Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/vlc@1.0.3-1?distro=trixie
Typedeb
Namespacedebian
Namevlc
Version1.0.3-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.0.6-1
Latest_non_vulnerable_version3.0.23-3
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-2m5x-h1bj-xqbt
vulnerability_id VCID-2m5x-h1bj-xqbt
summary Stack-based buffer overflow in the parse_master function in the Ty demux plugin (modules/demux/ty.c) in VLC Media Player 0.9.0 through 0.9.4 allows remote attackers to execute arbitrary code via a TiVo TY media file with a header containing a crafted size value.
references
0
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=502726
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=502726
1
reference_url http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=fde9e1cc1fe1ec9635169fa071e42b3aa6436033
reference_id
reference_type
scores
url http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=fde9e1cc1fe1ec9635169fa071e42b3aa6436033
2
reference_url http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=26d92b87bba99b5ea2e17b7eaa39c462d65e9133
reference_id
reference_type
scores
url http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=26d92b87bba99b5ea2e17b7eaa39c462d65e9133
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4654
reference_id
reference_type
scores
0
value 0.82125
scoring_system epss
scoring_elements 0.99227
published_at 2026-05-14T12:55:00Z
1
value 0.82125
scoring_system epss
scoring_elements 0.99203
published_at 2026-04-01T12:55:00Z
2
value 0.82125
scoring_system epss
scoring_elements 0.99205
published_at 2026-04-02T12:55:00Z
3
value 0.82125
scoring_system epss
scoring_elements 0.99209
published_at 2026-04-04T12:55:00Z
4
value 0.82125
scoring_system epss
scoring_elements 0.99212
published_at 2026-04-07T12:55:00Z
5
value 0.82125
scoring_system epss
scoring_elements 0.99213
published_at 2026-04-16T12:55:00Z
6
value 0.82125
scoring_system epss
scoring_elements 0.99214
published_at 2026-04-12T12:55:00Z
7
value 0.82125
scoring_system epss
scoring_elements 0.99215
published_at 2026-04-21T12:55:00Z
8
value 0.82125
scoring_system epss
scoring_elements 0.99217
published_at 2026-04-24T12:55:00Z
9
value 0.82125
scoring_system epss
scoring_elements 0.99218
published_at 2026-04-26T12:55:00Z
10
value 0.82125
scoring_system epss
scoring_elements 0.99219
published_at 2026-04-29T12:55:00Z
11
value 0.82125
scoring_system epss
scoring_elements 0.99221
published_at 2026-05-05T12:55:00Z
12
value 0.82125
scoring_system epss
scoring_elements 0.99222
published_at 2026-05-07T12:55:00Z
13
value 0.82125
scoring_system epss
scoring_elements 0.99224
published_at 2026-05-11T12:55:00Z
14
value 0.82125
scoring_system epss
scoring_elements 0.99226
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4654
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4654
5
reference_url http://secunia.com/advisories/32339
reference_id
reference_type
scores
url http://secunia.com/advisories/32339
6
reference_url http://securityreason.com/securityalert/4460
reference_id
reference_type
scores
url http://securityreason.com/securityalert/4460
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/45960
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/45960
8
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14803
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14803
9
reference_url http://www.openwall.com/lists/oss-security/2008/10/19/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/10/19/2
10
reference_url http://www.securityfocus.com/archive/1/497587/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/497587/100/0/threaded
11
reference_url http://www.securityfocus.com/bid/31813
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/31813
12
reference_url http://www.trapkit.de/advisories/TKADV2008-010.txt
reference_id
reference_type
scores
url http://www.trapkit.de/advisories/TKADV2008-010.txt
13
reference_url http://www.videolan.org/security/sa0809.html
reference_id
reference_type
scores
url http://www.videolan.org/security/sa0809.html
14
reference_url http://www.vupen.com/english/advisories/2008/2856
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2856
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=502726
reference_id 502726
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=502726
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4654
reference_id CVE-2008-4654
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-4654
22
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/16629.rb
reference_id CVE-2008-4654;OSVDB-49181
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/16629.rb
23
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/6798.pl
reference_id OSVDB-49453;CVE-2008-4686;OSVDB-49181;CVE-2008-4654
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/6798.pl
24
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/6825.pl
reference_id OSVDB-49453;CVE-2008-4686;OSVDB-49181;CVE-2008-4654
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/6825.pl
fixed_packages
0
url pkg:deb/debian/vlc@1.0.3-1?distro=trixie
purl pkg:deb/debian/vlc@1.0.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@1.0.3-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2008-4654
risk_score 10.0
exploitability 2.0
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2m5x-h1bj-xqbt
1
url VCID-ua8e-h3jn-vqc9
vulnerability_id VCID-ua8e-h3jn-vqc9
summary
Multiple vulnerabilities in VLC may lead to the remote execution of
    arbitrary code.
