12:55:00Z
16
value 0.08258
scoring_system epss
scoring_elements 0.92257
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4686
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4686
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4686
3
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14630
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14630
4
reference_url http://www.openwall.com/lists/oss-security/2008/10/19/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/10/19/2
5
reference_url http://www.openwall.com/lists/oss-security/2008/10/22/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/10/22/6
6
reference_url http://www.securityfocus.com/bid/31867
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/31867
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=503118
reference_id 503118
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=503118
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4686
reference_id CVE-2008-4686
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-4686
fixed_packages
0
url pkg:deb/debian/vlc@0.8.6.h-4.1?distro=trixie
purl pkg:deb/debian/vlc@0.8.6.h-4.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0.8.6.h-4.1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2008-4686
risk_score 10.0
exploitability 2.0
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s24v-pgr6-mucf
103
url VCID-s3wy-3zks-4bcj
vulnerability_id VCID-s3wy-3zks-4bcj
summary
Multiple vulnerabilities have been found in VLC allowing remote
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9625
reference_id
reference_type
scores
0
value 0.01634
scoring_system epss
scoring_elements 0.81844
published_at 2026-04-01T12:55:00Z
1
value 0.01634
scoring_system epss
scoring_elements 0.81855
published_at 2026-04-02T12:55:00Z
2
value 0.01634
scoring_system epss
scoring_elements 0.81878
published_at 2026-04-04T12:55:00Z
3
value 0.01634
scoring_system epss
scoring_elements 0.81874
published_at 2026-04-07T12:55:00Z
4
value 0.01634
scoring_system epss
scoring_elements 0.81901
published_at 2026-04-08T12:55:00Z
5
value 0.01634
scoring_system epss
scoring_elements 0.81907
published_at 2026-04-09T12:55:00Z
6
value 0.01634
scoring_system epss
scoring_elements 0.81927
published_at 2026-04-11T12:55:00Z
7
value 0.01634
scoring_system epss
scoring_elements 0.81915
published_at 2026-04-12T12:55:00Z
8
value 0.01634
scoring_system epss
scoring_elements 0.8191
published_at 2026-04-13T12:55:00Z
9
value 0.01634
scoring_system epss
scoring_elements 0.81946
published_at 2026-04-18T12:55:00Z
10
value 0.01634
scoring_system epss
scoring_elements 0.81948
published_at 2026-04-21T12:55:00Z
11
value 0.01634
scoring_system epss
scoring_elements 0.8197
published_at 2026-04-24T12:55:00Z
12
value 0.01634
scoring_system epss
scoring_elements 0.81981
published_at 2026-04-26T12:55:00Z
13
value 0.01634
scoring_system epss
scoring_elements 0.81987
published_at 2026-04-29T12:55:00Z
14
value 0.01634
scoring_system epss
scoring_elements 0.82007
published_at 2026-05-05T12:55:00Z
15
value 0.01634
scoring_system epss
scoring_elements 0.82027
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9625
1
reference_url https://security.gentoo.org/glsa/201603-08
reference_id GLSA-201603-08
reference_type
scores
url https://security.gentoo.org/glsa/201603-08
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2014-9625
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s3wy-3zks-4bcj
104
url VCID-s8sm-qx3a-bfcn
vulnerability_id VCID-s8sm-qx3a-bfcn
summary
Multiple vulnerabilities have been found in libmicrodns, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6073
reference_id
reference_type
scores
0
value 0.00369
scoring_system epss
scoring_elements 0.58823
published_at 2026-05-07T12:55:00Z
1
value 0.00369
scoring_system epss
scoring_elements 0.58814
published_at 2026-04-29T12:55:00Z
2
value 0.00369
scoring_system epss
scoring_elements 0.58778
published_at 2026-05-05T12:55:00Z
3
value 0.00369
scoring_system epss
scoring_elements 0.58713
published_at 2026-04-01T12:55:00Z
4
value 0.00369
scoring_system epss
scoring_elements 0.58787
published_at 2026-04-02T12:55:00Z
5
value 0.00369
scoring_system epss
scoring_elements 0.58809
published_at 2026-04-04T12:55:00Z
6
value 0.00369
scoring_system epss
scoring_elements 0.58777
published_at 2026-04-07T12:55:00Z
7
value 0.00369
scoring_system epss
scoring_elements 0.58829
published_at 2026-04-26T12:55:00Z
8
value 0.00369
scoring_system epss
scoring_elements 0.58836
published_at 2026-04-12T12:55:00Z
9
value 0.00369
scoring_system epss
scoring_elements 0.58854
published_at 2026-04-18T12:55:00Z
10
value 0.00369
scoring_system epss
scoring_elements 0.58817
published_at 2026-04-13T12:55:00Z
11
value 0.00369
scoring_system epss
scoring_elements 0.58849
published_at 2026-04-16T12:55:00Z
12
value 0.00369
scoring_system epss
scoring_elements 0.58831
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6073
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19721
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6071
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6071
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6072
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6072
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6073
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6077
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6078
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6079
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6080
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6080
9
reference_url https://talosintelligence.com/vulnerability_reports/TALOS-2020-0996
reference_id
reference_type
scores
url https://talosintelligence.com/vulnerability_reports/TALOS-2020-0996
10
reference_url https://www.debian.org/security/2020/dsa-4671
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4671
11
reference_url https://security.archlinux.org/ASA-202004-24
reference_id ASA-202004-24
reference_type
scores
url https://security.archlinux.org/ASA-202004-24
12
reference_url https://security.archlinux.org/AVG-1136
reference_id AVG-1136
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1136
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolabs:libmicrodns:0.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolabs:libmicrodns:0.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolabs:libmicrodns:0.1.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-6073
reference_id CVE-2020-6073
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-6073
16
reference_url https://security.gentoo.org/glsa/202005-10
reference_id GLSA-202005-10
reference_type
scores
url https://security.gentoo.org/glsa/202005-10
17
reference_url https://usn.ubuntu.com/7239-1/
reference_id USN-7239-1
reference_type
scores
url https://usn.ubuntu.com/7239-1/
fixed_packages
0
url pkg:deb/debian/vlc@3.0.8-4?distro=trixie
purl pkg:deb/debian/vlc@3.0.8-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.8-4%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2020-6073
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s8sm-qx3a-bfcn
105
url VCID-se8z-rkud-vban
vulnerability_id VCID-se8z-rkud-vban
summary
Multiple vulnerabilities were found in VLC, allowing for the execution of
    arbitrary code and Denial of Service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0984
reference_id
reference_type
scores
0
value 0.26592
scoring_system epss
scoring_elements 0.96295
published_at 2026-04-01T12:55:00Z
1
value 0.26592
scoring_system epss
scoring_elements 0.96303
published_at 2026-04-02T12:55:00Z
2
value 0.27188
scoring_system epss
scoring_elements 0.96366
published_at 2026-04-04T12:55:00Z
3
value 0.27188
scoring_system epss
scoring_elements 0.9637
published_at 2026-04-07T12:55:00Z
4
value 0.27188
scoring_system epss
scoring_elements 0.96378
published_at 2026-04-08T12:55:00Z
5
value 0.27188
scoring_system epss
scoring_elements 0.96382
published_at 2026-04-09T12:55:00Z
6
value 0.27188
scoring_system epss
scoring_elements 0.96386
published_at 2026-04-12T12:55:00Z
7
value 0.27188
scoring_system epss
scoring_elements 0.96389
published_at 2026-04-13T12:55:00Z
8
value 0.27188
scoring_system epss
scoring_elements 0.96395
published_at 2026-04-16T12:55:00Z
9
value 0.27188
scoring_system epss
scoring_elements 0.964
published_at 2026-04-18T12:55:00Z
10
value 0.27188
scoring_system epss
scoring_elements 0.96402
published_at 2026-04-24T12:55:00Z
11
value 0.27188
scoring_system epss
scoring_elements 0.96403
published_at 2026-04-26T12:55:00Z
12
value 0.27188
scoring_system epss
scoring_elements 0.96404
published_at 2026-04-29T12:55:00Z
13
value 0.27188
scoring_system epss
scoring_elements 0.96415
published_at 2026-05-05T12:55:00Z
14
value 0.27188
scoring_system epss
scoring_elements 0.96417
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0984
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0984
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=467652
reference_id 467652
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=467652
3
reference_url https://security.gentoo.org/glsa/200803-13
reference_id GLSA-200803-13
reference_type
scores
url https://security.gentoo.org/glsa/200803-13
fixed_packages
0
url pkg:deb/debian/vlc@0.8.6.e-1?distro=trixie
purl pkg:deb/debian/vlc@0.8.6.e-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0.8.6.e-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2008-0984
risk_score 0.4
exploitability 2.0
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-se8z-rkud-vban
106
url VCID-trct-7h95-mqep
vulnerability_id VCID-trct-7h95-mqep
summary
Multiple vulnerabilities in VLC may allow for the execution of arbitrary
    code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-2430
reference_id
reference_type
scores
0
value 0.07893
scoring_system epss
scoring_elements 0.92062
published_at 2026-05-07T12:55:00Z
1
value 0.07893
scoring_system epss
scoring_elements 0.91986
published_at 2026-04-01T12:55:00Z
2
value 0.07893
scoring_system epss
scoring_elements 0.91994
published_at 2026-04-02T12:55:00Z
3
value 0.07893
scoring_system epss
scoring_elements 0.92002
published_at 2026-04-04T12:55:00Z
4
value 0.07893
scoring_system epss
scoring_elements 0.92008
published_at 2026-04-07T12:55:00Z
5
value 0.07893
scoring_system epss
scoring_elements 0.9202
published_at 2026-04-08T12:55:00Z
6
value 0.07893
scoring_system epss
scoring_elements 0.92024
published_at 2026-04-13T12:55:00Z
7
value 0.07893
scoring_system epss
scoring_elements 0.92027
published_at 2026-04-11T12:55:00Z
8
value 0.07893
scoring_system epss
scoring_elements 0.92028
published_at 2026-04-12T12:55:00Z
9
value 0.07893
scoring_system epss
scoring_elements 0.92043
published_at 2026-04-16T12:55:00Z
10
value 0.07893
scoring_system epss
scoring_elements 0.9204
published_at 2026-04-18T12:55:00Z
11
value 0.07893
scoring_system epss
scoring_elements 0.92037
published_at 2026-04-21T12:55:00Z
12
value 0.07893
scoring_system epss
scoring_elements 0.92042
published_at 2026-04-24T12:55:00Z
13
value 0.07893
scoring_system epss
scoring_elements 0.92041
published_at 2026-04-26T12:55:00Z
14
value 0.07893
scoring_system epss
scoring_elements 0.92038
published_at 2026-04-29T12:55:00Z
15
value 0.07893
scoring_system epss
scoring_elements 0.92049
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-2430
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2430
2
reference_url http://secunia.com/advisories/30601
reference_id
reference_type
scores
url http://secunia.com/advisories/30601
3
reference_url http://secunia.com/advisories/31317
reference_id
reference_type
scores
url http://secunia.com/advisories/31317
4
reference_url http://secunia.com/secunia_research/2008-29/advisory/
reference_id
reference_type
scores
url http://secunia.com/secunia_research/2008-29/advisory/
5
reference_url http://security.gentoo.org/glsa/glsa-200807-13.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200807-13.xml
6
reference_url http://securityreason.com/securityalert/3976
reference_id
reference_type
scores
url http://securityreason.com/securityalert/3976
7
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14344
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14344
8
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14769
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14769
9
reference_url http://www.securityfocus.com/archive/1/493849/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/493849/100/0/threaded
10
reference_url http://www.securityfocus.com/bid/30058
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/30058
11
reference_url http://www.securitytracker.com/id?1020429
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020429
12
reference_url http://www.videolan.org/developers/vlc/NEWS
reference_id
reference_type
scores
url http://www.videolan.org/developers/vlc/NEWS
13
reference_url http://www.vupen.com/english/advisories/2008/1995/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1995/references
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=489004
reference_id 489004
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=489004
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-2430
reference_id CVE-2008-2430
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-2430
18
reference_url https://security.gentoo.org/glsa/200807-13
reference_id GLSA-200807-13
reference_type
scores
url https://security.gentoo.org/glsa/200807-13
fixed_packages
0
url pkg:deb/debian/vlc@0.8.6.h-1?distro=trixie
purl pkg:deb/debian/vlc@0.8.6.h-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0.8.6.h-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2008-2430
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-trct-7h95-mqep
107
url VCID-tt6d-ah3g-jfaf
vulnerability_id VCID-tt6d-ah3g-jfaf
summary VideoLAN VLC 0.8.6a allows remote attackers to cause a denial of service (application crash) via a crafted .wmv file.
references
0
reference_url http://downloads.securityfocus.com/vulnerabilities/exploits/22003.py
reference_id
reference_type
scores
url http://downloads.securityfocus.com/vulnerabilities/exploits/22003.py
1
reference_url http://osvdb.org/39022
reference_id
reference_type
scores
url http://osvdb.org/39022
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-0256
reference_id
reference_type
scores
0
value 0.21639
scoring_system epss
scoring_elements 0.95761
published_at 2026-05-07T12:55:00Z
1
value 0.21639
scoring_system epss
scoring_elements 0.95695
published_at 2026-04-01T12:55:00Z
2
value 0.21639
scoring_system epss
scoring_elements 0.95705
published_at 2026-04-02T12:55:00Z
3
value 0.21639
scoring_system epss
scoring_elements 0.9571
published_at 2026-04-04T12:55:00Z
4
value 0.21639
scoring_system epss
scoring_elements 0.95713
published_at 2026-04-07T12:55:00Z
5
value 0.21639
scoring_system epss
scoring_elements 0.95722
published_at 2026-04-08T12:55:00Z
6
value 0.21639
scoring_system epss
scoring_elements 0.95726
published_at 2026-04-09T12:55:00Z
7
value 0.21639
scoring_system epss
scoring_elements 0.9573
published_at 2026-04-13T12:55:00Z
8
value 0.21639
scoring_system epss
scoring_elements 0.95729
published_at 2026-04-12T12:55:00Z
9
value 0.21639
scoring_system epss
scoring_elements 0.9574
published_at 2026-04-16T12:55:00Z
10
value 0.21639
scoring_system epss
scoring_elements 0.95743
published_at 2026-04-18T12:55:00Z
11
value 0.21639
scoring_system epss
scoring_elements 0.95745
published_at 2026-04-29T12:55:00Z
12
value 0.21639
scoring_system epss
scoring_elements 0.95747
published_at 2026-04-24T12:55:00Z
13
value 0.21639
scoring_system epss
scoring_elements 0.95746
published_at 2026-04-26T12:55:00Z
14
value 0.21639
scoring_system epss
scoring_elements 0.95759
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-0256
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0256
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0256
4
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/31515
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/31515
5
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14698
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14698
6
reference_url http://wiki.videolan.org/Changelog/0.8.6b
reference_id
reference_type
scores
url http://wiki.videolan.org/Changelog/0.8.6b
7
reference_url http://www.securityfocus.com/bid/22003
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/22003
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=407290
reference_id 407290
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=407290
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*
10
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/3119.py
reference_id CVE-2007-0256
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/3119.py
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-0256
reference_id CVE-2007-0256
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-0256
12
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/29443.py
reference_id CVE-2007-0256;OSVDB-39022
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/29443.py
13
reference_url https://www.securityfocus.com/bid/22003/info
reference_id CVE-2007-0256;OSVDB-39022
reference_type exploit
scores
url https://www.securityfocus.com/bid/22003/info
fixed_packages
0
url pkg:deb/debian/vlc@0.8.6.c-1?distro=trixie
purl pkg:deb/debian/vlc@0.8.6.c-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0.8.6.c-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2007-0256
risk_score 10.0
exploitability 2.0
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tt6d-ah3g-jfaf
108
url VCID-ttra-pkh7-mua4
vulnerability_id VCID-ttra-pkh7-mua4
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could result in the arbitrary execution of code.
