{"url":"http://public2.vulnerablecode.io/api/packages/585355?format=json","purl":"pkg:deb/debian/file@5.03-1?distro=trixie","type":"deb","namespace":"debian","name":"file","version":"5.03-1","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"5.11-1","latest_non_vulnerable_version":"1:5.46-5","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/91947?format=json","vulnerability_id":"VCID-kn4s-hv81-q7da","summary":"Multiple buffer overflows in Christos Zoulas file before 5.03 in Apple Mac OS X 10.6.x before 10.6.2 allow user-assisted remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Common Document Format (CDF) file.  NOTE: this might overlap CVE-2009-1515.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2830","reference_id":"","reference_type":"","scores":[{"value":"0.01614","scoring_system":"epss","scoring_elements":"0.81712","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01614","scoring_system":"epss","scoring_elements":"0.81723","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01614","scoring_system":"epss","scoring_elements":"0.81746","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01614","scoring_system":"epss","scoring_elements":"0.81743","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01614","scoring_system":"epss","scoring_elements":"0.8177","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01614","scoring_system":"epss","scoring_elements":"0.81775","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01614","scoring_system":"epss","scoring_elements":"0.81795","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01614","scoring_system":"epss","scoring_elements":"0.81782","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01614","scoring_system":"epss","scoring_elements":"0.81777","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01614","scoring_system":"epss","scoring_elements":"0.81814","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01614","scoring_system":"epss","scoring_elements":"0.81815","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01614","scoring_system":"epss","scoring_elements":"0.81818","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01614","scoring_system":"epss","scoring_elements":"0.81842","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01614","scoring_system":"epss","scoring_elements":"0.81852","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01614","scoring_system":"epss","scoring_elements":"0.81857","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01614","scoring_system":"epss","scoring_elements":"0.81875","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01614","scoring_system":"epss","scoring_elements":"0.81895","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01614","scoring_system":"epss","scoring_elements":"0.8192","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01614","scoring_system":"epss","scoring_elements":"0.81918","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01614","scoring_system":"epss","scoring_elements":"0.81934","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2830"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2830","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2830"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585355?format=json","purl":"pkg:deb/debian/file@5.03-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/file@5.03-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582961?format=json","purl":"pkg:deb/debian/file@1:5.39-3%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/file@1:5.39-3%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582962?format=json","purl":"pkg:deb/debian/file@1:5.44-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/file@1:5.44-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582963?format=json","purl":"pkg:deb/debian/file@1:5.46-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/file@1:5.46-5%3Fdistro=trixie"}],"aliases":["CVE-2009-2830"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kn4s-hv81-q7da"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/91973?format=json","vulnerability_id":"VCID-udeq-mpc8-rucw","summary":"Multiple integer overflows in Christos Zoulas file before 5.02 allow user-assisted remote attackers to have an unspecified impact via a malformed compound document (aka cdf) file that triggers a buffer overflow.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3930","reference_id":"","reference_type":"","scores":[{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75235","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75239","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75271","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75247","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.7529","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.753","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75321","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75299","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75288","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75327","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75334","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75325","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.7536","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75365","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75369","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75377","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75406","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75432","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75411","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75419","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3930"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3930","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3930"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585355?format=json","purl":"pkg:deb/debian/file@5.03-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/file@5.03-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582961?format=json","purl":"pkg:deb/debian/file@1:5.39-3%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/file@1:5.39-3%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582962?format=json","purl":"pkg:deb/debian/file@1:5.44-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/file@1:5.44-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582963?format=json","purl":"pkg:deb/debian/file@1:5.46-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/file@1:5.46-5%3Fdistro=trixie"}],"aliases":["CVE-2009-3930"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-udeq-mpc8-rucw"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/file@5.03-1%3Fdistro=trixie"}