{"url":"http://public2.vulnerablecode.io/api/packages/1058820?format=json","purl":"pkg:deb/debian/php-getid3@1.7.7-1","type":"deb","namespace":"debian","name":"php-getid3","version":"1.7.7-1","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"1.9.8-3","latest_non_vulnerable_version":"1.9.22+dfsg-1","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/54925?format=json","vulnerability_id":"VCID-95zd-g97m-ekh3","summary":"getID3 is vulnerable to XML External Entity (XXE)\ngetID3() before 1.9.9, as used in ownCloud Server before 5.0.15 and 6.0.x before 6.0.2, allows remote attackers to read arbitrary files, cause a denial of service, or possibly have other impact via an XML External Entity (XXE) attack.","references":[{"reference_url":"http://getid3.sourceforge.net/source/changelog.txt","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://getid3.sourceforge.net/source/changelog.txt"},{"reference_url":"http://owncloud.org/about/security/advisories/oC-SA-2014-006","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://owncloud.org/about/security/advisories/oC-SA-2014-006"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-2053","reference_id":"","reference_type":"","scores":[{"value":"0.0197","scoring_system":"epss","scoring_elements":"0.83546","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0197","scoring_system":"epss","scoring_elements":"0.83531","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0197","scoring_system":"epss","scoring_elements":"0.83521","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0197","scoring_system":"epss","scoring_elements":"0.83497","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0197","scoring_system":"epss","scoring_elements":"0.8347","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0197","scoring_system":"epss","scoring_elements":"0.83483","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0197","scoring_system":"epss","scoring_elements":"0.8354","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03481","scoring_system":"epss","scoring_elements":"0.87621","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03481","scoring_system":"epss","scoring_elements":"0.87571","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03481","scoring_system":"epss","scoring_elements":"0.87585","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03481","scoring_system":"epss","scoring_elements":"0.87586","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03481","scoring_system":"epss","scoring_elements":"0.87584","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03481","scoring_system":"epss","scoring_elements":"0.87602","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03481","scoring_system":"epss","scoring_elements":"0.87609","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03481","scoring_system":"epss","scoring_elements":"0.87607","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-2053"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2053","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2053"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5204","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5240","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5240"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5265","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5265"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5266","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5266"},{"reference_url":"http://secunia.com/advisories/58002","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://secunia.com/advisories/58002"},{"reference_url":"https://github.com/FriendsOfPHP/security-advisories/blob/master/james-heinrich/getid3/CVE-2014-2053.yaml","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/FriendsOfPHP/security-advisories/blob/master/james-heinrich/getid3/CVE-2014-2053.yaml"},{"reference_url":"https://github.com/JamesHeinrich/getID3","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/JamesHeinrich/getID3"},{"reference_url":"https://github.com/JamesHeinrich/getID3/commit/afbdaa044a9a0a9dff2f800bd670e231b3ec99b2","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/JamesHeinrich/getID3/commit/afbdaa044a9a0a9dff2f800bd670e231b3ec99b2"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-2053","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-2053"},{"reference_url":"https://wordpress.org/news/2014/08/wordpress-3-9-2","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://wordpress.org/news/2014/08/wordpress-3-9-2"},{"reference_url":"http://www.debian.org/security/2014/dsa-3001","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.debian.org/security/2014/dsa-3001"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757312","reference_id":"757312","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757312"},{"reference_url":"https://github.com/advisories/GHSA-5v43-55m5-qr8f","reference_id":"GHSA-5v43-55m5-qr8f","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-5v43-55m5-qr8f"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1058825?format=json","purl":"pkg:deb/debian/php-getid3@1.9.8-3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/php-getid3@1.9.8-3"}],"aliases":["CVE-2014-2053","GHSA-5v43-55m5-qr8f"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-95zd-g97m-ekh3"}],"fixing_vulnerabilities":[],"risk_score":"4.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/php-getid3@1.7.7-1"}