references
0
reference_url http://git.videolan.org/?p=vlc.git&a=search&h=refs/heads/master&st=commit&s=cve-2019
reference_id
reference_type
scores
url http://git.videolan.org/?p=vlc.git&a=search&h=refs/heads/master&st=commit&s=cve-2019
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00036.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00036.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00046.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00046.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-14498
reference_id
reference_type
scores
0
value 0.00582
scoring_system epss
scoring_elements 0.69062
published_at 2026-05-07T12:55:00Z
1
value 0.00582
scoring_system epss
scoring_elements 0.6902
published_at 2026-05-05T12:55:00Z
2
value 0.00582
scoring_system epss
scoring_elements 0.68877
published_at 2026-04-01T12:55:00Z
3
value 0.00582
scoring_system epss
scoring_elements 0.68894
published_at 2026-04-02T12:55:00Z
4
value 0.00582
scoring_system epss
scoring_elements 0.68915
published_at 2026-04-04T12:55:00Z
5
value 0.00582
scoring_system epss
scoring_elements 0.68895
published_at 2026-04-07T12:55:00Z
6
value 0.00582
scoring_system epss
scoring_elements 0.68946
published_at 2026-04-08T12:55:00Z
7
value 0.00582
scoring_system epss
scoring_elements 0.68965
published_at 2026-04-09T12:55:00Z
8
value 0.00582
scoring_system epss
scoring_elements 0.68987
published_at 2026-04-11T12:55:00Z
9
value 0.00582
scoring_system epss
scoring_elements 0.68972
published_at 2026-04-12T12:55:00Z
10
value 0.00582
scoring_system epss
scoring_elements 0.68943
published_at 2026-04-13T12:55:00Z
11
value 0.00582
scoring_system epss
scoring_elements 0.68984
published_at 2026-04-16T12:55:00Z
12
value 0.00582
scoring_system epss
scoring_elements 0.68994
published_at 2026-04-18T12:55:00Z
13
value 0.00582
scoring_system epss
scoring_elements 0.68974
published_at 2026-04-21T12:55:00Z
14
value 0.00582
scoring_system epss
scoring_elements 0.69025
published_at 2026-04-24T12:55:00Z
15
value 0.00582
scoring_system epss
scoring_elements 0.69032
published_at 2026-04-26T12:55:00Z
16
value 0.00582
scoring_system epss
scoring_elements 0.69039
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-14498
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13602
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13962
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14437
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14438
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14438
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14498
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14533
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14534
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14534
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14535
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14535
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14776
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14777
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14778
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14970
16
reference_url https://seclists.org/bugtraq/2019/Aug/36
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Aug/36
17
reference_url https://www.debian.org/security/2019/dsa-4504
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4504
18
reference_url https://www.videolan.org/security/sb-vlc308.html
reference_id
reference_type
scores
url https://www.videolan.org/security/sb-vlc308.html
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:3.0.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:3.0.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:3.0.7.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-14498
reference_id CVE-2019-14498
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-14498
23
reference_url https://security.gentoo.org/glsa/201909-02
reference_id GLSA-201909-02
reference_type
scores
url https://security.gentoo.org/glsa/201909-02
24
reference_url https://usn.ubuntu.com/4131-1/
reference_id USN-4131-1
reference_type
scores
url https://usn.ubuntu.com/4131-1/
fixed_packages
0
url pkg:deb/debian/vlc@3.0.8-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.8-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2019-14498
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ttra-pkh7-mua4
109
url VCID-twng-xd4x-37h6
vulnerability_id VCID-twng-xd4x-37h6
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could result in the arbitrary execution of code.
references
0
reference_url http://git.videolan.org/?p=vlc.git&a=search&h=refs/heads/master&st=commit&s=cve-2019
reference_id
reference_type
scores
url http://git.videolan.org/?p=vlc.git&a=search&h=refs/heads/master&st=commit&s=cve-2019
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00036.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00036.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00046.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00046.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-14534
reference_id
reference_type
scores
0
value 0.00344
scoring_system epss
scoring_elements 0.56981
published_at 2026-05-07T12:55:00Z
1
value 0.00344
scoring_system epss
scoring_elements 0.56934
published_at 2026-05-05T12:55:00Z
2
value 0.00344
scoring_system epss
scoring_elements 0.56933
published_at 2026-04-01T12:55:00Z
3
value 0.00344
scoring_system epss
scoring_elements 0.5703
published_at 2026-04-02T12:55:00Z
4
value 0.00344
scoring_system epss
scoring_elements 0.57052
published_at 2026-04-04T12:55:00Z
5
value 0.00344
scoring_system epss
scoring_elements 0.57029
published_at 2026-04-07T12:55:00Z
6
value 0.00344
scoring_system epss
scoring_elements 0.5708
published_at 2026-04-08T12:55:00Z
7
value 0.00344
scoring_system epss
scoring_elements 0.57081
published_at 2026-04-09T12:55:00Z
8
value 0.00344
scoring_system epss
scoring_elements 0.57093
published_at 2026-04-11T12:55:00Z
9
value 0.00344
scoring_system epss
scoring_elements 0.57072
published_at 2026-04-12T12:55:00Z
10
value 0.00344
scoring_system epss
scoring_elements 0.57048
published_at 2026-04-13T12:55:00Z
11
value 0.00344
scoring_system epss
scoring_elements 0.57076
published_at 2026-04-16T12:55:00Z
12
value 0.00344
scoring_system epss
scoring_elements 0.57073
published_at 2026-04-18T12:55:00Z
13
value 0.00344
scoring_system epss
scoring_elements 0.5705
published_at 2026-04-21T12:55:00Z
14
value 0.00344
scoring_system epss
scoring_elements 0.56983
published_at 2026-04-24T12:55:00Z
15
value 0.00344
scoring_system epss
scoring_elements 0.57002
published_at 2026-04-26T12:55:00Z
16
value 0.00344
scoring_system epss
scoring_elements 0.56984
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-14534
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13602
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13962
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14437
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14438
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14438
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14498
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14533
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14534
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14534
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14535
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14535
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14776
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14777
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14778
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14970
16
reference_url https://seclists.org/bugtraq/2019/Aug/36
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Aug/36
17
reference_url https://www.debian.org/security/2019/dsa-4504
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4504
18
reference_url https://www.videolan.org/security/sb-vlc308.html
reference_id
reference_type
scores
url https://www.videolan.org/security/sb-vlc308.html
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:3.0.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:3.0.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:3.0.7.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-14534
reference_id CVE-2019-14534
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-14534
23
reference_url https://security.gentoo.org/glsa/201909-02
reference_id GLSA-201909-02
reference_type
scores
url https://security.gentoo.org/glsa/201909-02
24
reference_url https://usn.ubuntu.com/4131-1/
reference_id USN-4131-1
reference_type
scores
url https://usn.ubuntu.com/4131-1/
fixed_packages
0
url pkg:deb/debian/vlc@3.0.8-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.8-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2019-14534
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-twng-xd4x-37h6
110
url VCID-u2u2-szt5-43a6
vulnerability_id VCID-u2u2-szt5-43a6
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9626
reference_id
reference_type
scores
0
value 0.00338
scoring_system epss
scoring_elements 0.56547
published_at 2026-04-01T12:55:00Z
1
value 0.00338
scoring_system epss
scoring_elements 0.56643
published_at 2026-04-02T12:55:00Z
2
value 0.00338
scoring_system epss
scoring_elements 0.56665
published_at 2026-04-21T12:55:00Z
3
value 0.00338
scoring_system epss
scoring_elements 0.56644
published_at 2026-04-07T12:55:00Z
4
value 0.00338
scoring_system epss
scoring_elements 0.56696
published_at 2026-04-08T12:55:00Z
5
value 0.00338
scoring_system epss
scoring_elements 0.56701
published_at 2026-04-09T12:55:00Z
6
value 0.00338
scoring_system epss
scoring_elements 0.56709
published_at 2026-04-11T12:55:00Z
7
value 0.00338
scoring_system epss
scoring_elements 0.56684
published_at 2026-04-12T12:55:00Z
8
value 0.00338
scoring_system epss
scoring_elements 0.56663
published_at 2026-04-13T12:55:00Z
9
value 0.00338
scoring_system epss
scoring_elements 0.56694
published_at 2026-04-16T12:55:00Z
10
value 0.00338
scoring_system epss
scoring_elements 0.56692
published_at 2026-04-18T12:55:00Z
11
value 0.00338
scoring_system epss
scoring_elements 0.56602
published_at 2026-04-24T12:55:00Z
12
value 0.00338
scoring_system epss
scoring_elements 0.5662
published_at 2026-04-26T12:55:00Z
13
value 0.00338
scoring_system epss
scoring_elements 0.56603
published_at 2026-04-29T12:55:00Z
14
value 0.00338
scoring_system epss
scoring_elements 0.56558
published_at 2026-05-05T12:55:00Z
15
value 0.00338
scoring_system epss
scoring_elements 0.56605
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9626
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9626
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9627
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9627
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9628
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9629
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9630
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9630
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775866
reference_id 775866
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775866
7
reference_url https://security.gentoo.org/glsa/201603-08
reference_id GLSA-201603-08
reference_type
scores
url https://security.gentoo.org/glsa/201603-08
fixed_packages
0
url pkg:deb/debian/vlc@2.2.0~rc2-2?distro=trixie
purl pkg:deb/debian/vlc@2.2.0~rc2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@2.2.0~rc2-2%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2014-9626
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u2u2-szt5-43a6
111
url VCID-ua8e-h3jn-vqc9
vulnerability_id VCID-ua8e-h3jn-vqc9
summary
Multiple vulnerabilities in VLC may lead to the remote execution of
    arbitrary code.
references
0
reference_url http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=e3cef651125701a2e33a8d75b815b3e39681a447
reference_id
reference_type
scores
url http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=e3cef651125701a2e33a8d75b815b3e39681a447
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5036
reference_id
reference_type
scores
0
value 0.66452
scoring_system epss
scoring_elements 0.98546
published_at 2026-05-07T12:55:00Z
1
value 0.66452
scoring_system epss
scoring_elements 0.9852
published_at 2026-04-01T12:55:00Z
2
value 0.66452
scoring_system epss
scoring_elements 0.98522
published_at 2026-04-02T12:55:00Z
3
value 0.66452
scoring_system epss
scoring_elements 0.98525
published_at 2026-04-04T12:55:00Z
4
value 0.66452
scoring_system epss
scoring_elements 0.98526
published_at 2026-04-07T12:55:00Z
5
value 0.66452
scoring_system epss
scoring_elements 0.98529
published_at 2026-04-08T12:55:00Z
6
value 0.66452
scoring_system epss
scoring_elements 0.9853
published_at 2026-04-09T12:55:00Z
7
value 0.66452
scoring_system epss
scoring_elements 0.98532
published_at 2026-04-13T12:55:00Z
8
value 0.66452
scoring_system epss
scoring_elements 0.98531
published_at 2026-04-12T12:55:00Z
9
value 0.66452
scoring_system epss
scoring_elements 0.98537
published_at 2026-04-16T12:55:00Z
10
value 0.66452
scoring_system epss
scoring_elements 0.98538
published_at 2026-04-21T12:55:00Z
11
value 0.66452
scoring_system epss
scoring_elements 0.98542
published_at 2026-04-29T12:55:00Z
12
value 0.66452
scoring_system epss
scoring_elements 0.98547
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5036
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5036
3
reference_url http://secunia.com/advisories/32569
reference_id
reference_type
scores
url http://secunia.com/advisories/32569
4
reference_url http://secunia.com/advisories/33315
reference_id
reference_type
scores
url http://secunia.com/advisories/33315
5
reference_url http://security.gentoo.org/glsa/glsa-200812-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200812-24.xml
6
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/46376
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/46376
7
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14329
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14329
8
reference_url https://www.exploit-db.com/exploits/7051
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/7051
9
reference_url http://www.openwall.com/lists/oss-security/2008/11/05/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/11/05/4
10
reference_url http://www.openwall.com/lists/oss-security/2008/11/05/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/11/05/5
11
reference_url http://www.openwall.com/lists/oss-security/2008/11/10/13
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/11/10/13
12
reference_url http://www.securityfocus.com/archive/1/498111/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/498111/100/0/threaded
13
reference_url http://www.securityfocus.com/bid/32125
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32125
14
reference_url http://www.videolan.org/security/sa0810.html
reference_id
reference_type
scores
url http://www.videolan.org/security/sa0810.html
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
22
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/7051.pl
reference_id CVE-2008-5036
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/7051.pl
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5036
reference_id CVE-2008-5036
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-5036
24
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/18548.rb
reference_id CVE-2008-5036;OSVDB-49809
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/18548.rb
25
reference_url http://www.trapkit.de/advisories/TKADV2008-011.txt
reference_id CVE-2008-5036;OSVDB-49809
reference_type exploit
scores
url http://www.trapkit.de/advisories/TKADV2008-011.txt
26
reference_url https://security.gentoo.org/glsa/200812-24
reference_id GLSA-200812-24
reference_type
scores
url https://security.gentoo.org/glsa/200812-24
fixed_packages
0
url pkg:deb/debian/vlc@1.0.3-1?distro=trixie
purl pkg:deb/debian/vlc@1.0.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@1.0.3-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2008-5036
risk_score 10.0
exploitability 2.0
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ua8e-h3jn-vqc9
112
url VCID-ub8g-ks7q-6yah
vulnerability_id VCID-ub8g-ks7q-6yah
summary
xine-lib is vulnerable to multiple buffer overflows when processing media
    streams.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0073.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0073.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0073
reference_id
reference_type
scores
0
value 0.01773
scoring_system epss
scoring_elements 0.82596
published_at 2026-04-01T12:55:00Z
1
value 0.01773
scoring_system epss
scoring_elements 0.8261
published_at 2026-04-02T12:55:00Z
2
value 0.01773
scoring_system epss
scoring_elements 0.82625
published_at 2026-04-04T12:55:00Z
3
value 0.01773
scoring_system epss
scoring_elements 0.82621
published_at 2026-04-07T12:55:00Z
4
value 0.01773
scoring_system epss
scoring_elements 0.82647
published_at 2026-04-08T12:55:00Z
5
value 0.01773
scoring_system epss
scoring_elements 0.82655
published_at 2026-04-09T12:55:00Z
6
value 0.01773
scoring_system epss
scoring_elements 0.82673
published_at 2026-04-11T12:55:00Z
7
value 0.01773
scoring_system epss
scoring_elements 0.82667
published_at 2026-04-12T12:55:00Z
8
value 0.01773
scoring_system epss
scoring_elements 0.82662
published_at 2026-04-13T12:55:00Z
9
value 0.01773
scoring_system epss
scoring_elements 0.82699
published_at 2026-04-16T12:55:00Z
10
value 0.01773
scoring_system epss
scoring_elements 0.82701
published_at 2026-04-18T12:55:00Z
11
value 0.01773
scoring_system epss
scoring_elements 0.82703
published_at 2026-04-21T12:55:00Z
12
value 0.01773
scoring_system epss
scoring_elements 0.82725
published_at 2026-04-24T12:55:00Z
13
value 0.01773
scoring_system epss
scoring_elements 0.82735
published_at 2026-04-26T12:55:00Z
14
value 0.01773
scoring_system epss
scoring_elements 0.82741
published_at 2026-04-29T12:55:00Z
15
value 0.01773
scoring_system epss
scoring_elements 0.8276
published_at 2026-05-05T12:55:00Z
16
value 0.01773
scoring_system epss
scoring_elements 0.82781
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0073
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0073
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=438182
reference_id 438182
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=438182
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=473057
reference_id 473057
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=473057
5
reference_url https://security.gentoo.org/glsa/200804-25
reference_id GLSA-200804-25
reference_type
scores
url https://security.gentoo.org/glsa/200804-25
6
reference_url https://security.gentoo.org/glsa/200808-01
reference_id GLSA-200808-01
reference_type
scores
url https://security.gentoo.org/glsa/200808-01
7
reference_url https://usn.ubuntu.com/635-1/
reference_id USN-635-1
reference_type
scores
url https://usn.ubuntu.com/635-1/
fixed_packages
0
url pkg:deb/debian/vlc@0.8.6.e-2?distro=trixie
purl pkg:deb/debian/vlc@0.8.6.e-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0.8.6.e-2%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2008-0073
risk_score null
exploitability 2.0
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ub8g-ks7q-6yah
113
url VCID-uh6m-xhe8-2bfe
vulnerability_id VCID-uh6m-xhe8-2bfe
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could lead to user-assisted execution of arbitrary code.
