{"url":"http://public2.vulnerablecode.io/api/packages/584525?format=json","purl":"pkg:deb/debian/file@1:5.21%2B15-1?distro=trixie","type":"deb","namespace":"debian","name":"file","version":"1:5.21+15-1","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"1:5.22+15-1","latest_non_vulnerable_version":"1:5.46-5","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56941?format=json","vulnerability_id":"VCID-8hc8-whcd-x7ed","summary":"Vulnerabilities in file could allow a context-dependent attack to\n    create a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9620.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9620.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9620","reference_id":"","reference_type":"","scores":[{"value":"0.06505","scoring_system":"epss","scoring_elements":"0.91055","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06505","scoring_system":"epss","scoring_elements":"0.9106","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06505","scoring_system":"epss","scoring_elements":"0.9107","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06505","scoring_system":"epss","scoring_elements":"0.91078","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06505","scoring_system":"epss","scoring_elements":"0.91091","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06505","scoring_system":"epss","scoring_elements":"0.91097","published_at":"2026-04-09T12:55:00Z"},{"value":"0.072","scoring_system":"epss","scoring_elements":"0.91632","published_at":"2026-05-05T12:55:00Z"},{"value":"0.072","scoring_system":"epss","scoring_elements":"0.91615","published_at":"2026-04-21T12:55:00Z"},{"value":"0.072","scoring_system":"epss","scoring_elements":"0.91623","published_at":"2026-04-24T12:55:00Z"},{"value":"0.072","scoring_system":"epss","scoring_elements":"0.91622","published_at":"2026-04-26T12:55:00Z"},{"value":"0.072","scoring_system":"epss","scoring_elements":"0.91619","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0829","scoring_system":"epss","scoring_elements":"0.92253","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0829","scoring_system":"epss","scoring_elements":"0.92254","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0829","scoring_system":"epss","scoring_elements":"0.92251","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0829","scoring_system":"epss","scoring_elements":"0.92263","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0829","scoring_system":"epss","scoring_elements":"0.92262","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8116","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8116"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8117","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8117"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9652"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1180639","reference_id":"1180639","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1180639"},{"reference_url":"https://security.gentoo.org/glsa/201503-08","reference_id":"GLSA-201503-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0760","reference_id":"RHSA-2016:0760","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0760"},{"reference_url":"https://usn.ubuntu.com/3686-1/","reference_id":"USN-3686-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3686-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584525?format=json","purl":"pkg:deb/debian/file@1:5.21%2B15-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/file@1:5.21%252B15-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582961?format=json","purl":"pkg:deb/debian/file@1:5.39-3%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/file@1:5.39-3%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582962?format=json","purl":"pkg:deb/debian/file@1:5.44-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/file@1:5.44-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582963?format=json","purl":"pkg:deb/debian/file@1:5.46-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/file@1:5.46-5%3Fdistro=trixie"}],"aliases":["CVE-2014-9620"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8hc8-whcd-x7ed"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58061?format=json","vulnerability_id":"VCID-br5w-skmp-6bbv","summary":"security update","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2015-0040.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2015-0040.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0760.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0760.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8116.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8116.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8116","reference_id":"","reference_type":"","scores":[{"value":"0.15876","scoring_system":"epss","scoring_elements":"0.94775","published_at":"2026-05-05T12:55:00Z"},{"value":"0.15876","scoring_system":"epss","scoring_elements":"0.94715","published_at":"2026-04-01T12:55:00Z"},{"value":"0.15876","scoring_system":"epss","scoring_elements":"0.94723","published_at":"2026-04-02T12:55:00Z"},{"value":"0.15876","scoring_system":"epss","scoring_elements":"0.94727","published_at":"2026-04-04T12:55:00Z"},{"value":"0.15876","scoring_system":"epss","scoring_elements":"0.94728","published_at":"2026-04-07T12:55:00Z"},{"value":"0.15876","scoring_system":"epss","scoring_elements":"0.94738","published_at":"2026-04-08T12:55:00Z"},{"value":"0.15876","scoring_system":"epss","scoring_elements":"0.94742","published_at":"2026-04-09T12:55:00Z"},{"value":"0.15876","scoring_system":"epss","scoring_elements":"0.94746","published_at":"2026-04-11T12:55:00Z"},{"value":"0.15876","scoring_system":"epss","scoring_elements":"0.9475","published_at":"2026-04-12T12:55:00Z"},{"value":"0.15876","scoring_system":"epss","scoring_elements":"0.94751","published_at":"2026-04-13T12:55:00Z"},{"value":"0.15876","scoring_system":"epss","scoring_elements":"0.94759","published_at":"2026-04-16T12:55:00Z"},{"value":"0.15876","scoring_system":"epss","scoring_elements":"0.94762","published_at":"2026-04