{"url":"http://public2.vulnerablecode.io/api/packages/934893?format=json","purl":"pkg:deb/debian/php-getid3@1.9.23%2Bdfsg-1?distro=trixie","type":"deb","namespace":"debian","name":"php-getid3","version":"1.9.23+dfsg-1","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"1.9.25+dfsg-1","latest_non_vulnerable_version":"1.9.25+dfsg-1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/11305?format=json","vulnerability_id":"VCID-1twr-du4b-h7h6","summary":"Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nCross-site scripting (XSS) vulnerability in getID3 and allows remote attackers to inject arbitrary web script or HTML via the showtagfiles parameter.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-40926","reference_id":"","reference_type":"","scores":[{"value":"0.00284","scoring_system":"epss","scoring_elements":"0.51652","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00284","scoring_system":"epss","scoring_elements":"0.51751","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00284","scoring_system":"epss","scoring_elements":"0.51747","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00284","scoring_system":"epss","scoring_elements":"0.51797","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00284","scoring_system":"epss","scoring_elements":"0.51776","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00284","scoring_system":"epss","scoring_elements":"0.51759","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00284","scoring_system":"epss","scoring_elements":"0.518","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00284","scoring_system":"epss","scoring_elements":"0.51807","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00284","scoring_system":"epss","scoring_elements":"0.51788","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00284","scoring_system":"epss","scoring_elements":"0.51738","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00284","scoring_system":"epss","scoring_elements":"0.51743","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00284","scoring_system":"epss","scoring_elements":"0.51704","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00284","scoring_system":"epss","scoring_elements":"0.5166","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00284","scoring_system":"epss","scoring_elements":"0.5171","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00284","scoring_system":"epss","scoring_elements":"0.51736","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00284","scoring_system":"epss","scoring_elements":"0.51696","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-40926"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40926","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40926"},{"reference_url":"https://github.com/JamesHeinrich/getID3","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/JamesHeinrich/getID3"},{"reference_url":"https://github.com/JamesHeinrich/getID3/issues/341","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/JamesHeinrich/getID3/issues/341"},{"reference_url":"https://github.com/JamesHeinrich/getID3/pull/342","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/JamesHeinrich/getID3/pull/342"},{"reference_url":"https://github.com/JamesHeinrich/getID3/releases/tag/v1.9.21","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/JamesHeinrich/getID3/releases/tag/v1.9.21"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2021-40926","reference_id":"CVE-2021-40926","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-40926"},{"reference_url":"https://github.com/advisories/GHSA-x2gw-85w6-fjjw","reference_id":"GHSA-x2gw-85w6-fjjw","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-x2gw-85w6-fjjw"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934894?format=json","purl":"pkg:deb/debian/php-getid3@1.9.21%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/php-getid3@1.9.21%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934889?format=json","purl":"pkg:deb/debian/php-getid3@1.9.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/php-getid3@1.9.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934893?format=json","purl":"pkg:deb/debian/php-getid3@1.9.23%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/php-getid3@1.9.23%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934892?format=json","purl":"pkg:deb/debian/php-getid3@1.9.25%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/php-getid3@1.9.25%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2021-40926","GHSA-x2gw-85w6-fjjw"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1twr-du4b-h7h6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/54925?format=json","vulnerability_id":"VCID-95zd-g97m-ekh3","summary":"getID3 is vulnerable to XML External Entity (XXE)\ngetID3() before 1.9.9, as used in ownCloud Server before 5.0.15 and 6.0.x before 6.0.2, allows remote attackers to read arbitrary files, cause a denial of service, or possibly have other impact via an XML External Entity (XXE) attack.","references":[{"reference_url":"http://getid3.sourceforge.net/source/changelog.txt","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://getid3.sourceforge.net/source/changelog.txt"},{"reference_url":"http://owncloud.org/about/security/advisories/oC-SA-2014-006","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://owncloud.org/about/security/advisories/oC-SA-2014-006"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-2053","reference_id":"","reference_type":"","scores":[{"value":"0.0197","scoring_system":"epss","scoring_elements":"0.83546","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0197","scoring_system":"epss","scoring_elements":"0.83531","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0197","scoring_system":"epss","scoring_elements":"0.83521","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0197","scoring_system":"epss","scoring_elements":"0.83497","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0197","scoring_system":"epss","scoring_elements":"0.8347","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0197","scoring_system":"epss","scoring_elements":"0.83483","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0197","scoring_system":"epss","scoring_elements":"0.8354","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03481","scoring_system":"epss","scoring_elements":"0.87621","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03481","scoring_system":"epss","scoring_elements":"0.87571","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03481","scoring_system":"epss","scoring_elements":"0.87585","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03481","scoring_system":"epss","scoring_elements":"0.87586","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03481","scoring_system":"epss","scoring_elements":"0.87584","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03481","scoring_system":"epss","scoring_elements":"0.87602","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03481","scoring_system":"epss","scoring_elements":"0.87609","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03481","scoring_system":"epss","scoring_elements":"0.87607","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-2053"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2053","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2053"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5204","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5240","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5240"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5265","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5265"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5266","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5266"},{"reference_url":"http://secunia.com/advisories/58002","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://secunia.com/advisories/58002"},{"reference_url":"https://github.com/FriendsOfPHP/security-advisories/blob/master/james-heinrich/getid3/CVE-2014-2053.yaml","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/FriendsOfPHP/security-advisories/blob/master/james-heinrich/getid3/CVE-2014-2053.yaml"},{"reference_url":"https://github.com/JamesHeinrich/getID3","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/JamesHeinrich/getID3"},{"reference_url":"https://github.com/JamesHeinrich/getID3/commit/afbdaa044a9a0a9dff2f800bd670e231b3ec99b2","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/JamesHeinrich/getID3/commit/afbdaa044a9a0a9dff2f800bd670e231b3ec99b2"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-2053","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-2053"},{"reference_url":"https://wordpress.org/news/2014/08/wordpress-3-9-2","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://wordpress.org/news/2014/08/wordpress-3-9-2"},{"reference_url":"http://www.debian.org/security/2014/dsa-3001","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.debian.org/security/2014/dsa-3001"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757312","reference_id":"757312","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757312"},{"reference_url":"https://github.com/advisories/GHSA-5v43-55m5-qr8f","reference_id":"GHSA-5v43-55m5-qr8f","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-5v43-55m5-qr8f"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/934890?format=json","purl":"pkg:deb/debian/php-getid3@1.9.7-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/php-getid3@1.9.7-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934891?format=json","purl":"pkg:deb/debian/php-getid3@1.9.20%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1twr-du4b-h7h6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/php-getid3@1.9.20%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934889?format=json","purl":"pkg:deb/debian/php-getid3@1.9.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/php-getid3@1.9.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934893?format=json","purl":"pkg:deb/debian/php-getid3@1.9.23%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/php-getid3@1.9.23%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/934892?format=json","purl":"pkg:deb/debian/php-getid3@1.9.25%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/php-getid3@1.9.25%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2014-2053","GHSA-5v43-55m5-qr8f"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-95zd-g97m-ekh3"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/php-getid3@1.9.23%252Bdfsg-1%3Fdistro=trixie"}