{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49041?format=json","vulnerability_id":"VCID-t595-a685-k3c7","summary":"Multiple vulnerabilities have been found in Libav, allowing\n    attackers to execute arbitrary code or cause Denial of Service.","aliases":[{"alias":"CVE-2012-0848"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582176?format=json","purl":"pkg:deb/debian/ffmpeg@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ffmpeg@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582177?format=json","purl":"pkg:deb/debian/ffmpeg@7:4.3.7-0%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2qje-t52h-fyfk"},{"vulnerability":"VCID-mun9-fyvn-8kfs"},{"vulnerability":"VCID-ujjc-ays1-gfc2"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ffmpeg@7:4.3.7-0%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582178?format=json","purl":"pkg:deb/debian/ffmpeg@7:5.1.8-0%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2qje-t52h-fyfk"},{"vulnerability":"VCID-352p-mxyy-k3bu"},{"vulnerability":"VCID-e9kf-tzg8-9bht"},{"vulnerability":"VCID-grh1-jxmf-dqdv"},{"vulnerability":"VCID-mun9-fyvn-8kfs"},{"vulnerability":"VCID-ns98-tu4j-sfd5"},{"vulnerability":"VCID-uakc-kpg5-2ug5"},{"vulnerability":"VCID-wrb6-w8ps-uuge"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ffmpeg@7:5.1.8-0%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582179?format=json","purl":"pkg:deb/debian/ffmpeg@7:7.1.3-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2qje-t52h-fyfk"},{"vulnerability":"VCID-352p-mxyy-k3bu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ffmpeg@7:7.1.3-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582180?format=json","purl":"pkg:deb/debian/ffmpeg@7:8.1-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ffmpeg@7:8.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1108316?format=json","purl":"pkg:deb/debian/ffmpeg@7:8.1.1-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ffmpeg@7:8.1.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/77723?format=json","purl":"pkg:ebuild/media-video/libav@0.8.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-video/libav@0.8.3"}],"affected_packages":[],"references":[{"reference_url":"http://ffmpeg.org/security.html","reference_id":"","reference_type":"","scores":[],"url":"http://ffmpeg.org/security.html"},{"reference_url":"http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=5257743aee0c3982f0079e6553aabc6aa39401d2","reference_id":"","reference_type":"","scores":[],"url":"http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=5257743aee0c3982f0079e6553aabc6aa39401d2"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0848","reference_id":"","reference_type":"","scores":[{"value":"0.00905","scoring_system":"epss","scoring_elements":"0.75934","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00905","scoring_system":"epss","scoring_elements":"0.75683","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00905","scoring_system":"epss","scoring_elements":"0.75685","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00905","scoring_system":"epss","scoring_elements":"0.75716","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00905","scoring_system":"epss","scoring_elements":"0.75695","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00905","scoring_system":"epss","scoring_elements":"0.75729","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00905","scoring_system":"epss","scoring_elements":"0.7574","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00905","scoring_system":"epss","scoring_elements":"0.75763","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00905","scoring_system":"epss","scoring_elements":"0.75745","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00905","scoring_system":"epss","scoring_elements":"0.75739","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00905","scoring_system":"epss","scoring_elements":"0.75776","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00905","scoring_system":"epss","scoring_elements":"0.75779","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00905","scoring_system":"epss","scoring_elements":"0.75765","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00905","scoring_system":"epss","scoring_elements":"0.75804","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00905","scoring_system":"epss","scoring_elements":"0.7581","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00905","scoring_system":"epss","scoring_elements":"0.75821","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00905","scoring_system":"epss","scoring_elements":"0.75829","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00905","scoring_system":"epss","scoring_elements":"0.75859","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00905","scoring_system":"epss","scoring_elements":"0.75883","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00905","scoring_system":"epss","scoring_elements":"0.75868","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00905","scoring_system":"epss","scoring_elements":"0.75882","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0848"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/78936","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/78936"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/02/01/11","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/02/01/11"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/02/14/4","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/02/14/4"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ffmpeg:ffmpeg:0.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:0.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-0848","reference_id":"CVE-2012-0848","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-0848"},{"reference_url":"https://security.gentoo.org/glsa/201210-06","reference_id":"GLSA-201210-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201210-06"},{"reference_url":"https://usn.ubuntu.com/1478-1/","reference_id":"USN-1478-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1478-1/"}],"weaknesses":[{"cwe_id":119,"name":"Improper Restriction of Operations within the Bounds of a Memory Buffer","description":"The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer."}],"exploits":[],"severity_range_score":"4.3 - 4.3","exploitability":null,"weighted_severity":null,"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t595-a685-k3c7"}