-18T12:55:00Z"},{"value":"0.15876","scoring_system":"epss","scoring_elements":"0.94765","published_at":"2026-04-21T12:55:00Z"},{"value":"0.15876","scoring_system":"epss","scoring_elements":"0.94766","published_at":"2026-04-26T12:55:00Z"},{"value":"0.15876","scoring_system":"epss","scoring_elements":"0.94768","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8116"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8116","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8116"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8117","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8117"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9652"},{"reference_url":"http://seclists.org/oss-sec/2014/q4/1056","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/oss-sec/2014/q4/1056"},{"reference_url":"http://secunia.com/advisories/61944","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61944"},{"reference_url":"http://secunia.com/advisories/62081","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62081"},{"reference_url":"https://github.com/file/file/blob/00cef282a902a4a6709bbbbb933ee397768caa38/ChangeLog","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/file/file/blob/00cef282a902a4a6709bbbbb933ee397768caa38/ChangeLog"},{"reference_url":"https://github.com/file/file/commit/b4c01141e5367f247b84dcaf6aefbb4e741842b8","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/file/file/commit/b4c01141e5367f247b84dcaf6aefbb4e741842b8"},{"reference_url":"https://github.com/file/file/commit/d7cdad007c507e6c79f51f058dd77fab70ceb9f6","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/file/file/commit/d7cdad007c507e6c79f51f058dd77fab70ceb9f6"},{"reference_url":"https://www.freebsd.org/security/advisories/FreeBSD-SA-14:28.file.asc","reference_id":"","reference_type":"","scores":[],"url":"https://www.freebsd.org/security/advisories/FreeBSD-SA-14:28.file.asc"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"reference_url":"http://www.securityfocus.com/bid/71700","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71700"},{"reference_url":"http://www.securitytracker.com/id/1031344","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031344"},{"reference_url":"http://www.ubuntu.com/usn/USN-2494-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2494-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1171580","reference_id":"1171580","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1171580"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773148","reference_id":"773148","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773148"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:file_project:file:5.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:file_project:file:5.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:file_project:file:5.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8116","reference_id":"CVE-2014-8116","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8116"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2155","reference_id":"RHSA-2015:2155","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2155"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0760","reference_id":"RHSA-2016:0760","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0760"},{"reference_url":"https://usn.ubuntu.com/2494-1/","reference_id":"USN-2494-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2494-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584525?format=json","purl":"pkg:deb/debian/file@1:5.21%2B15-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/file@1:5.21%252B15-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582961?format=json","purl":"pkg:deb/debian/file@1:5.39-3%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/file@1:5.39-3%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582962?format=json","purl":"pkg:deb/debian/file@1:5.44-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/file@1:5.44-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582963?format=json","purl":"pkg:deb/debian/file@1:5.46-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/file@1:5.46-5%3Fdistro=trixie"}],"aliases":["CVE-2014-8116"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-br5w-skmp-6bbv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47793?format=json","vulnerability_id":"VCID-nfd8-hxvz-x3au","summary":"Multiple vulnerabilities have been found in file, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9652.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9652.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9652","reference_id":"","reference_type":"","scores":[{"value":"0.05795","scoring_system":"epss","scoring_elements":"0.90465","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05795","scoring_system":"epss","scoring_elements":"0.90469","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05795","scoring_system":"epss","scoring_elements":"0.90481","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05795","scoring_system":"epss","scoring_elements":"0.90486","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05795","scoring_system":"epss","scoring_elements":"0.90499","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05795","scoring_system":"epss","scoring_elements":"0.90505","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05795","scoring_system":"epss","scoring_elements":"0.90513","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05795","scoring_system":"epss","scoring_elements":"0.90512","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05795","scoring_system":"epss","scoring_elements":"0.90506","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05795","scoring_system":"epss","scoring_elements":"0.90524","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05795","scoring_system":"epss","scoring_elements":"0.90522","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05795","scoring_system":"epss","scoring_elements":"0.90534","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05795","scoring_system":"epss","scoring_elements