references
0
reference_url http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=b31ce523331aa3a6e620b68cdfe3f161d519631e
reference_id
reference_type
scores
url http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=b31ce523331aa3a6e620b68cdfe3f161d519631e
1
reference_url http://marc.info/?l=oss-security&m=136593191416152&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=136593191416152&w=2
2
reference_url http://marc.info/?l=oss-security&m=136610343501731&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=136610343501731&w=2
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1954
reference_id
reference_type
scores
0
value 0.02271
scoring_system epss
scoring_elements 0.84751
published_at 2026-05-07T12:55:00Z
1
value 0.02271
scoring_system epss
scoring_elements 0.84576
published_at 2026-04-01T12:55:00Z
2
value 0.02271
scoring_system epss
scoring_elements 0.84591
published_at 2026-04-02T12:55:00Z
3
value 0.02271
scoring_system epss
scoring_elements 0.84612
published_at 2026-04-04T12:55:00Z
4
value 0.02271
scoring_system epss
scoring_elements 0.84613
published_at 2026-04-07T12:55:00Z
5
value 0.02271
scoring_system epss
scoring_elements 0.84635
published_at 2026-04-08T12:55:00Z
6
value 0.02271
scoring_system epss
scoring_elements 0.84641
published_at 2026-04-09T12:55:00Z
7
value 0.02271
scoring_system epss
scoring_elements 0.84659
published_at 2026-04-11T12:55:00Z
8
value 0.02271
scoring_system epss
scoring_elements 0.84655
published_at 2026-04-12T12:55:00Z
9
value 0.02271
scoring_system epss
scoring_elements 0.8465
published_at 2026-04-13T12:55:00Z
10
value 0.02271
scoring_system epss
scoring_elements 0.84671
published_at 2026-04-16T12:55:00Z
11
value 0.02271
scoring_system epss
scoring_elements 0.84672
published_at 2026-04-18T12:55:00Z
12
value 0.02271
scoring_system epss
scoring_elements 0.84673
published_at 2026-04-21T12:55:00Z
13
value 0.02271
scoring_system epss
scoring_elements 0.847
published_at 2026-04-24T12:55:00Z
14
value 0.02271
scoring_system epss
scoring_elements 0.84709
published_at 2026-04-26T12:55:00Z
15
value 0.02271
scoring_system epss
scoring_elements 0.84711
published_at 2026-04-29T12:55:00Z
16
value 0.02271
scoring_system epss
scoring_elements 0.84725
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1954
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1868
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1868
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1954
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4388
7
reference_url http://secunia.com/advisories/59793
reference_id
reference_type
scores
url http://secunia.com/advisories/59793
8
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17023
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17023
9
reference_url http://trac.videolan.org/vlc/ticket/8024
reference_id
reference_type
scores
url http://trac.videolan.org/vlc/ticket/8024
10
reference_url http://www.osvdb.org/89598
reference_id
reference_type
scores
url http://www.osvdb.org/89598
11
reference_url http://www.securityfocus.com/bid/57333
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/57333
12
reference_url http://www.videolan.org/security/sa1302.html
reference_id
reference_type
scores
url http://www.videolan.org/security/sa1302.html
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=705136
reference_id 705136
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=705136
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:2.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.3:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.4:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1954
reference_id CVE-2013-1954
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1954
21
reference_url https://security.gentoo.org/glsa/201411-01
reference_id GLSA-201411-01
reference_type
scores
url https://security.gentoo.org/glsa/201411-01
fixed_packages
0
url pkg:deb/debian/vlc@2.0.6-1?distro=trixie
purl pkg:deb/debian/vlc@2.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@2.0.6-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2013-1954
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uh6m-xhe8-2bfe
114
url VCID-uy85-s5hn-ruc7
vulnerability_id VCID-uy85-s5hn-ruc7
summary
Multiple vulnerabilities were found in VLC, allowing for the execution of
    arbitrary code and Denial of Service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-6681
reference_id
reference_type
scores
0
value 0.37649
scoring_system epss
scoring_elements 0.97169
published_at 2026-04-01T12:55:00Z
1
value 0.37649
scoring_system epss
scoring_elements 0.97175
published_at 2026-04-02T12:55:00Z
2
value 0.39044
scoring_system epss
scoring_elements 0.97261
published_at 2026-04-04T12:55:00Z
3
value 0.39044
scoring_system epss
scoring_elements 0.97262
published_at 2026-04-07T12:55:00Z
4
value 0.39044
scoring_system epss
scoring_elements 0.97269
published_at 2026-04-08T12:55:00Z
5
value 0.39044
scoring_system epss
scoring_elements 0.9727
published_at 2026-04-09T12:55:00Z
6
value 0.39044
scoring_system epss
scoring_elements 0.97273
published_at 2026-04-11T12:55:00Z
7
value 0.39044
scoring_system epss
scoring_elements 0.97274
published_at 2026-04-12T12:55:00Z
8
value 0.39044
scoring_system epss
scoring_elements 0.97275
published_at 2026-04-13T12:55:00Z
9
value 0.39044
scoring_system epss
scoring_elements 0.97282
published_at 2026-04-16T12:55:00Z
10
value 0.39044
scoring_system epss
scoring_elements 0.97285
published_at 2026-04-18T12:55:00Z
11
value 0.39044
scoring_system epss
scoring_elements 0.97286
published_at 2026-04-24T12:55:00Z
12
value 0.39044
scoring_system epss
scoring_elements 0.97287
published_at 2026-04-26T12:55:00Z
13
value 0.39044
scoring_system epss
scoring_elements 0.97289
published_at 2026-04-29T12:55:00Z
14
value 0.39044
scoring_system epss
scoring_elements 0.97293
published_at 2026-05-05T12:55:00Z
15
value 0.39044
scoring_system epss
scoring_elements 0.97298
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-6681
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6681
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6681
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=458318
reference_id 458318
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=458318
3
reference_url https://security.gentoo.org/glsa/200803-13
reference_id GLSA-200803-13
reference_type
scores
url https://security.gentoo.org/glsa/200803-13
4
reference_url https://security.gentoo.org/glsa/200804-25
reference_id GLSA-200804-25
reference_type
scores
url https://security.gentoo.org/glsa/200804-25
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/5498.py
reference_id OSVDB-44578;CVE-2008-1769;OSVDB-43702;CVE-2008-1489;OSVDB-43436;CVE-2008-0984;OSVDB-43002;CVE-2008-0296;OSVDB-42207;CVE-2008-0295;OSVDB-42194;CVE-2008-0073;OSVDB-42193;CVE-2007-6681
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/5498.py
fixed_packages
0
url pkg:deb/debian/vlc@0.8.6.c-4.1?distro=trixie
purl pkg:deb/debian/vlc@0.8.6.c-4.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0.8.6.c-4.1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2007-6681
risk_score 0.8
exploitability 2.0
weighted_severity 0.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uy85-s5hn-ruc7
115
url VCID-uykr-jsdk-4qb1
vulnerability_id VCID-uykr-jsdk-4qb1
summary
Two vulnerabilities in VLC may lead to the remote execution of arbitrary
    code.
references
0
reference_url http://mailman.videolan.org/pipermail/vlc-devel/2008-August/048488.html
reference_id
reference_type
scores
url http://mailman.videolan.org/pipermail/vlc-devel/2008-August/048488.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3794
reference_id
reference_type
scores
0
value 0.09199
scoring_system epss
scoring_elements 0.92741
published_at 2026-05-07T12:55:00Z
1
value 0.09199
scoring_system epss
scoring_elements 0.92674
published_at 2026-04-01T12:55:00Z
2
value 0.09199
scoring_system epss
scoring_elements 0.92681
published_at 2026-04-02T12:55:00Z
3
value 0.09199
scoring_system epss
scoring_elements 0.92687
published_at 2026-04-04T12:55:00Z
4
value 0.09199
scoring_system epss
scoring_elements 0.92686
published_at 2026-04-07T12:55:00Z
5
value 0.09199
scoring_system epss
scoring_elements 0.92696
published_at 2026-04-08T12:55:00Z
6
value 0.09199
scoring_system epss
scoring_elements 0.92701
published_at 2026-04-09T12:55:00Z
7
value 0.09199
scoring_system epss
scoring_elements 0.92706
published_at 2026-04-12T12:55:00Z
8
value 0.09199
scoring_system epss
scoring_elements 0.92705
published_at 2026-04-13T12:55:00Z
9
value 0.09199
scoring_system epss
scoring_elements 0.92717
published_at 2026-04-18T12:55:00Z
10
value 0.09199
scoring_system epss
scoring_elements 0.92721
published_at 2026-04-21T12:55:00Z
11
value 0.09199
scoring_system epss
scoring_elements 0.92725
published_at 2026-04-26T12:55:00Z
12
value 0.09199
scoring_system epss
scoring_elements 0.92719
published_at 2026-04-29T12:55:00Z
13
value 0.09199
scoring_system epss
scoring_elements 0.92728
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3794
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3794
3
reference_url http://security.gentoo.org/glsa/glsa-200809-06.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200809-06.xml
4
reference_url http://securityreason.com/securityalert/4190
reference_id
reference_type
scores
url http://securityreason.com/securityalert/4190
5
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/44659
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/44659
6
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14531
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14531
7
reference_url https://www.exploit-db.com/exploits/6293
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/6293
8
reference_url http://www.openwall.com/lists/oss-security/2008/08/24/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/08/24/3
9
reference_url http://www.orange-bat.com/adv/2008/adv.08.24.txt
reference_id
reference_type
scores
url http://www.orange-bat.com/adv/2008/adv.08.24.txt
10
reference_url http://www.securityfocus.com/bid/30806
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/30806
11
reference_url http://www.securitytracker.com/id?1020759
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020759
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496265
reference_id 496265
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496265
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3794
reference_id CVE-2008-3794
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-3794
15
reference_url https://security.gentoo.org/glsa/200809-06
reference_id GLSA-200809-06
reference_type
scores
url https://security.gentoo.org/glsa/200809-06
16
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/6293.txt
reference_id OSVDB-47836;CVE-2008-3794
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/6293.txt
fixed_packages
0
url pkg:deb/debian/vlc@0.8.6.h-4?distro=trixie
purl pkg:deb/debian/vlc@0.8.6.h-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0.8.6.h-4%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2008-3794
risk_score 10.0
exploitability 2.0
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uykr-jsdk-4qb1
116
url VCID-v2hu-wzmc-4ba9
vulnerability_id VCID-v2hu-wzmc-4ba9
summary The web interface in VideoLAN VLC media player before 2.0.7 has no access control which allows remote attackers to view directory listings via the 'dir' command or issue other commands without authenticating.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-3564
reference_id
reference_type
scores
0
value 0.00233
scoring_system epss
scoring_elements 0.46052
published_at 2026-04-01T12:55:00Z
1
value 0.00233
scoring_system epss
scoring_elements 0.46092
published_at 2026-04-02T12:55:00Z
2
value 0.00233
scoring_system epss
scoring_elements 0.46113
published_at 2026-04-09T12:55:00Z
3
value 0.00233
scoring_system epss
scoring_elements 0.4606
published_at 2026-04-07T12:55:00Z
4
value 0.00233
scoring_system epss
scoring_elements 0.46116
published_at 2026-04-08T12:55:00Z
5
value 0.00233
scoring_system epss
scoring_elements 0.46137
published_at 2026-04-11T12:55:00Z
6
value 0.00233
scoring_system epss
scoring_elements 0.46109
published_at 2026-04-12T12:55:00Z
7
value 0.00233
scoring_system epss
scoring_elements 0.46118
published_at 2026-04-13T12:55:00Z
8
value 0.00233
scoring_system epss
scoring_elements 0.46175
published_at 2026-04-16T12:55:00Z
9
value 0.00233
scoring_system epss
scoring_elements 0.46172
published_at 2026-04-18T12:55:00Z
10
value 0.00233
scoring_system epss
scoring_elements 0.46117
published_at 2026-04-21T12:55:00Z
11
value 0.00233
scoring_system epss
scoring_elements 0.46097
published_at 2026-04-24T12:55:00Z
12
value 0.00233
scoring_system epss
scoring_elements 0.46106
published_at 2026-04-26T12:55:00Z
13
value 0.00233
scoring_system epss
scoring_elements 0.46047
published_at 2026-04-29T12:55:00Z
14
value 0.00233
scoring_system epss
scoring_elements 0.45947
published_at 2026-05-05T12:55:00Z
15
value 0.00233
scoring_system epss
scoring_elements 0.46011
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-3564
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3564
fixed_packages
0
url pkg:deb/debian/vlc@2.0.7-1?distro=trixie
purl pkg:deb/debian/vlc@2.0.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@2.0.7-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2013-3564
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v2hu-wzmc-4ba9
117
url VCID-v5wk-fb4c-b3h1
vulnerability_id VCID-v5wk-fb4c-b3h1
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could result in the arbitrary execution of code.
