Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-sar3-93je-n7e9
Summary
A buffer overflow was found in MPlayer's RTSP plugin that could lead to a
    Denial of Service or arbitrary code execution.
Aliases
0
alias CVE-2006-6172
Fixed_packages
0
url pkg:deb/debian/mplayer@1.0~rc1-11?distro=trixie
purl pkg:deb/debian/mplayer@1.0~rc1-11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@1.0~rc1-11%3Fdistro=trixie
1
url pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.4%2Bds1-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f83-6dmk-rybu
1
vulnerability VCID-kyv5-fhuz-n7f1
2
vulnerability VCID-z3dv-rb28-kycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.4%252Bds1-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38408-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38408-1%3Fdistro=trixie
3
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38674-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38674-2%3Fdistro=trixie
4
url pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
purl pkg:deb/debian/mplayer@2:1.5%2Bsvn38681-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mplayer@2:1.5%252Bsvn38681-1%3Fdistro=trixie
5
url pkg:ebuild/media-libs/xine-lib@1.1.2-r3
purl pkg:ebuild/media-libs/xine-lib@1.1.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/xine-lib@1.1.2-r3
6
url pkg:ebuild/media-video/mplayer@1.0_rc1-r2
purl pkg:ebuild/media-video/mplayer@1.0_rc1-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/media-video/mplayer@1.0_rc1-r2
Affected_packages
References
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-6172
reference_id
reference_type
scores
0
value 0.04458
scoring_system epss
scoring_elements 0.8912
published_at 2026-05-05T12:55:00Z
1
value 0.04458
scoring_system epss
scoring_elements 0.89021
published_at 2026-04-01T12:55:00Z
2
value 0.04458
scoring_system epss
scoring_elements 0.89029
published_at 2026-04-02T12:55:00Z
3
value 0.04458
scoring_system epss
scoring_elements 0.89044
published_at 2026-04-04T12:55:00Z
4
value 0.04458
scoring_system epss
scoring_elements 0.89046
published_at 2026-04-07T12:55:00Z
5
value 0.04458
scoring_system epss
scoring_elements 0.89064
published_at 2026-04-08T12:55:00Z
6
value 0.04458
scoring_system epss
scoring_elements 0.89068
published_at 2026-04-09T12:55:00Z
7
value 0.04458
scoring_system epss
scoring_elements 0.8908
published_at 2026-04-11T12:55:00Z
8
value 0.04458
scoring_system epss
scoring_elements 0.89076
published_at 2026-04-12T12:55:00Z
9
value 0.04458
scoring_system epss
scoring_elements 0.89074
published_at 2026-04-13T12:55:00Z
10
value 0.04458
scoring_system epss
scoring_elements 0.89088
published_at 2026-04-18T12:55:00Z
11
value 0.04458
scoring_system epss
scoring_elements 0.89084
published_at 2026-04-21T12:55:00Z
12
value 0.04458
scoring_system epss
scoring_elements 0.89102
published_at 2026-04-24T12:55:00Z
13
value 0.04458
scoring_system epss
scoring_elements 0.89109
published_at 2026-04-26T12:55:00Z
14
value 0.04458
scoring_system epss
scoring_elements 0.89113
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-6172
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6172
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6172
2
reference_url http://secunia.com/advisories/23218
reference_id
reference_type
scores
url http://secunia.com/advisories/23218
3
reference_url http://secunia.com/advisories/23242
reference_id
reference_type
scores
url http://secunia.com/advisories/23242
4
reference_url http://secunia.com/advisories/23249
reference_id
reference_type
scores
url http://secunia.com/advisories/23249
5
reference_url http://secunia.com/advisories/23301
reference_id
reference_type
scores
url http://secunia.com/advisories/23301
6
reference_url http://secunia.com/advisories/23335
reference_id
reference_type
scores
url http://secunia.com/advisories/23335
7
reference_url http://secunia.com/advisories/23512
reference_id
reference_type
scores
url http://secunia.com/advisories/23512
8
reference_url http://secunia.com/advisories/23567
reference_id
reference_type
scores
url http://secunia.com/advisories/23567
9
reference_url http://secunia.com/advisories/24336
reference_id
reference_type
scores
url http://secunia.com/advisories/24336
10
reference_url http://secunia.com/advisories/24339
reference_id
reference_type
scores
url http://secunia.com/advisories/24339
11
reference_url http://secunia.com/advisories/25555
reference_id
reference_type
scores
url http://secunia.com/advisories/25555
12
reference_url http://security.gentoo.org/glsa/glsa-200612-02.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200612-02.xml
13
reference_url http://security.gentoo.org/glsa/glsa-200702-11.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200702-11.xml
14
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.433842
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.433842
15
reference_url http://sourceforge.net/project/shownotes.php?release_id=468432
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?release_id=468432
16
reference_url https://sourceforge.net/tracker/index.php?func=detail&aid=1603458&group_id=9655&atid=109655
reference_id
reference_type
scores
url https://sourceforge.net/tracker/index.php?func=detail&aid=1603458&group_id=9655&atid=109655
17
reference_url http://www.debian.org/security/2006/dsa-1244
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-1244
18
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:224
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:224
19
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:112
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:112
20
reference_url http://www.mplayerhq.hu/design7/news.html#vuln14
reference_id
reference_type
scores
url http://www.mplayerhq.hu/design7/news.html#vuln14
21
reference_url http://www.mplayerhq.hu/MPlayer/patches/asmrules_fix_20061231.diff
reference_id
reference_type
scores
url http://www.mplayerhq.hu/MPlayer/patches/asmrules_fix_20061231.diff
22
reference_url http://www.novell.com/linux/security/advisories/2006_28_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2006_28_sr.html
23
reference_url http://www.securityfocus.com/bid/21435
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/21435
24
reference_url http://www.ubuntu.com/usn/usn-392-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-392-1
25
reference_url http://www.vupen.com/english/advisories/2006/4824
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/4824
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:real_media_input_plugin:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:real_media_input_plugin:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:real_media_input_plugin:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2006-6172
reference_id CVE-2006-6172
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2006-6172
29
reference_url https://security.gentoo.org/glsa/200612-02
reference_id GLSA-200612-02
reference_type
scores
url https://security.gentoo.org/glsa/200612-02
30
reference_url https://security.gentoo.org/glsa/200702-11
reference_id GLSA-200702-11
reference_type
scores
url https://security.gentoo.org/glsa/200702-11
31
reference_url https://usn.ubuntu.com/392-1/
reference_id USN-392-1
reference_type
scores
url https://usn.ubuntu.com/392-1/
Weaknesses
Exploits
Severity_range_score7.5 - 7.5
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-sar3-93je-n7e9