":"0.90531","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05795","scoring_system":"epss","scoring_elements":"0.90541","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8116","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8116"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8117","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8117"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9652"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1188599","reference_id":"1188599","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1188599"},{"reference_url":"https://security.gentoo.org/glsa/201701-42","reference_id":"GLSA-201701-42","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-42"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1053","reference_id":"RHSA-2015:1053","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1053"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1066","reference_id":"RHSA-2015:1066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1135","reference_id":"RHSA-2015:1135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2155","reference_id":"RHSA-2015:2155","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2155"},{"reference_url":"https://usn.ubuntu.com/2501-1/","reference_id":"USN-2501-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2501-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584525?format=json","purl":"pkg:deb/debian/file@1:5.21%2B15-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/file@1:5.21%252B15-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582961?format=json","purl":"pkg:deb/debian/file@1:5.39-3%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/file@1:5.39-3%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582962?format=json","purl":"pkg:deb/debian/file@1:5.44-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/file@1:5.44-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582963?format=json","purl":"pkg:deb/debian/file@1:5.46-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/file@1:5.46-5%3Fdistro=trixie"}],"aliases":["CVE-2014-9652"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nfd8-hxvz-x3au"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56942?format=json","vulnerability_id":"VCID-pwh8-7erv-sycw","summary":"Vulnerabilities in file could allow a context-dependent attack to\n    create a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9621.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9621.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9621","reference_id":"","reference_type":"","scores":[{"value":"0.01102","scoring_system":"epss","scoring_elements":"0.7809","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01102","scoring_system":"epss","scoring_elements":"0.78123","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01102","scoring_system":"epss","scoring_elements":"0.78129","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01102","scoring_system":"epss","scoring_elements":"0.78143","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01102","scoring_system":"epss","scoring_elements":"0.78154","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01286","scoring_system":"epss","scoring_elements":"0.79624","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01286","scoring_system":"epss","scoring_elements":"0.79645","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01286","scoring_system":"epss","scoring_elements":"0.79572","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01286","scoring_system":"epss","scoring_elements":"0.79622","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01286","scoring_system":"epss","scoring_elements":"0.79652","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01286","scoring_system":"epss","scoring_elements":"0.79629","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01286","scoring_system":"epss","scoring_elements":"0.79578","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01286","scoring_system":"epss","scoring_elements":"0.79601","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01286","scoring_system":"epss","scoring_elements":"0.79588","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01286","scoring_system":"epss","scoring_elements":"0.79617","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9621"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1180642","reference_id":"1180642","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1180642"},{"reference_url":"https://security.gentoo.org/glsa/201503-08","reference_id":"GLSA-201503-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-08"},{"reference_url":"https://usn.ubuntu.com/3686-1/","reference_id":"USN-3686-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3686-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584525?format=json","purl":"pkg:deb/debian/file@1:5.21%2B15-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/file@1:5.21%252B15-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582961?format=json","purl":"pkg:deb/debian/file@1:5.39-3%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/file@1:5.39-3%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582962?format=json","purl":"pkg:deb/debian/file@1:5.44-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/file@1:5.44-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582963?format=json","purl":"pkg:deb/debian/file@1:5.46-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/file@1:5.46-5%3Fdistro=trixie"}],"aliases":["CVE-2014-9621"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pwh8-7erv-sycw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41432?format=json","vulnerability_id":"VCID-x969-386f-h7g3","summary":"A vulnerability in file could allow a context-dependent attack to\n    create a Denial of Service condition.","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2015-0040.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2015-0040.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0760.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0760.