references
0
reference_url http://git.videolan.org/?p=vlc.git&a=search&h=refs%2Fheads%2Fmaster&st=commit&s=cve-2019
reference_id
reference_type
scores
url http://git.videolan.org/?p=vlc.git&a=search&h=refs%2Fheads%2Fmaster&st=commit&s=cve-2019
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00036.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00036.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00046.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00046.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-14438
reference_id
reference_type
scores
0
value 0.0051
scoring_system epss
scoring_elements 0.66457
published_at 2026-05-07T12:55:00Z
1
value 0.0051
scoring_system epss
scoring_elements 0.66437
published_at 2026-04-29T12:55:00Z
2
value 0.0051
scoring_system epss
scoring_elements 0.66288
published_at 2026-04-01T12:55:00Z
3
value 0.0051
scoring_system epss
scoring_elements 0.66327
published_at 2026-04-02T12:55:00Z
4
value 0.0051
scoring_system epss
scoring_elements 0.66354
published_at 2026-04-04T12:55:00Z
5
value 0.0051
scoring_system epss
scoring_elements 0.66324
published_at 2026-04-07T12:55:00Z
6
value 0.0051
scoring_system epss
scoring_elements 0.66372
published_at 2026-04-08T12:55:00Z
7
value 0.0051
scoring_system epss
scoring_elements 0.66385
published_at 2026-04-09T12:55:00Z
8
value 0.0051
scoring_system epss
scoring_elements 0.66406
published_at 2026-04-11T12:55:00Z
9
value 0.0051
scoring_system epss
scoring_elements 0.66392
published_at 2026-04-12T12:55:00Z
10
value 0.0051
scoring_system epss
scoring_elements 0.66362
published_at 2026-04-13T12:55:00Z
11
value 0.0051
scoring_system epss
scoring_elements 0.66397
published_at 2026-04-16T12:55:00Z
12
value 0.0051
scoring_system epss
scoring_elements 0.66413
published_at 2026-05-05T12:55:00Z
13
value 0.0051
scoring_system epss
scoring_elements 0.66398
published_at 2026-04-21T12:55:00Z
14
value 0.0051
scoring_system epss
scoring_elements 0.66421
published_at 2026-04-24T12:55:00Z
15
value 0.0051
scoring_system epss
scoring_elements 0.66436
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-14438
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13602
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13962
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14437
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14438
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14438
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14498
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14533
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14534
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14534
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14535
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14535
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14776
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14777
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14778
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14970
16
reference_url https://seclists.org/bugtraq/2019/Aug/36
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Aug/36
17
reference_url https://www.debian.org/security/2019/dsa-4504
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4504
18
reference_url https://www.videolan.org/security/sb-vlc308.html
reference_id
reference_type
scores
url https://www.videolan.org/security/sb-vlc308.html
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:3.0.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:3.0.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:3.0.7.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-14438
reference_id CVE-2019-14438
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-14438
23
reference_url https://security.gentoo.org/glsa/201909-02
reference_id GLSA-201909-02
reference_type
scores
url https://security.gentoo.org/glsa/201909-02
24
reference_url https://usn.ubuntu.com/4131-1/
reference_id USN-4131-1
reference_type
scores
url https://usn.ubuntu.com/4131-1/
fixed_packages
0
url pkg:deb/debian/vlc@3.0.8-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.8-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2019-14438
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v5wk-fb4c-b3h1
118
url VCID-v6g4-5jg7-fkad
vulnerability_id VCID-v6g4-5jg7-fkad
summary
Multiple vulnerabilities in xine-lib might result in the remote execution
    of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1274.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1274.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1274
reference_id
reference_type
scores
0
value 0.04836
scoring_system epss
scoring_elements 0.89485
published_at 2026-04-01T12:55:00Z
1
value 0.04836
scoring_system epss
scoring_elements 0.89488
published_at 2026-04-02T12:55:00Z
2
value 0.04836
scoring_system epss
scoring_elements 0.895
published_at 2026-04-07T12:55:00Z
3
value 0.04836
scoring_system epss
scoring_elements 0.89516
published_at 2026-04-08T12:55:00Z
4
value 0.04836
scoring_system epss
scoring_elements 0.8952
published_at 2026-04-13T12:55:00Z
5
value 0.04836
scoring_system epss
scoring_elements 0.89527
published_at 2026-04-11T12:55:00Z
6
value 0.04836
scoring_system epss
scoring_elements 0.89525
published_at 2026-04-12T12:55:00Z
7
value 0.04836
scoring_system epss
scoring_elements 0.89534
published_at 2026-04-16T12:55:00Z
8
value 0.04836
scoring_system epss
scoring_elements 0.89535
published_at 2026-04-18T12:55:00Z
9
value 0.04836
scoring_system epss
scoring_elements 0.89533
published_at 2026-04-21T12:55:00Z
10
value 0.04836
scoring_system epss
scoring_elements 0.89548
published_at 2026-04-24T12:55:00Z
11
value 0.04836
scoring_system epss
scoring_elements 0.89552
published_at 2026-04-29T12:55:00Z
12
value 0.04836
scoring_system epss
scoring_elements 0.8956
published_at 2026-05-05T12:55:00Z
13
value 0.04836
scoring_system epss
scoring_elements 0.89578
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1274
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495031
reference_id 495031
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495031
3
reference_url https://security.gentoo.org/glsa/201006-04
reference_id GLSA-201006-04
reference_type
scores
url https://security.gentoo.org/glsa/201006-04
4
reference_url https://usn.ubuntu.com/763-1/
reference_id USN-763-1
reference_type
scores
url https://usn.ubuntu.com/763-1/
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2009-1274
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v6g4-5jg7-fkad
119
url VCID-v8gd-4b6v-6qaw
vulnerability_id VCID-v8gd-4b6v-6qaw
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could lead to user-assisted execution of arbitrary code.
references
0
reference_url http://marc.info/?l=oss-security&m=135274330022215&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=135274330022215&w=2
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-5855
reference_id
reference_type
scores
0
value 0.00344
scoring_system epss
scoring_elements 0.56961
published_at 2026-05-07T12:55:00Z
1
value 0.00344
scoring_system epss
scoring_elements 0.56912
published_at 2026-04-01T12:55:00Z
2
value 0.00344
scoring_system epss
scoring_elements 0.57009
published_at 2026-04-02T12:55:00Z
3
value 0.00344
scoring_system epss
scoring_elements 0.57031
published_at 2026-04-04T12:55:00Z
4
value 0.00344
scoring_system epss
scoring_elements 0.57008
published_at 2026-04-07T12:55:00Z
5
value 0.00344
scoring_system epss
scoring_elements 0.57058
published_at 2026-04-08T12:55:00Z
6
value 0.00344
scoring_system epss
scoring_elements 0.5706
published_at 2026-04-09T12:55:00Z
7
value 0.00344
scoring_system epss
scoring_elements 0.57071
published_at 2026-04-11T12:55:00Z
8
value 0.00344
scoring_system epss
scoring_elements 0.5705
published_at 2026-04-12T12:55:00Z
9
value 0.00344
scoring_system epss
scoring_elements 0.57027
published_at 2026-04-13T12:55:00Z
10
value 0.00344
scoring_system epss
scoring_elements 0.57055
published_at 2026-04-16T12:55:00Z
11
value 0.00344
scoring_system epss
scoring_elements 0.57052
published_at 2026-04-18T12:55:00Z
12
value 0.00344
scoring_system epss
scoring_elements 0.5703
published_at 2026-04-21T12:55:00Z
13
value 0.00344
scoring_system epss
scoring_elements 0.56964
published_at 2026-04-29T12:55:00Z
14
value 0.00344
scoring_system epss
scoring_elements 0.56983
published_at 2026-04-26T12:55:00Z
15
value 0.00344
scoring_system epss
scoring_elements 0.56915
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-5855
2
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16781
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16781
3
reference_url http://www.securityfocus.com/archive/1/524626
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/524626
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:2.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.0:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.1:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.2:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.3:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-5855
reference_id CVE-2012-5855
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-5855
10
reference_url https://security.gentoo.org/glsa/201411-01
reference_id GLSA-201411-01
reference_type
scores
url https://security.gentoo.org/glsa/201411-01
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2012-5855
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v8gd-4b6v-6qaw
120
url VCID-vn64-q1cr-rub4
vulnerability_id VCID-vn64-q1cr-rub4
summary A certain ActiveX control in axvlc.dll in VideoLAN VLC 0.8.6 before 0.8.6d allows remote attackers to execute arbitrary code via crafted arguments to the (1) addTarget, (2) getVariable, or (3) setVariable function, resulting from a "bad initialized pointer," aka a "recursive plugin release vulnerability."
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-6262
reference_id
reference_type
scores
0
value 0.22802
scoring_system epss
scoring_elements 0.95842
published_at 2026-04-01T12:55:00Z
1
value 0.22802
scoring_system epss
scoring_elements 0.9585
published_at 2026-04-02T12:55:00Z
2
value 0.22802
scoring_system epss
scoring_elements 0.95859
published_at 2026-04-04T12:55:00Z
3
value 0.22802
scoring_system epss
scoring_elements 0.95862
published_at 2026-04-07T12:55:00Z
4
value 0.22802
scoring_system epss
scoring_elements 0.95871
published_at 2026-04-08T12:55:00Z
5
value 0.22802
scoring_system epss
scoring_elements 0.95874
published_at 2026-04-09T12:55:00Z
6
value 0.22802
scoring_system epss
scoring_elements 0.95877
published_at 2026-04-12T12:55:00Z
7
value 0.22802
scoring_system epss
scoring_elements 0.95879
published_at 2026-04-13T12:55:00Z
8
value 0.22802
scoring_system epss
scoring_elements 0.9589
published_at 2026-04-16T12:55:00Z
9
value 0.22802
scoring_system epss
scoring_elements 0.95896
published_at 2026-04-18T12:55:00Z
10
value 0.22802
scoring_system epss
scoring_elements 0.95898
published_at 2026-04-21T12:55:00Z
11
value 0.22802
scoring_system epss
scoring_elements 0.95899
published_at 2026-04-29T12:55:00Z
12
value 0.22802
scoring_system epss
scoring_elements 0.95912
published_at 2026-05-05T12:55:00Z
13
value 0.22802
scoring_system epss
scoring_elements 0.95915
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-6262
1
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/4688.html
reference_id OSVDB-42192;CVE-2007-6262
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/4688.html
2
reference_url http://www.coresecurity.com/?action=item&id=2035
reference_id OSVDB-42192;CVE-2007-6262
reference_type exploit
scores
url http://www.coresecurity.com/?action=item&id=2035
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2007-6262
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vn64-q1cr-rub4
121
url VCID-vsn2-k6hq-7keu
vulnerability_id VCID-vsn2-k6hq-7keu
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    may allow remote attackers to execute arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-8311
reference_id
reference_type
scores
0
value 0.07052
scoring_system epss
scoring_elements 0.91552
published_at 2026-05-07T12:55:00Z
1
value 0.07052
scoring_system epss
scoring_elements 0.91455
published_at 2026-04-01T12:55:00Z
2
value 0.07052
scoring_system epss
scoring_elements 0.91462
published_at 2026-04-02T12:55:00Z
3
value 0.07052
scoring_system epss
scoring_elements 0.91468
published_at 2026-04-04T12:55:00Z
4
value 0.07052
scoring_system epss
scoring_elements 0.91476
published_at 2026-04-07T12:55:00Z
5
value 0.07052
scoring_system epss
scoring_elements 0.91489
published_at 2026-04-08T12:55:00Z
6
value 0.07052
scoring_system epss
scoring_elements 0.91496
published_at 2026-04-09T12:55:00Z
7
value 0.07052
scoring_system epss
scoring_elements 0.91501
published_at 2026-04-11T12:55:00Z
8
value 0.07052
scoring_system epss
scoring_elements 0.91502
published_at 2026-04-12T12:55:00Z
9
value 0.07052
scoring_system epss
scoring_elements 0.915
published_at 2026-04-13T12:55:00Z
10
value 0.07052
scoring_system epss
scoring_elements 0.91523
published_at 2026-04-16T12:55:00Z
11
value 0.07052
scoring_system epss
scoring_elements 0.91519
published_at 2026-04-21T12:55:00Z
12
value 0.07052
scoring_system epss
scoring_elements 0.91528
published_at 2026-04-24T12:55:00Z
13
value 0.07052
scoring_system epss
scoring_elements 0.91526
published_at 2026-04-26T12:55:00Z
14
value 0.07052
scoring_system epss
scoring_elements 0.91525
published_at 2026-04-29T12:55:00Z
15
value 0.07052
scoring_system epss
scoring_elements 0.91537
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-8311
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8310
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8311
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8312
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8313
5
reference_url https://security.archlinux.org/ASA-201706-1
reference_id ASA-201706-1
reference_type
scores
url https://security.archlinux.org/ASA-201706-1
6
reference_url https://security.archlinux.org/AVG-283
reference_id AVG-283
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-283
7
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/44514.py
reference_id CVE-2017-8311
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/44514.py
8
reference_url https://security.gentoo.org/glsa/201707-10
reference_id GLSA-201707-10
reference_type
scores
url https://security.gentoo.org/glsa/201707-10
fixed_packages
0
url pkg:deb/debian/vlc@2.2.5-1?distro=trixie
purl pkg:deb/debian/vlc@2.2.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@2.2.5-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2017-8311
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vsn2-k6hq-7keu
122
url VCID-wc8e-6c6f-guev
vulnerability_id VCID-wc8e-6c6f-guev
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could lead to user-assisted execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6283
reference_id
reference_type
scores
0
value 0.09811
scoring_system epss
scoring_elements 0.92938
published_at 2026-04-01T12:55:00Z
1
value 0.09811
scoring_system epss
scoring_elements 0.92947
published_at 2026-04-02T12:55:00Z
2
value 0.09811
scoring_system epss
scoring_elements 0.92952
published_at 2026-04-04T12:55:00Z
3
value 0.09811
scoring_system epss
scoring_elements 0.92951
published_at 2026-04-07T12:55:00Z
4
value 0.09811
