{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34110?format=json","vulnerability_id":"VCID-1tfb-jxj1-h7gw","summary":"When compiled with GUI support MPlayer is vulnerable to a remotely\n    exploitable buffer overflow attack.","aliases":[{"alias":"CVE-2004-0659"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931177?format=json","purl":"pkg:deb/debian/mplayer@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/931174?format=json","purl":"pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4f83-6dmk-rybu"},{"vulnerability":"VCID-kyv5-fhuz-n7f1"},{"vulnerability":"VCID-z3dv-rb28-kycj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/931172?format=json","purl":"pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/931176?format=json","purl":"pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/931175?format=json","purl":"pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/73609?format=json","purl":"pkg:ebuild/media-video/mplayer@1.0_pre4-r7","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-video/mplayer@1.0_pre4-r7"}],"affected_packages":[],"references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2004-0659","reference_id":"","reference_type":"","scores":[{"value":"0.04453","scoring_system":"epss","scoring_elements":"0.89014","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04453","scoring_system":"epss","scoring_elements":"0.89022","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04453","scoring_system":"epss","scoring_elements":"0.89037","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04453","scoring_system":"epss","scoring_elements":"0.89039","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04453","scoring_system":"epss","scoring_elements":"0.89057","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04453","scoring_system":"epss","scoring_elements":"0.89062","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04453","scoring_system":"epss","scoring_elements":"0.89073","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04453","scoring_system":"epss","scoring_elements":"0.89069","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04453","scoring_system":"epss","scoring_elements":"0.89067","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04453","scoring_system":"epss","scoring_elements":"0.89081","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04453","scoring_system":"epss","scoring_elements":"0.89078","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04453","scoring_system":"epss","scoring_elements":"0.89096","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04453","scoring_system":"epss","scoring_elements":"0.89103","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04453","scoring_system":"epss","scoring_elements":"0.89106","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2004-0659"},{"reference_url":"https://security.gentoo.org/glsa/200408-01","reference_id":"GLSA-200408-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200408-01"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/308.c","reference_id":"OSVDB-7282;CVE-2004-0659","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/308.c"}],"weaknesses":[],"exploits":[{"date_added":"2004-07-03","description":"MPlayer 1.0pre4 GUI - Filename handling Overflow","required_action":null,"due_date":null,"notes":null,"known_ransomware_campaign_use":true,"source_date_published":"2004-07-04","exploit_type":"remote","platform":"linux","source_date_updated":"2016-03-28","data_source":"Exploit-DB","source_url":""}],"severity_range_score":null,"exploitability":null,"weighted_severity":null,"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1tfb-jxj1-h7gw"}