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8117.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8117.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8117","reference_id":"","reference_type":"","scores":[{"value":"0.16453","scoring_system":"epss","scoring_elements":"0.94911","published_at":"2026-05-05T12:55:00Z"},{"value":"0.16453","scoring_system":"epss","scoring_elements":"0.94852","published_at":"2026-04-01T12:55:00Z"},{"value":"0.16453","scoring_system":"epss","scoring_elements":"0.94862","published_at":"2026-04-02T12:55:00Z"},{"value":"0.16453","scoring_system":"epss","scoring_elements":"0.94865","published_at":"2026-04-04T12:55:00Z"},{"value":"0.16453","scoring_system":"epss","scoring_elements":"0.94868","published_at":"2026-04-07T12:55:00Z"},{"value":"0.16453","scoring_system":"epss","scoring_elements":"0.94877","published_at":"2026-04-08T12:55:00Z"},{"value":"0.16453","scoring_system":"epss","scoring_elements":"0.9488","published_at":"2026-04-09T12:55:00Z"},{"value":"0.16453","scoring_system":"epss","scoring_elements":"0.94885","published_at":"2026-04-11T12:55:00Z"},{"value":"0.16453","scoring_system":"epss","scoring_elements":"0.94887","published_at":"2026-04-12T12:55:00Z"},{"value":"0.16453","scoring_system":"epss","scoring_elements":"0.94889","published_at":"2026-04-13T12:55:00Z"},{"value":"0.16453","scoring_system":"epss","scoring_elements":"0.94896","published_at":"2026-04-16T12:55:00Z"},{"value":"0.16453","scoring_system":"epss","scoring_elements":"0.94899","published_at":"2026-04-18T12:55:00Z"},{"value":"0.16453","scoring_system":"epss","scoring_elements":"0.94903","published_at":"2026-04-21T12:55:00Z"},{"value":"0.16453","scoring_system":"epss","scoring_elements":"0.94904","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8117"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1943","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1943"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8116","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8116"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8117","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8117"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9652"},{"reference_url":"http://seclists.org/oss-sec/2014/q4/1056","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/oss-sec/2014/q4/1056"},{"reference_url":"http://secunia.com/advisories/61944","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61944"},{"reference_url":"http://secunia.com/advisories/62081","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62081"},{"reference_url":"https://github.com/file/file/blob/00cef282a902a4a6709bbbbb933ee397768caa38/ChangeLog","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/file/file/blob/00cef282a902a4a6709bbbbb933ee397768caa38/ChangeLog"},{"reference_url":"https://github.com/file/file/commit/6f737ddfadb596d7d4a993f7ed2141ffd664a81c","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/file/file/commit/6f737ddfadb596d7d4a993f7ed2141ffd664a81c"},{"reference_url":"https://www.freebsd.org/security/advisories/FreeBSD-SA-14:28.file.asc","reference_id":"","reference_type":"","scores":[],"url":"https://www.freebsd.org/security/advisories/FreeBSD-SA-14:28.file.asc"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"reference_url":"http://www.securityfocus.com/bid/71692","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71692"},{"reference_url":"http://www.securitytracker.com/id/1031344","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031344"},{"reference_url":"http://www.ubuntu.com/usn/USN-2494-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2494-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2535-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2535-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1174606","reference_id":"1174606","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1174606"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773148","reference_id":"773148","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773148"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:file_project:file:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:file_project:file:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:file_project:file:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8117","reference_id":"CVE-2014-8117","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8117"},{"reference_url":"https://security.gentoo.org/glsa/201412-48","reference_id":"GLSA-201412-48","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-48"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2155","reference_id":"RHSA-2015:2155","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2155"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0760","reference_id":"RHSA-2016:0760","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0760"},{"reference_url":"https://usn.ubuntu.com/2494-1/","reference_id":"USN-2494-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2494-1/"},{"reference_url":"https://usn.ubuntu.com/2535-1/","reference_id":"USN-2535-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2535-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584525?format=json","purl":"pkg:deb/debian/file@1:5.21%2B15-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/file@1:5.21%252B15-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582961?format=json","purl":"pkg:deb/debian/file@1:5.39-3%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/file@1:5.39-3%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582962?format=json","purl":"pkg:deb/debian/file@1:5.44-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/file@1:5.44-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582963?format=json","purl":"pkg:deb/debian/file@1:5.46-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/file@1:5.46-5%3Fdistro=trixie"}],"aliases":["CVE-2014-8117"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x969-386f-h7g3"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/file@1:5.21%252B15-1%3Fdistro=trixie"}