scoring_system epss
scoring_elements 0.92959
published_at 2026-04-08T12:55:00Z
5
value 0.09811
scoring_system epss
scoring_elements 0.92963
published_at 2026-04-09T12:55:00Z
6
value 0.09811
scoring_system epss
scoring_elements 0.92968
published_at 2026-04-11T12:55:00Z
7
value 0.09811
scoring_system epss
scoring_elements 0.92966
published_at 2026-04-12T12:55:00Z
8
value 0.09811
scoring_system epss
scoring_elements 0.92967
published_at 2026-04-13T12:55:00Z
9
value 0.09811
scoring_system epss
scoring_elements 0.92977
published_at 2026-04-16T12:55:00Z
10
value 0.09811
scoring_system epss
scoring_elements 0.92979
published_at 2026-04-18T12:55:00Z
11
value 0.09811
scoring_system epss
scoring_elements 0.92986
published_at 2026-04-29T12:55:00Z
12
value 0.09811
scoring_system epss
scoring_elements 0.92989
published_at 2026-04-24T12:55:00Z
13
value 0.09811
scoring_system epss
scoring_elements 0.9299
published_at 2026-04-26T12:55:00Z
14
value 0.09811
scoring_system epss
scoring_elements 0.92993
published_at 2026-05-05T12:55:00Z
15
value 0.09811
scoring_system epss
scoring_elements 0.9301
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6283
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6283
2
reference_url https://security.gentoo.org/glsa/201411-01
reference_id GLSA-201411-01
reference_type
scores
url https://security.gentoo.org/glsa/201411-01
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/27700.py
reference_id OSVDB-96603;CVE-2013-6283
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/27700.py
fixed_packages
0
url pkg:deb/debian/vlc@2.1.0-2?distro=trixie
purl pkg:deb/debian/vlc@2.1.0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@2.1.0-2%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2013-6283
risk_score 0.2
exploitability 2.0
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wc8e-6c6f-guev
123
url VCID-wumh-9k8p-pyg6
vulnerability_id VCID-wumh-9k8p-pyg6
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could lead to user-assisted execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2587
reference_id
reference_type
scores
0
value 0.03007
scoring_system epss
scoring_elements 0.86524
published_at 2026-04-01T12:55:00Z
1
value 0.03007
scoring_system epss
scoring_elements 0.86534
published_at 2026-04-02T12:55:00Z
2
value 0.03007
scoring_system epss
scoring_elements 0.86553
published_at 2026-04-04T12:55:00Z
3
value 0.03007
scoring_system epss
scoring_elements 0.86552
published_at 2026-04-07T12:55:00Z
4
value 0.03007
scoring_system epss
scoring_elements 0.86572
published_at 2026-04-08T12:55:00Z
5
value 0.03007
scoring_system epss
scoring_elements 0.86582
published_at 2026-04-09T12:55:00Z
6
value 0.03007
scoring_system epss
scoring_elements 0.86596
published_at 2026-04-11T12:55:00Z
7
value 0.03007
scoring_system epss
scoring_elements 0.86593
published_at 2026-04-12T12:55:00Z
8
value 0.03007
scoring_system epss
scoring_elements 0.86586
published_at 2026-04-13T12:55:00Z
9
value 0.03007
scoring_system epss
scoring_elements 0.866
published_at 2026-04-16T12:55:00Z
10
value 0.03007
scoring_system epss
scoring_elements 0.86605
published_at 2026-04-18T12:55:00Z
11
value 0.03007
scoring_system epss
scoring_elements 0.86597
published_at 2026-04-21T12:55:00Z
12
value 0.03007
scoring_system epss
scoring_elements 0.86615
published_at 2026-04-24T12:55:00Z
13
value 0.03007
scoring_system epss
scoring_elements 0.86624
published_at 2026-04-26T12:55:00Z
14
value 0.03007
scoring_system epss
scoring_elements 0.86622
published_at 2026-04-29T12:55:00Z
15
value 0.03007
scoring_system epss
scoring_elements 0.86643
published_at 2026-05-05T12:55:00Z
16
value 0.03007
scoring_system epss
scoring_elements 0.86662
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2587
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2587
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2587
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=633674
reference_id 633674
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=633674
3
reference_url https://security.gentoo.org/glsa/201411-01
reference_id GLSA-201411-01
reference_type
scores
url https://security.gentoo.org/glsa/201411-01
fixed_packages
0
url pkg:deb/debian/vlc@1.1.11-1?distro=trixie
purl pkg:deb/debian/vlc@1.1.11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@1.1.11-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2011-2587
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wumh-9k8p-pyg6
124
url VCID-wy35-9c44-mfe6
vulnerability_id VCID-wy35-9c44-mfe6
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could lead to user-assisted execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3377
reference_id
reference_type
scores
0
value 0.03905
scoring_system epss
scoring_elements 0.88232
published_at 2026-04-01T12:55:00Z
1
value 0.03905
scoring_system epss
scoring_elements 0.8824
published_at 2026-04-02T12:55:00Z
2
value 0.03905
scoring_system epss
scoring_elements 0.88255
published_at 2026-04-04T12:55:00Z
3
value 0.03905
scoring_system epss
scoring_elements 0.8826
published_at 2026-04-07T12:55:00Z
4
value 0.03905
scoring_system epss
scoring_elements 0.88279
published_at 2026-04-08T12:55:00Z
5
value 0.03905
scoring_system epss
scoring_elements 0.88285
published_at 2026-04-09T12:55:00Z
6
value 0.03905
scoring_system epss
scoring_elements 0.88297
published_at 2026-04-11T12:55:00Z
7
value 0.03905
scoring_system epss
scoring_elements 0.88289
published_at 2026-04-13T12:55:00Z
8
value 0.03905
scoring_system epss
scoring_elements 0.88302
published_at 2026-04-16T12:55:00Z
9
value 0.03905
scoring_system epss
scoring_elements 0.88301
published_at 2026-04-18T12:55:00Z
10
value 0.03905
scoring_system epss
scoring_elements 0.883
published_at 2026-04-21T12:55:00Z
11
value 0.03905
scoring_system epss
scoring_elements 0.88318
published_at 2026-04-24T12:55:00Z
12
value 0.03905
scoring_system epss
scoring_elements 0.88323
published_at 2026-04-26T12:55:00Z
13
value 0.03905
scoring_system epss
scoring_elements 0.88326
published_at 2026-04-29T12:55:00Z
14
value 0.03905
scoring_system epss
scoring_elements 0.88336
published_at 2026-05-05T12:55:00Z
15
value 0.03905
scoring_system epss
scoring_elements 0.88352
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3377
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3377
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=680665
reference_id 680665
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=680665
3
reference_url https://security.gentoo.org/glsa/201411-01
reference_id GLSA-201411-01
reference_type
scores
url https://security.gentoo.org/glsa/201411-01
fixed_packages
0
url pkg:deb/debian/vlc@2.0.2-1?distro=trixie
purl pkg:deb/debian/vlc@2.0.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@2.0.2-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2012-3377
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wy35-9c44-mfe6
125
url VCID-x1rg-a26b-6ke4
vulnerability_id VCID-x1rg-a26b-6ke4
summary Array index error in VLC media player 0.9.2 allows remote attackers to overwrite arbitrary memory and execute arbitrary code via an XSPF playlist file with a negative identifier tag, which passes a signed comparison.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4558
reference_id
reference_type
scores
0
value 0.19574
scoring_system epss
scoring_elements 0.95446
published_at 2026-05-07T12:55:00Z
1
value 0.19574
scoring_system epss
scoring_elements 0.95375
published_at 2026-04-01T12:55:00Z
2
value 0.19574
scoring_system epss
scoring_elements 0.95384
published_at 2026-04-02T12:55:00Z
3
value 0.19574
scoring_system epss
scoring_elements 0.95391
published_at 2026-04-04T12:55:00Z
4
value 0.19574
scoring_system epss
scoring_elements 0.95395
published_at 2026-04-07T12:55:00Z
5
value 0.19574
scoring_system epss
scoring_elements 0.95402
published_at 2026-04-08T12:55:00Z
6
value 0.19574
scoring_system epss
scoring_elements 0.95405
published_at 2026-04-09T12:55:00Z
7
value 0.19574
scoring_system epss
scoring_elements 0.9541
published_at 2026-04-12T12:55:00Z
8
value 0.19574
scoring_system epss
scoring_elements 0.95412
published_at 2026-04-13T12:55:00Z
9
value 0.19574
scoring_system epss
scoring_elements 0.9542
published_at 2026-04-16T12:55:00Z
10
value 0.19574
scoring_system epss
scoring_elements 0.95424
published_at 2026-04-18T12:55:00Z
11
value 0.19574
scoring_system epss
scoring_elements 0.95428
published_at 2026-04-24T12:55:00Z
12
value 0.19574
scoring_system epss
scoring_elements 0.95429
published_at 2026-04-26T12:55:00Z
13
value 0.19574
scoring_system epss
scoring_elements 0.9543
published_at 2026-04-29T12:55:00Z
14
value 0.19574
scoring_system epss
scoring_elements 0.9544
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4558
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4558
2
reference_url http://secunia.com/advisories/32267
reference_id
reference_type
scores
url http://secunia.com/advisories/32267
3
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/45869
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/45869
4
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14726
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14726
5
reference_url http://www.exploit-db.com/exploits/6756
reference_id
reference_type
scores
url http://www.exploit-db.com/exploits/6756
6
reference_url http://www.securityfocus.com/archive/1/497354/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/497354/100/0/threaded
7
reference_url http://www.securityfocus.com/bid/31758
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/31758
8
reference_url http://www.vupen.com/english/advisories/2008/2826
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2826
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=502314
reference_id 502314
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=502314
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4558
reference_id CVE-2008-4558
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-4558
12
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/6756.txt
reference_id OSVDB-63986;CVE-2008-4558;OSVDB-49112
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/6756.txt
13
reference_url http://www.coresecurity.com/content/vlc-xspf-memory-corruption
reference_id OSVDB-63986;CVE-2008-4558;OSVDB-49112
reference_type exploit
scores
url http://www.coresecurity.com/content/vlc-xspf-memory-corruption
fixed_packages
0
url pkg:deb/debian/vlc@0.9.3-1?distro=trixie
purl pkg:deb/debian/vlc@0.9.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0.9.3-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2008-4558
risk_score 10.0
exploitability 2.0
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x1rg-a26b-6ke4
126
url VCID-x8r6-rr2f-dufm
vulnerability_id VCID-x8r6-rr2f-dufm
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could result in the arbitrary execution of code.
references
0
reference_url http://git.videolan.org/?p=vlc.git&a=search&h=refs/heads/master&st=commit&s=cve-2019
reference_id
reference_type
scores
url http://git.videolan.org/?p=vlc.git&a=search&h=refs/heads/master&st=commit&s=cve-2019
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00036.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00036.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00046.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00046.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-14533
reference_id
reference_type
scores
0
value 0.00307
scoring_system epss
scoring_elements 0.53927
published_at 2026-05-07T12:55:00Z
1
value 0.00307
scoring_system epss
scoring_elements 0.53884
published_at 2026-05-05T12:55:00Z
2
value 0.00307
scoring_system epss
scoring_elements 0.53879
published_at 2026-04-01T12:55:00Z
3
value 0.00307
scoring_system epss
scoring_elements 0.53897
published_at 2026-04-02T12:55:00Z
4
value 0.00307
scoring_system epss
scoring_elements 0.53925
published_at 2026-04-04T12:55:00Z
5
value 0.00307
scoring_system epss
scoring_elements 0.539
published_at 2026-04-07T12:55:00Z
6
value 0.00307
scoring_system epss
scoring_elements 0.53952
published_at 2026-04-08T12:55:00Z
7
value 0.00307
scoring_system epss
scoring_elements 0.53951
published_at 2026-04-09T12:55:00Z
8
value 0.00307
scoring_system epss
scoring_elements 0.53998
published_at 2026-04-11T12:55:00Z
9
value 0.00307
scoring_system epss
scoring_elements 0.53981
published_at 2026-04-12T12:55:00Z
10
value 0.00307
scoring_system epss
scoring_elements 0.53963
published_at 2026-04-13T12:55:00Z
11
value 0.00307
scoring_system epss
scoring_elements 0.54001
published_at 2026-04-16T12:55:00Z
12
value 0.00307
scoring_system epss
scoring_elements 0.54006
published_at 2026-04-18T12:55:00Z
13
value 0.00307
scoring_system epss
scoring_elements 0.53987
published_at 2026-04-21T12:55:00Z
14
value 0.00307
scoring_system epss
scoring_elements 0.53954
published_at 2026-04-24T12:55:00Z
15
value 0.00307
scoring_system epss
scoring_elements 0.53966
published_at 2026-04-26T12:55:00Z
16
value 0.00307
scoring_system epss
scoring_elements 0.53936
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-14533
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13602
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13962
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14437
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14438
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14438
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14498
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14533
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14534
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14534
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14535
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14535
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14776
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14777
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14778
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14970
16
reference_url https://seclists.org/bugtraq/2019/Aug/36
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Aug/36
17
reference_url https://www.debian.org/security/2019/dsa-4504
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4504
18
reference_url https://www.videolan.org/security/sb-vlc308.html
reference_id
reference_type
scores
url https://www.videolan.org/security/sb-vlc308.html
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:3.0.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:3.0.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:3.0.7.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-14533
reference_id CVE-2019-14533
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-14533
23
reference_url https://security.gentoo.org/glsa/201909-02
reference_id GLSA-201909-02
reference_type
scores
url https://security.gentoo.org/glsa/201909-02
24
reference_url https://usn.ubuntu.com/4131-1/
reference_id USN-4131-1
reference_type
scores
url https://usn.ubuntu.com/4131-1/
fixed_packages
0
url pkg:deb/debian/vlc@3.0.8-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.8-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2019-14533
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x8r6-rr2f-dufm
127
url VCID-xtea-txya-zqbw
vulnerability_id VCID-xtea-txya-zqbw
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could lead to user-assisted execution of arbitrary code.