references
0
reference_url http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=e3cef651125701a2e33a8d75b815b3e39681a447
reference_id
reference_type
scores
url http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=e3cef651125701a2e33a8d75b815b3e39681a447
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5036
reference_id
reference_type
scores
0
value 0.66452
scoring_system epss
scoring_elements 0.9852
published_at 2026-04-01T12:55:00Z
1
value 0.66452
scoring_system epss
scoring_elements 0.98538
published_at 2026-04-21T12:55:00Z
2
value 0.66452
scoring_system epss
scoring_elements 0.98542
published_at 2026-04-29T12:55:00Z
3
value 0.66452
scoring_system epss
scoring_elements 0.98547
published_at 2026-05-05T12:55:00Z
4
value 0.66452
scoring_system epss
scoring_elements 0.98546
published_at 2026-05-07T12:55:00Z
5
value 0.66452
scoring_system epss
scoring_elements 0.98522
published_at 2026-04-02T12:55:00Z
6
value 0.66452
scoring_system epss
scoring_elements 0.98525
published_at 2026-04-04T12:55:00Z
7
value 0.66452
scoring_system epss
scoring_elements 0.98526
published_at 2026-04-07T12:55:00Z
8
value 0.66452
scoring_system epss
scoring_elements 0.98529
published_at 2026-04-08T12:55:00Z
9
value 0.66452
scoring_system epss
scoring_elements 0.9853
published_at 2026-04-09T12:55:00Z
10
value 0.66452
scoring_system epss
scoring_elements 0.98532
published_at 2026-04-13T12:55:00Z
11
value 0.66452
scoring_system epss
scoring_elements 0.98531
published_at 2026-04-12T12:55:00Z
12
value 0.66452
scoring_system epss
scoring_elements 0.98537
published_at 2026-04-16T12:55:00Z
13
value 0.68724
scoring_system epss
scoring_elements 0.98637
published_at 2026-05-11T12:55:00Z
14
value 0.68724
scoring_system epss
scoring_elements 0.9864
published_at 2026-05-12T12:55:00Z
15
value 0.68724
scoring_system epss
scoring_elements 0.98643
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5036
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5036
3
reference_url http://secunia.com/advisories/32569
reference_id
reference_type
scores
url http://secunia.com/advisories/32569
4
reference_url http://secunia.com/advisories/33315
reference_id
reference_type
scores
url http://secunia.com/advisories/33315
5
reference_url http://security.gentoo.org/glsa/glsa-200812-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200812-24.xml
6
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/46376
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/46376
7
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14329
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14329
8
reference_url https://www.exploit-db.com/exploits/7051
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/7051
9
reference_url http://www.openwall.com/lists/oss-security/2008/11/05/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/11/05/4
10
reference_url http://www.openwall.com/lists/oss-security/2008/11/05/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/11/05/5
11
reference_url http://www.openwall.com/lists/oss-security/2008/11/10/13
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/11/10/13
12
reference_url http://www.securityfocus.com/archive/1/498111/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/498111/100/0/threaded
13
reference_url http://www.securityfocus.com/bid/32125
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32125
14
reference_url http://www.videolan.org/security/sa0810.html
reference_id
reference_type
scores
url http://www.videolan.org/security/sa0810.html
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
22
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/7051.pl
reference_id CVE-2008-5036
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/7051.pl
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5036
reference_id CVE-2008-5036
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-5036
24
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/18548.rb
reference_id CVE-2008-5036;OSVDB-49809
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/18548.rb
25
reference_url http://www.trapkit.de/advisories/TKADV2008-011.txt
reference_id CVE-2008-5036;OSVDB-49809
reference_type exploit
scores
url http://www.trapkit.de/advisories/TKADV2008-011.txt
26
reference_url https://security.gentoo.org/glsa/200812-24
reference_id GLSA-200812-24
reference_type
scores
url https://security.gentoo.org/glsa/200812-24
fixed_packages
0
url pkg:deb/debian/vlc@1.0.3-1?distro=trixie
purl pkg:deb/debian/vlc@1.0.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@1.0.3-1%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2008-5036
risk_score 10.0
exploitability 2.0
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ua8e-h3jn-vqc9
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@1.0.3-1%3Fdistro=trixie