references
0
reference_url http://git.videolan.org/?p=vlc/vlc-1.1.git%3Ba=commit%3Bh=08813ee6f8eb0faf83790bd4247c0a97af75a1cf
reference_id
reference_type
scores
url http://git.videolan.org/?p=vlc/vlc-1.1.git%3Ba=commit%3Bh=08813ee6f8eb0faf83790bd4247c0a97af75a1cf
1
reference_url http://openwall.com/lists/oss-security/2010/04/28/4
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/04/28/4
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1444
reference_id
reference_type
scores
0
value 0.019
scoring_system epss
scoring_elements 0.83352
published_at 2026-05-07T12:55:00Z
1
value 0.019
scoring_system epss
scoring_elements 0.83163
published_at 2026-04-01T12:55:00Z
2
value 0.019
scoring_system epss
scoring_elements 0.8318
published_at 2026-04-02T12:55:00Z
3
value 0.019
scoring_system epss
scoring_elements 0.83194
published_at 2026-04-04T12:55:00Z
4
value 0.019
scoring_system epss
scoring_elements 0.83192
published_at 2026-04-07T12:55:00Z
5
value 0.019
scoring_system epss
scoring_elements 0.83217
published_at 2026-04-08T12:55:00Z
6
value 0.019
scoring_system epss
scoring_elements 0.83224
published_at 2026-04-09T12:55:00Z
7
value 0.019
scoring_system epss
scoring_elements 0.8324
published_at 2026-04-11T12:55:00Z
8
value 0.019
scoring_system epss
scoring_elements 0.83234
published_at 2026-04-12T12:55:00Z
9
value 0.019
scoring_system epss
scoring_elements 0.83229
published_at 2026-04-13T12:55:00Z
10
value 0.019
scoring_system epss
scoring_elements 0.83266
published_at 2026-04-16T12:55:00Z
11
value 0.019
scoring_system epss
scoring_elements 0.83267
published_at 2026-04-18T12:55:00Z
12
value 0.019
scoring_system epss
scoring_elements 0.83268
published_at 2026-04-21T12:55:00Z
13
value 0.019
scoring_system epss
scoring_elements 0.83292
published_at 2026-04-24T12:55:00Z
14
value 0.019
scoring_system epss
scoring_elements 0.833
published_at 2026-04-26T12:55:00Z
15
value 0.019
scoring_system epss
scoring_elements 0.83307
published_at 2026-04-29T12:55:00Z
16
value 0.019
scoring_system epss
scoring_elements 0.83331
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1444
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1444
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1444
4
reference_url http://www.videolan.org/security/sa1003.html
reference_id
reference_type
scores
url http://www.videolan.org/security/sa1003.html
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1337:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.1337:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1337:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-1444
reference_id CVE-2010-1444
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-1444
50
reference_url https://security.gentoo.org/glsa/201411-01
reference_id GLSA-201411-01
reference_type
scores
url https://security.gentoo.org/glsa/201411-01
fixed_packages
0
url pkg:deb/debian/vlc@1.0.6-1?distro=trixie
purl pkg:deb/debian/vlc@1.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@1.0.6-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2010-1444
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xtea-txya-zqbw
128
url VCID-xuxj-e3ez-g3bx
vulnerability_id VCID-xuxj-e3ez-g3bx
summary
Multiple vulnerabilities in xine-lib might result in the remote execution
    of arbitrary code.
references
0
reference_url http://bugs.xine-project.org/show_bug.cgi?id=205
reference_id
reference_type
scores
url http://bugs.xine-project.org/show_bug.cgi?id=205
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0698
reference_id
reference_type
scores
0
value 0.02442
scoring_system epss
scoring_elements 0.85273
published_at 2026-05-07T12:55:00Z
1
value 0.02442
scoring_system epss
scoring_elements 0.85108
published_at 2026-04-01T12:55:00Z
2
value 0.02442
scoring_system epss
scoring_elements 0.85121
published_at 2026-04-02T12:55:00Z
3
value 0.02442
scoring_system epss
scoring_elements 0.85138
published_at 2026-04-04T12:55:00Z
4
value 0.02442
scoring_system epss
scoring_elements 0.85142
published_at 2026-04-07T12:55:00Z
5
value 0.02442
scoring_system epss
scoring_elements 0.85164
published_at 2026-04-08T12:55:00Z
6
value 0.02442
scoring_system epss
scoring_elements 0.85171
published_at 2026-04-09T12:55:00Z
7
value 0.02442
scoring_system epss
scoring_elements 0.85186
published_at 2026-04-11T12:55:00Z
8
value 0.02442
scoring_system epss
scoring_elements 0.85183
published_at 2026-04-12T12:55:00Z
9
value 0.02442
scoring_system epss
scoring_elements 0.8518
published_at 2026-04-13T12:55:00Z
10
value 0.02442
scoring_system epss
scoring_elements 0.85202
published_at 2026-04-16T12:55:00Z
11
value 0.02442
scoring_system epss
scoring_elements 0.85203
published_at 2026-04-21T12:55:00Z
12
value 0.02442
scoring_system epss
scoring_elements 0.85225
published_at 2026-04-24T12:55:00Z
13
value 0.02442
scoring_system epss
scoring_elements 0.85234
published_at 2026-04-26T12:55:00Z
14
value 0.02442
scoring_system epss
scoring_elements 0.85231
published_at 2026-04-29T12:55:00Z
15
value 0.02442
scoring_system epss
scoring_elements 0.85246
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0698
3
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/48954
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/48954
4
reference_url http://sourceforge.net/project/shownotes.php?release_id=660071
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?release_id=660071
5
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:298
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:298
6
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:299
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:299
7
reference_url http://www.securityfocus.com/archive/1/500514/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/500514/100/0/threaded
8
reference_url http://www.trapkit.de/advisories/TKADV2009-004.txt
reference_id
reference_type
scores
url http://www.trapkit.de/advisories/TKADV2009-004.txt
9
reference_url http://www.ubuntu.com/usn/USN-746-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-746-1
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.16.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.16.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.16.1:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2009-0698
reference_id CVE-2009-0698
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2009-0698
12
reference_url https://security.gentoo.org/glsa/201006-04
reference_id GLSA-201006-04
reference_type
scores
url https://security.gentoo.org/glsa/201006-04
13
reference_url https://usn.ubuntu.com/746-1/
reference_id USN-746-1
reference_type
scores
url https://usn.ubuntu.com/746-1/
14
reference_url https://usn.ubuntu.com/763-1/
reference_id USN-763-1
reference_type
scores
url https://usn.ubuntu.com/763-1/
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2009-0698
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xuxj-e3ez-g3bx
129
url VCID-xzuw-5nq6-nqe7
vulnerability_id VCID-xzuw-5nq6-nqe7
summary
Multiple vulnerabilities were found in VLC, allowing for the execution of
    arbitrary code and Denial of Service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-6682
reference_id
reference_type
scores
0
value 0.33037
scoring_system epss
scoring_elements 0.96862
published_at 2026-04-01T12:55:00Z
1
value 0.33037
scoring_system epss
scoring_elements 0.96869
published_at 2026-04-02T12:55:00Z
2
value 0.34376
scoring_system epss
scoring_elements 0.96972
published_at 2026-04-04T12:55:00Z
3
value 0.34376
scoring_system epss
scoring_elements 0.96975
published_at 2026-04-07T12:55:00Z
4
value 0.34376
scoring_system epss
scoring_elements 0.96983
published_at 2026-04-08T12:55:00Z
5
value 0.34376
scoring_system epss
scoring_elements 0.96984
published_at 2026-04-09T12:55:00Z
6
value 0.34376
scoring_system epss
scoring_elements 0.96987
published_at 2026-04-11T12:55:00Z
7
value 0.34376
scoring_system epss
scoring_elements 0.96988
published_at 2026-04-13T12:55:00Z
8
value 0.34376
scoring_system epss
scoring_elements 0.96997
published_at 2026-04-16T12:55:00Z
9
value 0.34376
scoring_system epss
scoring_elements 0.97
published_at 2026-04-18T12:55:00Z
10
value 0.34376
scoring_system epss
scoring_elements 0.97003
published_at 2026-04-21T12:55:00Z
11
value 0.34376
scoring_system epss
scoring_elements 0.97004
published_at 2026-04-24T12:55:00Z
12
value 0.34376
scoring_system epss
scoring_elements 0.97006
published_at 2026-04-26T12:55:00Z
13
value 0.34376
scoring_system epss
scoring_elements 0.97008
published_at 2026-04-29T12:55:00Z
14
value 0.34376
scoring_system epss
scoring_elements 0.97012
published_at 2026-05-05T12:55:00Z
15
value 0.34376
scoring_system epss
scoring_elements 0.97016
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-6682
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6682
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6682
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=458318
reference_id 458318
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=458318
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/5519.c
reference_id CVE-2007-6682
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/5519.c
4
reference_url https://security.gentoo.org/glsa/200803-13
reference_id GLSA-200803-13
reference_type
scores
url https://security.gentoo.org/glsa/200803-13
fixed_packages
0
url pkg:deb/debian/vlc@0.8.6.c-4.1?distro=trixie
purl pkg:deb/debian/vlc@0.8.6.c-4.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0.8.6.c-4.1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2007-6682
risk_score 0.6
exploitability 2.0
weighted_severity 0.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xzuw-5nq6-nqe7
130
url VCID-ybgy-yct3-6fba
vulnerability_id VCID-ybgy-yct3-6fba
summary
Multiple vulnerabilities have been found in MPlayer and the bundled
    FFmpeg, the worst of which may lead to the execution of arbitrary code.
references
0
reference_url http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=dc74600c97eb834c08674676e209afa842053aca
reference_id
reference_type
scores
url http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=dc74600c97eb834c08674676e209afa842053aca
1
reference_url http://openwall.com/lists/oss-security/2010/06/04/4
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/06/04/4
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2062
reference_id
reference_type
scores
0
value 0.02991
scoring_system epss
scoring_elements 0.86626
published_at 2026-05-07T12:55:00Z
1
value 0.02991
scoring_system epss
scoring_elements 0.86483
published_at 2026-04-01T12:55:00Z
2
value 0.02991
scoring_system epss
scoring_elements 0.86493
published_at 2026-04-02T12:55:00Z
3
value 0.02991
scoring_system epss
scoring_elements 0.86512
published_at 2026-04-04T12:55:00Z
4
value 0.02991
scoring_system epss
scoring_elements 0.86511
published_at 2026-04-07T12:55:00Z
5
value 0.02991
scoring_system epss
scoring_elements 0.86531
published_at 2026-04-08T12:55:00Z
6
value 0.02991
scoring_system epss
scoring_elements 0.86541
published_at 2026-04-09T12:55:00Z
7
value 0.02991
scoring_system epss
scoring_elements 0.86556
published_at 2026-04-11T12:55:00Z
8
value 0.02991
scoring_system epss
scoring_elements 0.86552
published_at 2026-04-12T12:55:00Z
9
value 0.02991
scoring_system epss
scoring_elements 0.86547
published_at 2026-04-13T12:55:00Z
10
value 0.02991
scoring_system epss
scoring_elements 0.86561
published_at 2026-04-16T12:55:00Z
11
value 0.02991
scoring_system epss
scoring_elements 0.86567
published_at 2026-04-18T12:55:00Z
12
value 0.02991
scoring_system epss
scoring_elements 0.8656
published_at 2026-04-21T12:55:00Z
13
value 0.02991
scoring_system epss
scoring_elements 0.86578
published_at 2026-04-24T12:55:00Z
14
value 0.02991
scoring_system epss
scoring_elements 0.86587
published_at 2026-04-26T12:55:00Z
15
value 0.02991
scoring_system epss
scoring_elements 0.86586
published_at 2026-04-29T12:55:00Z
16
value 0.02991
scoring_system epss
scoring_elements 0.86607
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2062
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2062
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2062
4
reference_url https://dzcore.wordpress.com/2009/07/27/dzc-2009-001-the-movie-player-and-vlc-media-player-real-data-transport-parsing-integer-underflow/
reference_id
reference_type
scores
url https://dzcore.wordpress.com/2009/07/27/dzc-2009-001-the-movie-player-and-vlc-media-player-real-data-transport-parsing-integer-underflow/
5
reference_url http://seclists.org/fulldisclosure/2009/Jul/418
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2009/Jul/418
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=581245
reference_id 581245
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=581245
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1337:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.1337:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1337:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2062
reference_id CVE-2010-2062
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2062
47
reference_url https://security.gentoo.org/glsa/201310-13
reference_id GLSA-201310-13
reference_type
scores
url https://security.gentoo.org/glsa/201310-13
48
reference_url https://security.gentoo.org/glsa/201411-01
reference_id GLSA-201411-01
reference_type
scores
url https://security.gentoo.org/glsa/201411-01
fixed_packages
0
url pkg:deb/debian/vlc@1.0.1-1?distro=trixie
purl pkg:deb/debian/vlc@1.0.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@1.0.1-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2010-2062
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ybgy-yct3-6fba
131
url VCID-yg5r-j2sk-hbav
vulnerability_id VCID-yg5r-j2sk-hbav
summary
Multiple vulnerabilities have been found in libmicrodns, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6077
reference_id
reference_type
scores
0
value 0.00269
scoring_system epss
scoring_elements 0.50342
published_at 2026-05-07T12:55:00Z
1
value 0.00269
scoring_system epss
scoring_elements 0.50367
published_at 2026-04-29T12:55:00Z
2
value 0.00269
scoring_system epss
scoring_elements 0.50289
published_at 2026-05-05T12:55:00Z
3
value 0.00269
scoring_system epss
scoring_elements 0.50348
published_at 2026-04-01T12:55:00Z
4
value 0.00269
scoring_system epss
scoring_elements 0.50404
published_at 2026-04-02T12:55:00Z
5
value 0.00269
scoring_system epss
scoring_elements 0.50434
published_at 2026-04-09T12:55:00Z
6
value 0.00269
scoring_system epss
scoring_elements 0.50387
published_at 2026-04-07T12:55:00Z
7
value 0.00269
scoring_system epss
scoring_elements 0.5044
published_at 2026-04-08T12:55:00Z
8
value 0.00269
scoring_system epss
scoring_elements 0.50475
published_at 2026-04-11T12:55:00Z
9
value 0.00269
scoring_system epss
scoring_elements 0.50451
published_at 2026-04-12T12:55:00Z
10
value 0.00269
scoring_system epss
scoring_elements 0.50436
published_at 2026-04-13T12:55:00Z
11
value 0.00269
scoring_system epss
scoring_elements 0.50479
published_at 2026-04-16T12:55:00Z
12
value 0.00269
scoring_system epss
scoring_elements 0.50484
published_at 2026-04-18T12:55:00Z
13
value 0.00269
scoring_system epss
scoring_elements 0.50461
published_at 2026-04-21T12:55:00Z
14
value 0.00269
scoring_system epss
scoring_elements 0.50407
published_at 2026-04-24T12:55:00Z
15
value 0.00269
scoring_system epss
scoring_elements 0.50417
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6077
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19721
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6071
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6071
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6072
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6072
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6073
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6077
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6078
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6079
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6080
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6080
9
reference_url https://talosintelligence.com/vulnerability_reports/TALOS-2020-1000
reference_id
reference_type
scores
url https://talosintelligence.com/vulnerability_reports/TALOS-2020-1000
10
reference_url https://www.debian.org/security/2020/dsa-4671
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4671
11
reference_url https://security.archlinux.org/ASA-202004-24
reference_id ASA-202004-24
reference_type
scores
url https://security.archlinux.org/ASA-202004-24
12
reference_url https://security.archlinux.org/AVG-1136
reference_id AVG-1136
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1136
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolabs:libmicrodns:0.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolabs:libmicrodns:0.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolabs:libmicrodns:0.1.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-6077
reference_id CVE-2020-6077
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-6077
16
reference_url https://security.gentoo.org/glsa/202005-10
reference_id GLSA-202005-10
reference_type
scores
url https://security.gentoo.org/glsa/202005-10
17
reference_url https://usn.ubuntu.com/7239-1/
reference_id USN-7239-1
reference_type
scores
url https://usn.ubuntu.com/7239-1/
fixed_packages
0
url pkg:deb/debian/vlc@3.0.8-4?distro=trixie
purl pkg:deb/debian/vlc@3.0.8-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.8-4%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2020-6077
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yg5r-j2sk-hbav
132
url VCID-yndu-f7m6-23gk
vulnerability_id VCID-yndu-f7m6-23gk
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could result in the arbitrary execution of code.
references
0
reference_url http://git.videolan.org/?p=vlc.git&a=search&h=refs%2Fheads%2Fmaster&st=commit&s=cve-2019
reference_id
reference_type
scores
url http://git.videolan.org/?p=vlc.git&a=search&h=refs%2Fheads%2Fmaster&st=commit&s=cve-2019
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00036.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00036.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00046.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00046.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-14437
reference_id
reference_type
scores
0
value 0.00571
scoring_system epss
scoring_elements 0.68746
published_at 2026-05-07T12:55:00Z
1
value 0.00571
scoring_system epss
scoring_elements 0.68704
published_at 2026-05-05T12:55:00Z
2
value 0.00571
scoring_system epss
scoring_elements 0.68572
published_at 2026-04-01T12:55:00Z
3
value 0.00571
scoring_system epss
scoring_elements 0.6859
published_at 2026-04-02T12:55:00Z
4
value 0.00571
scoring_system epss
scoring_elements 0.68608
published_at 2026-04-04T12:55:00Z
5
value 0.00571
scoring_system epss
scoring_elements 0.68585
published_at 2026-04-07T12:55:00Z
6
value 0.00571
scoring_system epss
scoring_elements 0.68637
published_at 2026-04-08T12:55:00Z
7
value 0.00571
scoring_system epss
scoring_elements 0.68654
published_at 2026-04-09T12:55:00Z
8
value 0.00571
scoring_system epss
scoring_elements 0.68678
published_at 2026-04-11T12:55:00Z
9
value 0.00571
scoring_system epss
scoring_elements 0.68665
published_at 2026-04-21T12:55:00Z
10
value 0.00571
scoring_system epss
scoring_elements 0.68636
published_at 2026-04-13T12:55:00Z
11
value 0.00571
scoring_system epss
scoring_elements 0.68675
published_at 2026-04-16T12:55:00Z
12
value 0.00571
scoring_system epss
scoring_elements 0.68686
published_at 2026-04-18T12:55:00Z
13
value 0.00571
scoring_system epss
scoring_elements 0.68714
published_at 2026-04-24T12:55:00Z
14
value 0.00571
scoring_system epss
scoring_elements 0.68719
published_at 2026-04-26T12:55:00Z
15
value 0.00571
scoring_system epss
scoring_elements 0.68725
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-14437
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13602
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13962
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14437
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14438
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14438
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14498
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14533
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14534
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14534
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14535
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14535
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14776
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14777
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14778
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14970
16
reference_url https://seclists.org/bugtraq/2019/Aug/36
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Aug/36
17
reference_url https://www.debian.org/security/2019/dsa-4504
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4504
18
reference_url https://www.videolan.org/security/sb-vlc308.html
reference_id
reference_type
scores
url https://www.videolan.org/security/sb-vlc308.html
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:3.0.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:3.0.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:3.0.7.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-14437
reference_id CVE-2019-14437
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-14437
23
reference_url https://security.gentoo.org/glsa/201909-02
reference_id GLSA-201909-02
reference_type
scores
url https://security.gentoo.org/glsa/201909-02
24
reference_url https://usn.ubuntu.com/4131-1/
reference_id USN-4131-1
reference_type
scores
url https://usn.ubuntu.com/4131-1/
fixed_packages
0
url pkg:deb/debian/vlc@3.0.8-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.8-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2019-14437
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yndu-f7m6-23gk
133
url VCID-ys55-8nfw-cbc3
vulnerability_id VCID-ys55-8nfw-cbc3
summary
Multiple vulnerabilities in xine-lib might result in the remote execution
    of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5233
reference_id
reference_type
scores
0
value 0.01413
scoring_system epss
scoring_elements 0.80653
published_at 2026-05-07T12:55:00Z
1
value 0.01413
scoring_system epss
scoring_elements 0.80479
published_at 2026-04-01T12:55:00Z
2
value 0.01413
scoring_system epss
scoring_elements 0.80485
published_at 2026-04-02T12:55:00Z
3
value 0.01413
scoring_system epss
scoring_elements 0.80506
published_at 2026-04-04T12:55:00Z
4
value 0.01413
scoring_system epss
scoring_elements 0.80496
published_at 2026-04-07T12:55:00Z
5
value 0.01413
scoring_system epss
scoring_elements 0.80526
published_at 2026-04-08T12:55:00Z
6
value 0.01413
scoring_system epss
scoring_elements 0.80536
published_at 2026-04-09T12:55:00Z
7
value 0.01413
scoring_system epss
scoring_elements 0.80554
published_at 2026-04-11T12:55:00Z
8
value 0.01413
scoring_system epss
scoring_elements 0.8054
published_at 2026-04-12T12:55:00Z
9
value 0.01413
scoring_system epss
scoring_elements 0.80533
published_at 2026-04-13T12:55:00Z
10
value 0.01413
scoring_system epss
scoring_elements 0.80562
published_at 2026-04-16T12:55:00Z
11
value 0.01413
scoring_system epss
scoring_elements 0.80564
published_at 2026-04-18T12:55:00Z
12
value 0.01413
scoring_system epss
scoring_elements 0.80567
published_at 2026-04-21T12:55:00Z
13
value 0.01413
scoring_system epss
scoring_elements 0.80593
published_at 2026-04-24T12:55:00Z
14
value 0.01413
scoring_system epss
scoring_elements 0.80596
published_at 2026-04-26T12:55:00Z
15
value 0.01413
scoring_system epss
scoring_elements 0.80613
published_at 2026-04-29T12:55:00Z
16
value 0.01413
scoring_system epss
scoring_elements 0.80631
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5233
2
reference_url http://secunia.com/advisories/31827
reference_id
reference_type
scores
url http://secunia.com/advisories/31827
3
reference_url http://securityreason.com/securityalert/4648
reference_id
reference_type
scores
url http://securityreason.com/securityalert/4648
4
reference_url http://securitytracker.com/id?1020703
reference_id
reference_type
scores
url http://securitytracker.com/id?1020703
5
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/44639
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/44639
6
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/44648
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/44648
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/44649
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/44649
8
reference_url http://sourceforge.net/project/shownotes.php?release_id=619869
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?release_id=619869
9
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00174.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00174.html
10
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00385.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00385.html
11
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:020
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:020
12
reference_url http://www.ocert.org/analysis/2008-008/analysis.txt
reference_id
reference_type
scores
url http://www.ocert.org/analysis/2008-008/analysis.txt
13
reference_url http://www.osvdb.org/47747
reference_id
reference_type
scores
url http://www.osvdb.org/47747
14
reference_url http://www.securityfocus.com/archive/1/495674/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/495674/100/0/threaded
15
reference_url http://www.securityfocus.com/bid/30797
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/30797
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5233
reference_id CVE-2008-5233
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-5233
65
reference_url https://security.gentoo.org/glsa/201006-04
reference_id GLSA-201006-04
reference_type
scores
url https://security.gentoo.org/glsa/201006-04
66
reference_url https://usn.ubuntu.com/710-1/
reference_id USN-710-1
reference_type
scores
url https://usn.ubuntu.com/710-1/
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2008-5233
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ys55-8nfw-cbc3
134
url VCID-ytdh-7xzy-wbbh
vulnerability_id VCID-ytdh-7xzy-wbbh
summary
Multiple vulnerabilities were found in VLC, allowing for the execution of
    arbitrary code and Denial of Service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0296
reference_id
reference_type
scores
0
value 0.11636
scoring_system epss
scoring_elements 0.93619
published_at 2026-04-01T12:55:00Z
1
value 0.11636
scoring_system epss
scoring_elements 0.93629
published_at 2026-04-02T12:55:00Z
2
value 0.11636
scoring_system epss
scoring_elements 0.93638
published_at 2026-04-04T12:55:00Z
3
value 0.11636
scoring_system epss
scoring_elements 0.9364
published_at 2026-04-07T12:55:00Z
4
value 0.11636
scoring_system epss
scoring_elements 0.93649
published_at 2026-04-08T12:55:00Z
5
value 0.11636
scoring_system epss
scoring_elements 0.93651
published_at 2026-04-09T12:55:00Z
6
value 0.11636
scoring_system epss
scoring_elements 0.93656
published_at 2026-04-12T12:55:00Z
7
value 0.11636
scoring_system epss
scoring_elements 0.93657
published_at 2026-04-13T12:55:00Z
8
value 0.11636
scoring_system epss
scoring_elements 0.93675
published_at 2026-04-16T12:55:00Z
9
value 0.11636
scoring_system epss
scoring_elements 0.93682
published_at 2026-04-18T12:55:00Z
10
value 0.11636
scoring_system epss
scoring_elements 0.93684
published_at 2026-04-21T12:55:00Z
11
value 0.11636
scoring_system epss
scoring_elements 0.93689
published_at 2026-04-24T12:55:00Z
12
value 0.11636
scoring_system epss
scoring_elements 0.93688
published_at 2026-04-26T12:55:00Z
13
value 0.11636
scoring_system epss
scoring_elements 0.93686
published_at 2026-04-29T12:55:00Z
14
value 0.11636
scoring_system epss
scoring_elements 0.93694
published_at 2026-05-05T12:55:00Z
15
value 0.11636
scoring_system epss
scoring_elements 0.93705
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0296
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0296
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=461544
reference_id 461544
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=461544
3
reference_url https://security.gentoo.org/glsa/200803-13
reference_id GLSA-200803-13
reference_type
scores
url https://security.gentoo.org/glsa/200803-13
fixed_packages
0
url pkg:deb/debian/vlc@0.8.6.c-6?distro=trixie
purl pkg:deb/debian/vlc@0.8.6.c-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0.8.6.c-6%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2008-0296
risk_score 0.2
exploitability 2.0
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ytdh-7xzy-wbbh
135
url VCID-yzgd-n56h-gyfb
vulnerability_id VCID-yzgd-n56h-gyfb
summary
Multiple vulnerabilities in xine-lib might result in the remote execution
    of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5235.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5235.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5235
reference_id
reference_type
scores
0
value 0.03478
scoring_system epss
scoring_elements 0.87625
published_at 2026-05-07T12:55:00Z
1
value 0.03478
scoring_system epss
scoring_elements 0.87508
published_at 2026-04-01T12:55:00Z
2
value 0.03478
scoring_system epss
scoring_elements 0.87518
published_at 2026-04-02T12:55:00Z
3
value 0.03478
scoring_system epss
scoring_elements 0.87532
published_at 2026-04-04T12:55:00Z
4
value 0.03478
scoring_system epss
scoring_elements 0.87535
published_at 2026-04-07T12:55:00Z
5
value 0.03478
scoring_system epss
scoring_elements 0.87554
published_at 2026-04-08T12:55:00Z
6
value 0.03478
scoring_system epss
scoring_elements 0.8756
published_at 2026-04-09T12:55:00Z
7
value 0.03478
scoring_system epss
scoring_elements 0.87572
published_at 2026-04-11T12:55:00Z
8
value 0.03478
scoring_system epss
scoring_elements 0.87568
published_at 2026-04-12T12:55:00Z
9
value 0.03478
scoring_system epss
scoring_elements 0.87564
published_at 2026-04-13T12:55:00Z
10
value 0.03478
scoring_system epss
scoring_elements 0.87578
published_at 2026-04-16T12:55:00Z
11
value 0.03478
scoring_system epss
scoring_elements 0.87579
published_at 2026-04-18T12:55:00Z
12
value 0.03478
scoring_system epss
scoring_elements 0.87577
published_at 2026-04-21T12:55:00Z
13
value 0.03478
scoring_system epss
scoring_elements 0.87595
published_at 2026-04-24T12:55:00Z
14
value 0.03478
scoring_system epss
scoring_elements 0.87602
published_at 2026-04-26T12:55:00Z
15
value 0.03478
scoring_system epss
scoring_elements 0.876
published_at 2026-04-29T12:55:00Z
16
value 0.03478
scoring_system epss
scoring_elements 0.87613
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5235
3
reference_url http://secunia.com/advisories/31502
reference_id
reference_type
scores
url http://secunia.com/advisories/31502
4
reference_url http://securitytracker.com/id?1020703
reference_id
reference_type
scores
url http://securitytracker.com/id?1020703
5
reference_url http://sourceforge.net/project/shownotes.php?release_id=619869
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?release_id=619869
6
reference_url http://www.securityfocus.com/bid/30698
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/30698
7
reference_url http://www.vupen.com/english/advisories/2008/2382
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2382
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=473234
reference_id 473234
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=473234
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:0.9.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:0.9.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:0.9.13:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.0.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.0.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.0.3a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1.0.3a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.0.3a:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1.1.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.10.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.11:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1.1.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.11.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.3:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta1:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta10:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:beta10:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta10:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta11:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:beta11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta11:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta12:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:beta12:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta12:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta2:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta3:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta4:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta5:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:beta5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta5:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta6:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:beta6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta6:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta7:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:beta7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta7:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta8:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:beta8:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta8:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta9:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:beta9:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta9:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc0a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:rc0a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc0a:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc1:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc2:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc3:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc3a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:rc3a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc3a:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc3b:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:rc3b:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc3b:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc3c:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:rc3c:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc3c:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc4:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc4a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:rc4a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc4a:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc5:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc5:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc6a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:rc6a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc6a:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc7:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:rc7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc7:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc8:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:rc8:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc8:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5235
reference_id CVE-2008-5235
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-5235
48
reference_url https://security.gentoo.org/glsa/201006-04
reference_id GLSA-201006-04
reference_type
scores
url https://security.gentoo.org/glsa/201006-04
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2008-5235
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yzgd-n56h-gyfb
136
url VCID-z8s5-5uwe-auf4
vulnerability_id VCID-z8s5-5uwe-auf4
summary
A buffer overflow in VLC might allow remote attacker(s) to execute
    arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-26664
reference_id
reference_type
scores
0
value 0.00296
scoring_system epss
scoring_elements 0.52906
published_at 2026-05-07T12:55:00Z
1
value 0.00296
scoring_system epss
scoring_elements 0.52858
published_at 2026-04-01T12:55:00Z
2
value 0.00296
scoring_system epss
scoring_elements 0.52884
published_at 2026-04-02T12:55:00Z
3
value 0.00296
scoring_system epss
scoring_elements 0.5291
published_at 2026-04-04T12:55:00Z
4
value 0.00296
scoring_system epss
scoring_elements 0.52878
published_at 2026-04-07T12:55:00Z
5
value 0.00296
scoring_system epss
scoring_elements 0.52929
published_at 2026-04-08T12:55:00Z
6
value 0.00296
scoring_system epss
scoring_elements 0.52922
published_at 2026-04-09T12:55:00Z
7
value 0.00296
scoring_system epss
scoring_elements 0.52972
published_at 2026-04-11T12:55:00Z
8
value 0.00296
scoring_system epss
scoring_elements 0.52957
published_at 2026-04-12T12:55:00Z
9
value 0.00296
scoring_system epss
scoring_elements 0.5294
published_at 2026-04-13T12:55:00Z
10
value 0.00296
scoring_system epss
scoring_elements 0.52978
published_at 2026-04-16T12:55:00Z
11
value 0.00296
scoring_system epss
scoring_elements 0.52984
published_at 2026-04-18T12:55:00Z
12
value 0.00296
scoring_system epss
scoring_elements 0.52968
published_at 2026-04-21T12:55:00Z
13
value 0.00296
scoring_system epss
scoring_elements 0.52935
published_at 2026-04-24T12:55:00Z
14
value 0.00296
scoring_system epss
scoring_elements 0.52944
published_at 2026-04-26T12:55:00Z
15
value 0.00296
scoring_system epss
scoring_elements 0.52904
published_at 2026-04-29T12:55:00Z
16
value 0.00296
scoring_system epss
scoring_elements 0.52855
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-26664
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26664
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25801
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25802
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25803
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25804
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=979676
reference_id 979676
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=979676
7
reference_url https://security.archlinux.org/ASA-202101-35
reference_id ASA-202101-35
reference_type
scores
url https://security.archlinux.org/ASA-202101-35
8
reference_url https://security.archlinux.org/AVG-1423
reference_id AVG-1423
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1423
9
reference_url https://security.gentoo.org/glsa/202101-37
reference_id GLSA-202101-37
reference_type
scores
url https://security.gentoo.org/glsa/202101-37
fixed_packages
0
url pkg:deb/debian/vlc@3.0.12-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.12-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2020-26664
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z8s5-5uwe-auf4
137
url VCID-zdpz-ctms-skgj
vulnerability_id VCID-zdpz-ctms-skgj
summary
xine-lib is vulnerable to multiple buffer overflows when processing FLAC
    and ASF streams.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-1664
reference_id
reference_type
scores
0
value 0.06458
scoring_system epss
scoring_elements 0.91023
published_at 2026-04-01T12:55:00Z
1
value 0.06458
scoring_system epss
scoring_elements 0.91028
published_at 2026-04-02T12:55:00Z
2
value 0.06458
scoring_system epss
scoring_elements 0.91037
published_at 2026-04-04T12:55:00Z
3
value 0.06458
scoring_system epss
scoring_elements 0.91045
published_at 2026-04-07T12:55:00Z
4
value 0.06458
scoring_system epss
scoring_elements 0.91058
published_at 2026-04-08T12:55:00Z
5
value 0.06458
scoring_system epss
scoring_elements 0.91064
published_at 2026-04-09T12:55:00Z
6
value 0.06458
scoring_system epss
scoring_elements 0.91073
published_at 2026-04-13T12:55:00Z
7
value 0.06458
scoring_system epss
scoring_elements 0.91097
published_at 2026-04-18T12:55:00Z
8
value 0.06458
scoring_system epss
scoring_elements 0.911
published_at 2026-04-21T12:55:00Z
9
value 0.06458
scoring_system epss
scoring_elements 0.91113
published_at 2026-04-24T12:55:00Z
10
value 0.06458
scoring_system epss
scoring_elements 0.91111
published_at 2026-04-26T12:55:00Z
11
value 0.06458
scoring_system epss
scoring_elements 0.91106
published_at 2026-04-29T12:55:00Z
12
value 0.06458
scoring_system epss
scoring_elements 0.91121
published_at 2026-05-05T12:55:00Z
13
value 0.06458
scoring_system epss
scoring_elements 0.91135
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-1664
1
reference_url https://security.gentoo.org/glsa/200604-16
reference_id GLSA-200604-16
reference_type
scores
url https://security.gentoo.org/glsa/200604-16
2
reference_url https://security.gentoo.org/glsa/200802-12
reference_id GLSA-200802-12
reference_type
scores
url https://security.gentoo.org/glsa/200802-12
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/1641.pl
reference_id OSVDB-42658;CVE-2008-1110;OSVDB-25004;CVE-2006-1664;OSVDB-24581
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/1641.pl
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2006-1664
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zdpz-ctms-skgj
138
url VCID-zep1-wtjy-gya6
vulnerability_id VCID-zep1-wtjy-gya6
summary Multiple vulnerabilities have been discovered in VLC, the worst of which could result in arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-41325
reference_id
reference_type
scores
0
value 0.00076
scoring_system epss
scoring_elements 0.23012
published_at 2026-04-04T12:55:00Z
1
value 0.00076
scoring_system epss
scoring_elements 0.22968
published_at 2026-04-02T12:55:00Z
2
value 0.00076
scoring_system epss
scoring_elements 0.22804
published_at 2026-04-07T12:55:00Z
3
value 0.00077
scoring_system epss
scoring_elements 0.2268
published_at 2026-05-07T12:55:00Z
4
value 0.00077
scoring_system epss
scoring_elements 0.22703
published_at 2026-04-26T12:55:00Z
5
value 0.00077
scoring_system epss
scoring_elements 0.22699
published_at 2026-04-29T12:55:00Z
6
value 0.00077
scoring_system epss
scoring_elements 0.22597
published_at 2026-05-05T12:55:00Z
7
value 0.00081
scoring_system epss
scoring_elements 0.23921
published_at 2026-04-18T12:55:00Z
8
value 0.00081
scoring_system epss
scoring_elements 0.23932
published_at 2026-04-16T12:55:00Z
9
value 0.00081
scoring_system epss
scoring_elements 0.23903
published_at 2026-04-21T12:55:00Z
10
value 0.00081
scoring_system epss
scoring_elements 0.23776
published_at 2026-04-24T12:55:00Z
11
value 0.00081
scoring_system epss
scoring_elements 0.2396
published_at 2026-04-08T12:55:00Z
12
value 0.00081
scoring_system epss
scoring_elements 0.24006
published_at 2026-04-09T12:55:00Z
13
value 0.00081
scoring_system epss
scoring_elements 0.24022
published_at 2026-04-11T12:55:00Z
14
value 0.00081
scoring_system epss
scoring_elements 0.23979
published_at 2026-04-12T12:55:00Z
15
value 0.00081
scoring_system epss
scoring_elements 0.23923
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-41325
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41325
2
reference_url https://twitter.com/0xMitsurugi
reference_id 0xMitsurugi
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T19:35:16Z/
url https://twitter.com/0xMitsurugi
3
reference_url https://www.debian.org/security/2022/dsa-5297
reference_id dsa-5297
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T19:35:16Z/
url https://www.debian.org/security/2022/dsa-5297
4
reference_url https://security.gentoo.org/glsa/202409-17
reference_id GLSA-202409-17
reference_type
scores
url https://security.gentoo.org/glsa/202409-17
5
reference_url https://www.videolan.org/security/sb-vlc3018.html
reference_id sb-vlc3018.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T19:35:16Z/
url https://www.videolan.org/security/sb-vlc3018.html
6
reference_url https://usn.ubuntu.com/6180-1/
reference_id USN-6180-1
reference_type
scores
url https://usn.ubuntu.com/6180-1/
7
reference_url https://www.synacktiv.com/sites/default/files/2022-11/vlc_vnc_int_overflow-CVE-2022-41325.pdf
reference_id vlc_vnc_int_overflow-CVE-2022-41325.pdf
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T19:35:16Z/
url https://www.synacktiv.com/sites/default/files/2022-11/vlc_vnc_int_overflow-CVE-2022-41325.pdf
fixed_packages
0
url pkg:deb/debian/vlc@3.0.18-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.18-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.18-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.18-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.18-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.18-1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
6
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2022-41325
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zep1-wtjy-gya6
139
url VCID-zr1q-3g6a-yqhd
vulnerability_id VCID-zr1q-3g6a-yqhd
summary
Multiple vulnerabilities have been found in VLC allowing remote
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5949
reference_id
reference_type
scores
0
value 0.07445
scoring_system epss
scoring_elements 0.91719
published_at 2026-04-01T12:55:00Z
1
value 0.07445
scoring_system epss
scoring_elements 0.91727
published_at 2026-04-02T12:55:00Z
2
value 0.07445
scoring_system epss
scoring_elements 0.91733
published_at 2026-04-04T12:55:00Z
3
value 0.07445
scoring_system epss
scoring_elements 0.9174
published_at 2026-04-07T12:55:00Z
4
value 0.07445
scoring_system epss
scoring_elements 0.91753
published_at 2026-04-08T12:55:00Z
5
value 0.07445
scoring_system epss
scoring_elements 0.91759
published_at 2026-04-09T12:55:00Z
6
value 0.07445
scoring_system epss
scoring_elements 0.91762
published_at 2026-04-11T12:55:00Z
7
value 0.07445
scoring_system epss
scoring_elements 0.91765
published_at 2026-04-12T12:55:00Z
8
value 0.07445
scoring_system epss
scoring_elements 0.91761
published_at 2026-04-13T12:55:00Z
9
value 0.07445
scoring_system epss
scoring_elements 0.9178
published_at 2026-04-16T12:55:00Z
10
value 0.07445
scoring_system epss
scoring_elements 0.91773
published_at 2026-04-18T12:55:00Z
11
value 0.07445
scoring_system epss
scoring_elements 0.91775
published_at 2026-04-21T12:55:00Z
12
value 0.07445
scoring_system epss
scoring_elements 0.91781
published_at 2026-04-24T12:55:00Z
13
value 0.07445
scoring_system epss
scoring_elements 0.91779
published_at 2026-04-26T12:55:00Z
14
value 0.07445
scoring_system epss
scoring_elements 0.91776
published_at 2026-04-29T12:55:00Z
15
value 0.07445
scoring_system epss
scoring_elements 0.91789
published_at 2026-05-05T12:55:00Z
16
value 0.07445
scoring_system epss
scoring_elements 0.918
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5949
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5949
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5949
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796255
reference_id 796255
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796255
3
reference_url https://security.gentoo.org/glsa/201603-08
reference_id GLSA-201603-08
reference_type
scores
url https://security.gentoo.org/glsa/201603-08
fixed_packages
0
url pkg:deb/debian/vlc@2.2.1-3?distro=trixie
purl pkg:deb/debian/vlc@2.2.1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@2.2.1-3%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2015-5949
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zr1q-3g6a-yqhd
140
url VCID-zry2-jfrq-yug4
vulnerability_id VCID-zry2-jfrq-yug4
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could result in the arbitrary execution of code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-13962
reference_id
reference_type
scores
0
value 0.03227
scoring_system epss
scoring_elements 0.87125
published_at 2026-05-05T12:55:00Z
1
value 0.03227
scoring_system epss
scoring_elements 0.8714
published_at 2026-05-07T12:55:00Z
2
value 0.03288
scoring_system epss
scoring_elements 0.87169
published_at 2026-04-04T12:55:00Z
3
value 0.03288
scoring_system epss
scoring_elements 0.87166
published_at 2026-04-07T12:55:00Z
4
value 0.03288
scoring_system epss
scoring_elements 0.87186
published_at 2026-04-08T12:55:00Z
5
value 0.03288
scoring_system epss
scoring_elements 0.87193
published_at 2026-04-09T12:55:00Z
6
value 0.03288
scoring_system epss
scoring_elements 0.87206
published_at 2026-04-11T12:55:00Z
7
value 0.03288
scoring_system epss
scoring_elements 0.872
published_at 2026-04-12T12:55:00Z
8
value 0.03288
scoring_system epss
scoring_elements 0.87142
published_at 2026-04-01T12:55:00Z
9
value 0.03288
scoring_system epss
scoring_elements 0.87211
published_at 2026-04-16T12:55:00Z
10
value 0.03288
scoring_system epss
scoring_elements 0.87216
published_at 2026-04-18T12:55:00Z
11
value 0.03288
scoring_system epss
scoring_elements 0.8721
published_at 2026-04-21T12:55:00Z
12
value 0.03288
scoring_system epss
scoring_elements 0.87228
published_at 2026-04-24T12:55:00Z
13
value 0.03288
scoring_system epss
scoring_elements 0.87234
published_at 2026-04-26T12:55:00Z
14
value 0.03288
scoring_system epss
scoring_elements 0.87238
published_at 2026-04-29T12:55:00Z
15
value 0.03288
scoring_system epss
scoring_elements 0.87196
published_at 2026-04-13T12:55:00Z
16
value 0.03288
scoring_system epss
scoring_elements 0.87152
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-13962
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13602
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13962
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14437
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14438
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14438
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14498
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14533
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14534
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14534
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14535
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14535
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14776
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14777
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14778
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14970
13
reference_url https://security.gentoo.org/glsa/201909-02
reference_id GLSA-201909-02
reference_type
scores
url https://security.gentoo.org/glsa/201909-02
14
reference_url https://usn.ubuntu.com/4131-1/
reference_id USN-4131-1
reference_type
scores
url https://usn.ubuntu.com/4131-1/
fixed_packages
0
url pkg:deb/debian/vlc@3.0.8-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.8-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2019-13962
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zry2-jfrq-yug4
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie