Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@2.6.32-504?arch=el6
Typerpm
Namespaceredhat
Namekernel
Version2.6.32-504
Qualifiers
arch el6
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-3hg2-2ntk-6ydm
vulnerability_id VCID-3hg2-2ntk-6ydm
summary kernel: vfs: refcount issues during unmount on symlink
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=295dc39d941dc2ae53d5c170365af4c9d5c16212
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=295dc39d941dc2ae53d5c170365af4c9d5c16212
1
reference_url http://rhn.redhat.com/errata/RHSA-2015-0062.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0062.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5045.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5045.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-5045
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08168
published_at 2026-04-24T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08036
published_at 2026-04-01T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.08126
published_at 2026-04-02T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.0817
published_at 2026-04-04T12:55:00Z
4
value 0.00029
scoring_system epss
scoring_elements 0.08115
published_at 2026-04-07T12:55:00Z
5
value 0.00029
scoring_system epss
scoring_elements 0.08184
published_at 2026-04-08T12:55:00Z
6
value 0.00029
scoring_system epss
scoring_elements 0.08202
published_at 2026-04-09T12:55:00Z
7
value 0.00029
scoring_system epss
scoring_elements 0.08193
published_at 2026-04-11T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08173
published_at 2026-04-12T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.08156
published_at 2026-04-13T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08057
published_at 2026-04-16T12:55:00Z
11
value 0.00029
scoring_system epss
scoring_elements 0.08041
published_at 2026-04-18T12:55:00Z
12
value 0.00029
scoring_system epss
scoring_elements 0.08199
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-5045
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5045
5
reference_url http://secunia.com/advisories/60353
reference_id
reference_type
scores
url http://secunia.com/advisories/60353
6
reference_url https://github.com/torvalds/linux/commit/295dc39d941dc2ae53d5c170365af4c9d5c16212
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/295dc39d941dc2ae53d5c170365af4c9d5c16212
7
reference_url http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.8
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.8
8
reference_url http://www.openwall.com/lists/oss-security/2014/07/24/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/07/24/2
9
reference_url http://www.securityfocus.com/bid/68862
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68862
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1122472
reference_id 1122472
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1122472
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-5045
reference_id CVE-2014-5045
reference_type
scores
0
value 6.2
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-5045
16
reference_url https://access.redhat.com/errata/RHSA-2014:1392
reference_id RHSA-2014:1392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1392
17
reference_url https://access.redhat.com/errata/RHSA-2014:1971
reference_id RHSA-2014:1971
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1971
18
reference_url https://access.redhat.com/errata/RHSA-2015:0062
reference_id RHSA-2015:0062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0062
19
reference_url https://usn.ubuntu.com/2336-1/
reference_id USN-2336-1
reference_type
scores
url https://usn.ubuntu.com/2336-1/
20
reference_url https://usn.ubuntu.com/2337-1/
reference_id USN-2337-1
reference_type
scores
url https://usn.ubuntu.com/2337-1/
fixed_packages
aliases CVE-2014-5045
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3hg2-2ntk-6ydm
1
url VCID-3hq3-npb3-wqau
vulnerability_id VCID-3hq3-npb3-wqau
summary kernel: net: insufficient permision checks of netlink messages
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0181.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0181.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0181
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04668
published_at 2026-04-18T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.06902
published_at 2026-04-21T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06887
published_at 2026-04-24T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07566
published_at 2026-04-07T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07624
published_at 2026-04-08T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07642
published_at 2026-04-11T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07433
published_at 2026-04-01T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07615
published_at 2026-04-13T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.0754
published_at 2026-04-16T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07629
published_at 2026-04-12T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07548
published_at 2026-04-02T12:55:00Z
11
value 0.00027
scoring_system epss
scoring_elements 0.0759
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0181
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0181
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1094265
reference_id 1094265
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1094265
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746738
reference_id 746738
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746738
5
reference_url https://access.redhat.com/errata/RHSA-2014:0913
reference_id RHSA-2014:0913
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0913
6
reference_url https://access.redhat.com/errata/RHSA-2014:1023
reference_id RHSA-2014:1023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1023
7
reference_url https://access.redhat.com/errata/RHSA-2014:1392
reference_id RHSA-2014:1392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1392
8
reference_url https://access.redhat.com/errata/RHSA-2014:1959
reference_id RHSA-2014:1959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1959
9
reference_url https://usn.ubuntu.com/2336-1/
reference_id USN-2336-1
reference_type
scores
url https://usn.ubuntu.com/2336-1/
10
reference_url https://usn.ubuntu.com/2337-1/
reference_id USN-2337-1
reference_type
scores
url https://usn.ubuntu.com/2337-1/
fixed_packages
aliases CVE-2014-0181
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3hq3-npb3-wqau
2
url VCID-6wa1-p1ej-cygt
vulnerability_id VCID-6wa1-p1ej-cygt
summary kernel: integer overflow in fb_mmap
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2596.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2596.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2596
reference_id
reference_type
scores
0
value 0.02696
scoring_system epss
scoring_elements 0.85832
published_at 2026-04-04T12:55:00Z
1
value 0.02696
scoring_system epss
scoring_elements 0.85814
published_at 2026-04-02T12:55:00Z
2
value 0.02696
scoring_system epss
scoring_elements 0.85802
published_at 2026-04-01T12:55:00Z
3
value 0.02696
scoring_system epss
scoring_elements 0.85836
published_at 2026-04-07T12:55:00Z
4
value 0.02696
scoring_system epss
scoring_elements 0.85854
published_at 2026-04-08T12:55:00Z
5
value 0.02696
scoring_system epss
scoring_elements 0.85864
published_at 2026-04-09T12:55:00Z
6
value 0.02696
scoring_system epss
scoring_elements 0.85879
published_at 2026-04-11T12:55:00Z
7
value 0.02696
scoring_system epss
scoring_elements 0.85876
published_at 2026-04-12T12:55:00Z
8
value 0.02696
scoring_system epss
scoring_elements 0.85871
published_at 2026-04-13T12:55:00Z
9
value 0.02696
scoring_system epss
scoring_elements 0.8589
published_at 2026-04-16T12:55:00Z
10
value 0.02696
scoring_system epss
scoring_elements 0.85894
published_at 2026-04-18T12:55:00Z
11
value 0.02696
scoring_system epss
scoring_elements 0.85886
published_at 2026-04-21T12:55:00Z
12
value 0.03131
scoring_system epss
scoring_elements 0.86907
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2596
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2596
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1034490
reference_id 1034490
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1034490
4
reference_url http://www.droidrzr.com/index.php/topic/15208-root-motochopper-yet-another-android-root-exploit/
reference_id 15208-root-motochopper-yet-another-android-root-exploit
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-05-01T03:55:10Z/
url http://www.droidrzr.com/index.php/topic/15208-root-motochopper-yet-another-android-root-exploit/
5
reference_url http://www.securityfocus.com/bid/59264
reference_id 59264
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-05-01T03:55:10Z/
url http://www.securityfocus.com/bid/59264
6
reference_url https://github.com/torvalds/linux/commit/b4cbb197c7e7a68dbad0d491242e3ca67420c13e
reference_id b4cbb197c7e7a68dbad0d491242e3ca67420c13e
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-05-01T03:55:10Z/
url https://github.com/torvalds/linux/commit/b4cbb197c7e7a68dbad0d491242e3ca67420c13e
7
reference_url https://github.com/torvalds/linux/commit/fc9bbca8f650e5f738af8806317c0a041a48ae4a
reference_id fc9bbca8f650e5f738af8806317c0a041a48ae4a
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-05-01T03:55:10Z/
url https://github.com/torvalds/linux/commit/fc9bbca8f650e5f738af8806317c0a041a48ae4a
8
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b4cbb197c7e7a68dbad0d491242e3ca67420c13e
reference_id linux-2.6.git%3Ba=commit%3Bh=b4cbb197c7e7a68dbad0d491242e3ca67420c13e
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-05-01T03:55:10Z/
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b4cbb197c7e7a68dbad0d491242e3ca67420c13e
9
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fc9bbca8f650e5f738af8806317c0a041a48ae4a
reference_id linux-2.6.git%3Ba=commit%3Bh=fc9bbca8f650e5f738af8806317c0a041a48ae4a
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-05-01T03:55:10Z/
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fc9bbca8f650e5f738af8806317c0a041a48ae4a
10
reference_url http://marc.info/?l=linux-kernel&m=136616837923938&w=2
reference_id ?l=linux-kernel&m=136616837923938&w=2
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-05-01T03:55:10Z/
url http://marc.info/?l=linux-kernel&m=136616837923938&w=2
11
reference_url https://access.redhat.com/errata/RHSA-2014:1392
reference_id RHSA-2014:1392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1392
12
reference_url https://access.redhat.com/errata/RHSA-2015:0695
reference_id RHSA-2015:0695
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0695
13
reference_url https://access.redhat.com/errata/RHSA-2015:0782
reference_id RHSA-2015:0782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0782
14
reference_url https://access.redhat.com/errata/RHSA-2015:0803
reference_id RHSA-2015:0803
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0803
15
reference_url https://access.redhat.com/errata/RHSA-2016:0450
reference_id RHSA-2016:0450
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0450
16
reference_url http://www.droid-life.com/2013/04/09/root-method-released-for-droid-razr-hd-running-android-4-1-2-other-devices-too/
reference_id root-method-released-for-droid-razr-hd-running-android-4-1-2-other-devices-too
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-05-01T03:55:10Z/
url http://www.droid-life.com/2013/04/09/root-method-released-for-droid-razr-hd-running-android-4-1-2-other-devices-too/
17
reference_url http://forum.xda-developers.com/showthread.php?t=2255491
reference_id showthread.php?t=2255491
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-05-01T03:55:10Z/
url http://forum.xda-developers.com/showthread.php?t=2255491
fixed_packages
aliases CVE-2013-2596
risk_score 10.0
exploitability 2.0
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6wa1-p1ej-cygt
3
url VCID-awcq-jbnf-gkek
vulnerability_id VCID-awcq-jbnf-gkek
summary libmnl: incorrect validation of netlink message origin allows attackers to spoof netlink messages
references
0
reference_url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=20e1db19db5d6b9e4e83021595eab0dc8f107bef
reference_id
reference_type
scores
url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=20e1db19db5d6b9e4e83021595eab0dc8f107bef
1
reference_url http://marc.info/?l=linux-netdev&m=134522422125983&w=2
reference_id
reference_type
scores
url http://marc.info/?l=linux-netdev&m=134522422125983&w=2
2
reference_url http://marc.info/?l=linux-netdev&m=134522422925986&w=2
reference_id
reference_type
scores
url http://marc.info/?l=linux-netdev&m=134522422925986&w=2
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6689.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6689.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-6689
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.09832
published_at 2026-04-21T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.09686
published_at 2026-04-18T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.09732
published_at 2026-04-01T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.09804
published_at 2026-04-02T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.09854
published_at 2026-04-04T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.09754
published_at 2026-04-07T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.09825
published_at 2026-04-08T12:55:00Z
7
value 0.00034
scoring_system epss
scoring_elements 0.09878
published_at 2026-04-24T12:55:00Z
8
value 0.00034
scoring_system epss
scoring_elements 0.09885
published_at 2026-04-11T12:55:00Z
9
value 0.00034
scoring_system epss
scoring_elements 0.09849
published_at 2026-04-12T12:55:00Z
10
value 0.00034
scoring_system epss
scoring_elements 0.09833
published_at 2026-04-13T12:55:00Z
11
value 0.00034
scoring_system epss
scoring_elements 0.09716
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-6689
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6689
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6689
6
reference_url https://github.com/torvalds/linux/commit/20e1db19db5d6b9e4e83021595eab0dc8f107bef
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/20e1db19db5d6b9e4e83021595eab0dc8f107bef
7
reference_url http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.5.5
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.5.5
8
reference_url http://www.openwall.com/lists/oss-security/2015/02/22/10
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/02/22/10
9
reference_url http://www.securityfocus.com/bid/72739
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/72739
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=848949
reference_id 848949
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=848949
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-6689
reference_id CVE-2012-6689
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2012-6689
13
reference_url https://access.redhat.com/errata/RHSA-2014:1392
reference_id RHSA-2014:1392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1392
14
reference_url https://usn.ubuntu.com/1599-1/
reference_id USN-1599-1
reference_type
scores
url https://usn.ubuntu.com/1599-1/
15
reference_url https://usn.ubuntu.com/1610-1/
reference_id USN-1610-1
reference_type
scores
url https://usn.ubuntu.com/1610-1/
fixed_packages
aliases CVE-2012-6689
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-awcq-jbnf-gkek
4
url VCID-bxc1-te21-3qfg
vulnerability_id VCID-bxc1-te21-3qfg
summary Kernel: ALSA: control: use-after-free in replacing user controls
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=82262a46627bebb0febcc26664746c25cef08563
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=82262a46627bebb0febcc26664746c25cef08563
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2014-1083.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1083.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4654.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4654.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-4654
reference_id
reference_type
scores
0
value 0.00066
scoring_system epss
scoring_elements 0.20397
published_at 2026-04-24T12:55:00Z
1
value 0.00066
scoring_system epss
scoring_elements 0.20545
published_at 2026-04-08T12:55:00Z
2
value 0.00066
scoring_system epss
scoring_elements 0.2069
published_at 2026-04-02T12:55:00Z
3
value 0.00066
scoring_system epss
scoring_elements 0.2075
published_at 2026-04-04T12:55:00Z
4
value 0.00066
scoring_system epss
scoring_elements 0.20467
published_at 2026-04-07T12:55:00Z
5
value 0.00066
scoring_system epss
scoring_elements 0.20604
published_at 2026-04-09T12:55:00Z
6
value 0.00066
scoring_system epss
scoring_elements 0.20623
published_at 2026-04-11T12:55:00Z
7
value 0.00066
scoring_system epss
scoring_elements 0.20581
published_at 2026-04-12T12:55:00Z
8
value 0.00066
scoring_system epss
scoring_elements 0.20528
published_at 2026-04-13T12:55:00Z
9
value 0.00066
scoring_system epss
scoring_elements 0.20514
published_at 2026-04-16T12:55:00Z
10
value 0.00066
scoring_system epss
scoring_elements 0.20513
published_at 2026-04-18T12:55:00Z
11
value 0.00066
scoring_system epss
scoring_elements 0.2051
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-4654
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4654
6
reference_url http://secunia.com/advisories/59434
reference_id
reference_type
scores
url http://secunia.com/advisories/59434
7
reference_url http://secunia.com/advisories/59777
reference_id
reference_type
scores
url http://secunia.com/advisories/59777
8
reference_url http://secunia.com/advisories/60545
reference_id
reference_type
scores
url http://secunia.com/advisories/60545
9
reference_url http://secunia.com/advisories/60564
reference_id
reference_type
scores
url http://secunia.com/advisories/60564
10
reference_url https://github.com/torvalds/linux/commit/82262a46627bebb0febcc26664746c25cef08563
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/82262a46627bebb0febcc26664746c25cef08563
11
reference_url http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2
12
reference_url http://www.openwall.com/lists/oss-security/2014/06/26/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/06/26/6
13
reference_url http://www.securityfocus.com/bid/68162
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68162
14
reference_url http://www.ubuntu.com/usn/USN-2334-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2334-1
15
reference_url http://www.ubuntu.com/usn/USN-2335-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2335-1
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1113445
reference_id 1113445
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1113445
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-4654
reference_id CVE-2014-4654
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-4654
21
reference_url https://access.redhat.com/errata/RHSA-2014:1083
reference_id RHSA-2014:1083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1083
22
reference_url https://access.redhat.com/errata/RHSA-2014:1392
reference_id RHSA-2014:1392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1392
23
reference_url https://access.redhat.com/errata/RHSA-2014:1971
reference_id RHSA-2014:1971
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1971
24
reference_url https://usn.ubuntu.com/2332-1/
reference_id USN-2332-1
reference_type
scores
url https://usn.ubuntu.com/2332-1/
25
reference_url https://usn.ubuntu.com/2333-1/
reference_id USN-2333-1
reference_type
scores
url https://usn.ubuntu.com/2333-1/
26
reference_url https://usn.ubuntu.com/2334-1/
reference_id USN-2334-1
reference_type
scores
url https://usn.ubuntu.com/2334-1/
27
reference_url https://usn.ubuntu.com/2335-1/
reference_id USN-2335-1
reference_type
scores
url https://usn.ubuntu.com/2335-1/
28
reference_url https://usn.ubuntu.com/2336-1/
reference_id USN-2336-1
reference_type
scores
url https://usn.ubuntu.com/2336-1/
29
reference_url https://usn.ubuntu.com/2337-1/
reference_id USN-2337-1
reference_type
scores
url https://usn.ubuntu.com/2337-1/
fixed_packages
aliases CVE-2014-4654
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bxc1-te21-3qfg
5
url VCID-dzt9-516r-cfc1
vulnerability_id VCID-dzt9-516r-cfc1
summary kernel: lzo1x_decompress_safe() integer overflow
references
0
reference_url http://blog.securitymouse.com/2014/06/raising-lazarus-20-year-old-bug-that.html
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-18T16:18:41Z/
url http://blog.securitymouse.com/2014/06/raising-lazarus-20-year-old-bug-that.html
1
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=206a81c18401c0cde6e579164f752c4b147324ce
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-18T16:18:41Z/
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=206a81c18401c0cde6e579164f752c4b147324ce
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-18T16:18:41Z/
url http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-18T16:18:41Z/
url http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-18T16:18:41Z/
url http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2015-0062.html
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-18T16:18:41Z/
url http://rhn.redhat.com/errata/RHSA-2015-0062.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4608.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4608.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-4608
reference_id
reference_type
scores
0
value 0.08604
scoring_system epss
scoring_elements 0.92385
published_at 2026-04-01T12:55:00Z
1
value 0.08604
scoring_system epss
scoring_elements 0.92392
published_at 2026-04-02T12:55:00Z
2
value 0.08604
scoring_system epss
scoring_elements 0.92399
published_at 2026-04-04T12:55:00Z
3
value 0.08604
scoring_system epss
scoring_elements 0.92402
published_at 2026-04-07T12:55:00Z
4
value 0.08604
scoring_system epss
scoring_elements 0.92414
published_at 2026-04-08T12:55:00Z
5
value 0.08604
scoring_system epss
scoring_elements 0.92419
published_at 2026-04-09T12:55:00Z
6
value 0.08604
scoring_system epss
scoring_elements 0.92425
published_at 2026-04-13T12:55:00Z
7
value 0.08604
scoring_system epss
scoring_elements 0.92427
published_at 2026-04-12T12:55:00Z
8
value 0.08604
scoring_system epss
scoring_elements 0.92436
published_at 2026-04-16T12:55:00Z
9
value 0.08604
scoring_system epss
scoring_elements 0.92435
published_at 2026-04-18T12:55:00Z
10
value 0.08604
scoring_system epss
scoring_elements 0.92438
published_at 2026-04-21T12:55:00Z
11
value 0.08604
scoring_system epss
scoring_elements 0.92441
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-4608
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4608
9
reference_url http://secunia.com/advisories/60011
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-18T16:18:41Z/
url http://secunia.com/advisories/60011
10
reference_url http://secunia.com/advisories/60174
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-18T16:18:41Z/
url http://secunia.com/advisories/60174
11
reference_url http://secunia.com/advisories/62633
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-18T16:18:41Z/
url http://secunia.com/advisories/62633
12
reference_url https://github.com/torvalds/linux/commit/206a81c18401c0cde6e579164f752c4b147324ce
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-18T16:18:41Z/
url https://github.com/torvalds/linux/commit/206a81c18401c0cde6e579164f752c4b147324ce
13
reference_url https://www.securitymouse.com/lms-2014-06-16-2
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-18T16:18:41Z/
url https://www.securitymouse.com/lms-2014-06-16-2
14
reference_url http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-18T16:18:41Z/
url http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2
15
reference_url http://www.oberhumer.com/opensource/lzo/
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-18T16:18:41Z/
url http://www.oberhumer.com/opensource/lzo/
16
reference_url http://www.openwall.com/lists/oss-security/2014/06/26/21
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-18T16:18:41Z/
url http://www.openwall.com/lists/oss-security/2014/06/26/21
17
reference_url http://www.securityfocus.com/bid/68214
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-18T16:18:41Z/
url http://www.securityfocus.com/bid/68214
18
reference_url http://www.ubuntu.com/usn/USN-2416-1
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-18T16:18:41Z/
url http://www.ubuntu.com/usn/USN-2416-1
19
reference_url http://www.ubuntu.com/usn/USN-2417-1
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-18T16:18:41Z/
url http://www.ubuntu.com/usn/USN-2417-1
20
reference_url http://www.ubuntu.com/usn/USN-2418-1
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-18T16:18:41Z/
url http://www.ubuntu.com/usn/USN-2418-1
21
reference_url http://www.ubuntu.com/usn/USN-2419-1
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-18T16:18:41Z/
url http://www.ubuntu.com/usn/USN-2419-1
22
reference_url http://www.ubuntu.com/usn/USN-2420-1
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-18T16:18:41Z/
url http://www.ubuntu.com/usn/USN-2420-1
23
reference_url http://www.ubuntu.com/usn/USN-2421-1
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-18T16:18:41Z/
url http://www.ubuntu.com/usn/USN-2421-1
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1113899
reference_id 1113899
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-18T16:18:41Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=1113899
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp3:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
33
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-4608
reference_id CVE-2014-4608
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2014-4608
34
reference_url https://access.redhat.com/errata/RHSA-2014:1392
reference_id RHSA-2014:1392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1392
35
reference_url https://access.redhat.com/errata/RHSA-2015:0062
reference_id RHSA-2015:0062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0062
36
reference_url https://usn.ubuntu.com/2286-1/
reference_id USN-2286-1
reference_type
scores
url https://usn.ubuntu.com/2286-1/
37
reference_url https://usn.ubuntu.com/2289-1/
reference_id USN-2289-1
reference_type
scores
url https://usn.ubuntu.com/2289-1/
38
reference_url https://usn.ubuntu.com/2415-1/
reference_id USN-2415-1
reference_type
scores
url https://usn.ubuntu.com/2415-1/
39
reference_url https://usn.ubuntu.com/2416-1/
reference_id USN-2416-1
reference_type
scores
url https://usn.ubuntu.com/2416-1/
40
reference_url https://usn.ubuntu.com/2417-1/
reference_id USN-2417-1
reference_type
scores
url https://usn.ubuntu.com/2417-1/
41
reference_url https://usn.ubuntu.com/2418-1/
reference_id USN-2418-1
reference_type
scores
url https://usn.ubuntu.com/2418-1/
42
reference_url https://usn.ubuntu.com/2419-1/
reference_id USN-2419-1
reference_type
scores
url https://usn.ubuntu.com/2419-1/
43
reference_url https://usn.ubuntu.com/2420-1/
reference_id USN-2420-1
reference_type
scores
url https://usn.ubuntu.com/2420-1/
44
reference_url https://usn.ubuntu.com/2421-1/
reference_id USN-2421-1
reference_type
scores
url https://usn.ubuntu.com/2421-1/
fixed_packages
aliases CVE-2014-4608
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dzt9-516r-cfc1
6
url VCID-k1h9-qhs5-3yhf
vulnerability_id VCID-k1h9-qhs5-3yhf
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3122.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3122.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3122
reference_id
reference_type
scores
0
value 0.00085
scoring_system epss
scoring_elements 0.24726
published_at 2026-04-01T12:55:00Z
1
value 0.00085
scoring_system epss
scoring_elements 0.24804
published_at 2026-04-02T12:55:00Z
2
value 0.00085
scoring_system epss
scoring_elements 0.24842
published_at 2026-04-04T12:55:00Z
3
value 0.00085
scoring_system epss
scoring_elements 0.24615
published_at 2026-04-07T12:55:00Z
4
value 0.00085
scoring_system epss
scoring_elements 0.24684
published_at 2026-04-08T12:55:00Z
5
value 0.00085
scoring_system epss
scoring_elements 0.24731
published_at 2026-04-09T12:55:00Z
6
value 0.00085
scoring_system epss
scoring_elements 0.24744
published_at 2026-04-11T12:55:00Z
7
value 0.00085
scoring_system epss
scoring_elements 0.24703
published_at 2026-04-12T12:55:00Z
8
value 0.00085
scoring_system epss
scoring_elements 0.24646
published_at 2026-04-13T12:55:00Z
9
value 0.00085
scoring_system epss
scoring_elements 0.24659
published_at 2026-04-16T12:55:00Z
10
value 0.00085
scoring_system epss
scoring_elements 0.24651
published_at 2026-04-18T12:55:00Z
11
value 0.00085
scoring_system epss
scoring_elements 0.24631
published_at 2026-04-21T12:55:00Z
12
value 0.00085
scoring_system epss
scoring_elements 0.24575
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3122
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0196
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1737
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1738
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2851
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3122
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3122
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1093076
reference_id 1093076
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1093076
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=747326
reference_id 747326
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=747326
9
reference_url https://access.redhat.com/errata/RHSA-2014:0557
reference_id RHSA-2014:0557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0557
10
reference_url https://access.redhat.com/errata/RHSA-2014:1392
reference_id RHSA-2014:1392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1392
11
reference_url https://usn.ubuntu.com/2223-1/
reference_id USN-2223-1
reference_type
scores
url https://usn.ubuntu.com/2223-1/
12
reference_url https://usn.ubuntu.com/2224-1/
reference_id USN-2224-1
reference_type
scores
url https://usn.ubuntu.com/2224-1/
13
reference_url https://usn.ubuntu.com/2233-1/
reference_id USN-2233-1
reference_type
scores
url https://usn.ubuntu.com/2233-1/
14
reference_url https://usn.ubuntu.com/2234-1/
reference_id USN-2234-1
reference_type
scores
url https://usn.ubuntu.com/2234-1/
15
reference_url https://usn.ubuntu.com/2235-1/
reference_id USN-2235-1
reference_type
scores
url https://usn.ubuntu.com/2235-1/
16
reference_url https://usn.ubuntu.com/2236-1/
reference_id USN-2236-1
reference_type
scores
url https://usn.ubuntu.com/2236-1/
17
reference_url https://usn.ubuntu.com/2239-1/
reference_id USN-2239-1
reference_type
scores
url https://usn.ubuntu.com/2239-1/
18
reference_url https://usn.ubuntu.com/2240-1/
reference_id USN-2240-1
reference_type
scores
url https://usn.ubuntu.com/2240-1/
19
reference_url https://usn.ubuntu.com/2241-1/
reference_id USN-2241-1
reference_type
scores
url https://usn.ubuntu.com/2241-1/
20
reference_url https://usn.ubuntu.com/2260-1/
reference_id USN-2260-1
reference_type
scores
url https://usn.ubuntu.com/2260-1/
fixed_packages
aliases CVE-2014-3122
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k1h9-qhs5-3yhf
7
url VCID-s6h8-2mdq-63ea
vulnerability_id VCID-s6h8-2mdq-63ea
summary Kernel: ALSA: control: do not access controls outside of protected regions
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fd9f26e4eca5d08a27d12c0933fceef76ed9663d
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fd9f26e4eca5d08a27d12c0933fceef76ed9663d
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2014-1083.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1083.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4653.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4653.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-4653
reference_id
reference_type
scores
0
value 0.00066
scoring_system epss
scoring_elements 0.20397
published_at 2026-04-24T12:55:00Z
1
value 0.00066
scoring_system epss
scoring_elements 0.20545
published_at 2026-04-08T12:55:00Z
2
value 0.00066
scoring_system epss
scoring_elements 0.2069
published_at 2026-04-02T12:55:00Z
3
value 0.00066
scoring_system epss
scoring_elements 0.2075
published_at 2026-04-04T12:55:00Z
4
value 0.00066
scoring_system epss
scoring_elements 0.20467
published_at 2026-04-07T12:55:00Z
5
value 0.00066
scoring_system epss
scoring_elements 0.20604
published_at 2026-04-09T12:55:00Z
6
value 0.00066
scoring_system epss
scoring_elements 0.20623
published_at 2026-04-11T12:55:00Z
7
value 0.00066
scoring_system epss
scoring_elements 0.20581
published_at 2026-04-12T12:55:00Z
8
value 0.00066
scoring_system epss
scoring_elements 0.20528
published_at 2026-04-13T12:55:00Z
9
value 0.00066
scoring_system epss
scoring_elements 0.20514
published_at 2026-04-16T12:55:00Z
10
value 0.00066
scoring_system epss
scoring_elements 0.20513
published_at 2026-04-18T12:55:00Z
11
value 0.00066
scoring_system epss
scoring_elements 0.2051
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-4653
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4653
6
reference_url http://secunia.com/advisories/59434
reference_id
reference_type
scores
url http://secunia.com/advisories/59434
7
reference_url http://secunia.com/advisories/59777
reference_id
reference_type
scores
url http://secunia.com/advisories/59777
8
reference_url http://secunia.com/advisories/60545
reference_id
reference_type
scores
url http://secunia.com/advisories/60545
9
reference_url http://secunia.com/advisories/60564
reference_id
reference_type
scores
url http://secunia.com/advisories/60564
10
reference_url https://github.com/torvalds/linux/commit/fd9f26e4eca5d08a27d12c0933fceef76ed9663d
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/fd9f26e4eca5d08a27d12c0933fceef76ed9663d
11
reference_url http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2
12
reference_url http://www.openwall.com/lists/oss-security/2014/06/26/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/06/26/6
13
reference_url http://www.securityfocus.com/bid/68164
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68164
14
reference_url http://www.ubuntu.com/usn/USN-2334-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2334-1
15
reference_url http://www.ubuntu.com/usn/USN-2335-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2335-1
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1113409
reference_id 1113409
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1113409
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-4653
reference_id CVE-2014-4653
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-4653
21
reference_url https://access.redhat.com/errata/RHSA-2014:1083
reference_id RHSA-2014:1083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1083
22
reference_url https://access.redhat.com/errata/RHSA-2014:1392
reference_id RHSA-2014:1392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1392
23
reference_url https://access.redhat.com/errata/RHSA-2014:1724
reference_id RHSA-2014:1724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1724
24
reference_url https://usn.ubuntu.com/2332-1/
reference_id USN-2332-1
reference_type
scores
url https://usn.ubuntu.com/2332-1/
25
reference_url https://usn.ubuntu.com/2333-1/
reference_id USN-2333-1
reference_type
scores
url https://usn.ubuntu.com/2333-1/
26
reference_url https://usn.ubuntu.com/2334-1/
reference_id USN-2334-1
reference_type
scores
url https://usn.ubuntu.com/2334-1/
27
reference_url https://usn.ubuntu.com/2335-1/
reference_id USN-2335-1
reference_type
scores
url https://usn.ubuntu.com/2335-1/
28
reference_url https://usn.ubuntu.com/2336-1/
reference_id USN-2336-1
reference_type
scores
url https://usn.ubuntu.com/2336-1/
29
reference_url https://usn.ubuntu.com/2337-1/
reference_id USN-2337-1
reference_type
scores
url https://usn.ubuntu.com/2337-1/
fixed_packages
aliases CVE-2014-4653
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s6h8-2mdq-63ea
8
url VCID-ssk8-9z69-mfez
vulnerability_id VCID-ssk8-9z69-mfez
summary Kernel: ALSA: control: use-after-free in replacing user controls
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=82262a46627bebb0febcc26664746c25cef08563
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=82262a46627bebb0febcc26664746c25cef08563
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2014-1083.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1083.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4655.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4655.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-4655
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11259
published_at 2026-04-24T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11248
published_at 2026-04-01T12:55:00Z
2
value 0.00038
scoring_system epss
scoring_elements 0.11396
published_at 2026-04-02T12:55:00Z
3
value 0.00038
scoring_system epss
scoring_elements 0.11453
published_at 2026-04-04T12:55:00Z
4
value 0.00038
scoring_system epss
scoring_elements 0.11245
published_at 2026-04-07T12:55:00Z
5
value 0.00038
scoring_system epss
scoring_elements 0.11327
published_at 2026-04-08T12:55:00Z
6
value 0.00038
scoring_system epss
scoring_elements 0.11381
published_at 2026-04-09T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.11388
published_at 2026-04-11T12:55:00Z
8
value 0.00038
scoring_system epss
scoring_elements 0.11354
published_at 2026-04-12T12:55:00Z
9
value 0.00038
scoring_system epss
scoring_elements 0.11325
published_at 2026-04-13T12:55:00Z
10
value 0.00038
scoring_system epss
scoring_elements 0.11188
published_at 2026-04-16T12:55:00Z
11
value 0.00038
scoring_system epss
scoring_elements 0.1119
published_at 2026-04-18T12:55:00Z
12
value 0.00038
scoring_system epss
scoring_elements 0.11319
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-4655
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4655
6
reference_url http://secunia.com/advisories/59434
reference_id
reference_type
scores
url http://secunia.com/advisories/59434
7
reference_url http://secunia.com/advisories/59777
reference_id
reference_type
scores
url http://secunia.com/advisories/59777
8
reference_url http://secunia.com/advisories/60545
reference_id
reference_type
scores
url http://secunia.com/advisories/60545
9
reference_url http://secunia.com/advisories/60564
reference_id
reference_type
scores
url http://secunia.com/advisories/60564
10
reference_url https://github.com/torvalds/linux/commit/82262a46627bebb0febcc26664746c25cef08563
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/82262a46627bebb0febcc26664746c25cef08563
11
reference_url http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2
12
reference_url http://www.openwall.com/lists/oss-security/2014/06/26/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/06/26/6
13
reference_url http://www.securityfocus.com/bid/68162
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68162
14
reference_url http://www.securitytracker.com/id/1036763
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1036763
15
reference_url http://www.ubuntu.com/usn/USN-2334-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2334-1
16
reference_url http://www.ubuntu.com/usn/USN-2335-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2335-1
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1113445
reference_id 1113445
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1113445
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-4655
reference_id CVE-2014-4655
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-4655
22
reference_url https://access.redhat.com/errata/RHSA-2014:1083
reference_id RHSA-2014:1083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1083
23
reference_url https://access.redhat.com/errata/RHSA-2014:1392
reference_id RHSA-2014:1392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1392
24
reference_url https://access.redhat.com/errata/RHSA-2014:1971
reference_id RHSA-2014:1971
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1971
25
reference_url https://usn.ubuntu.com/2332-1/
reference_id USN-2332-1
reference_type
scores
url https://usn.ubuntu.com/2332-1/
26
reference_url https://usn.ubuntu.com/2333-1/
reference_id USN-2333-1
reference_type
scores
url https://usn.ubuntu.com/2333-1/
27
reference_url https://usn.ubuntu.com/2334-1/
reference_id USN-2334-1
reference_type
scores
url https://usn.ubuntu.com/2334-1/
28
reference_url https://usn.ubuntu.com/2335-1/
reference_id USN-2335-1
reference_type
scores
url https://usn.ubuntu.com/2335-1/
29
reference_url https://usn.ubuntu.com/2336-1/
reference_id USN-2336-1
reference_type
scores
url https://usn.ubuntu.com/2336-1/
30
reference_url https://usn.ubuntu.com/2337-1/
reference_id USN-2337-1
reference_type
scores
url https://usn.ubuntu.com/2337-1/
fixed_packages
aliases CVE-2014-4655
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ssk8-9z69-mfez
9
url VCID-uptx-kfgr-wkgt
vulnerability_id VCID-uptx-kfgr-wkgt
summary kernel: kvm: invalid parameter passing in kvm_iommu_map_pages()
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=350b8bdd689cd2ab2c67c8a86a0be86cfa0751a7
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=350b8bdd689cd2ab2c67c8a86a0be86cfa0751a7
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3601.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3601.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3601
reference_id
reference_type
scores
0
value 0.0029
scoring_system epss
scoring_elements 0.52402
published_at 2026-04-24T12:55:00Z
1
value 0.0029
scoring_system epss
scoring_elements 0.5247
published_at 2026-04-18T12:55:00Z
2
value 0.0029
scoring_system epss
scoring_elements 0.52455
published_at 2026-04-21T12:55:00Z
3
value 0.00343
scoring_system epss
scoring_elements 0.56949
published_at 2026-04-07T12:55:00Z
4
value 0.00343
scoring_system epss
scoring_elements 0.57
published_at 2026-04-08T12:55:00Z
5
value 0.00343
scoring_system epss
scoring_elements 0.57003
published_at 2026-04-09T12:55:00Z
6
value 0.00343
scoring_system epss
scoring_elements 0.56857
published_at 2026-04-01T12:55:00Z
7
value 0.00343
scoring_system epss
scoring_elements 0.5699
published_at 2026-04-12T12:55:00Z
8
value 0.00343
scoring_system epss
scoring_elements 0.56966
published_at 2026-04-13T12:55:00Z
9
value 0.00343
scoring_system epss
scoring_elements 0.56996
published_at 2026-04-16T12:55:00Z
10
value 0.00343
scoring_system epss
scoring_elements 0.5701
published_at 2026-04-11T12:55:00Z
11
value 0.00343
scoring_system epss
scoring_elements 0.56952
published_at 2026-04-02T12:55:00Z
12
value 0.00343
scoring_system epss
scoring_elements 0.56973
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3601
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3601
7
reference_url http://secunia.com/advisories/60830
reference_id
reference_type
scores
url http://secunia.com/advisories/60830
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/95689
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/95689
9
reference_url https://github.com/torvalds/linux/commit/350b8bdd689cd2ab2c67c8a86a0be86cfa0751a7
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/350b8bdd689cd2ab2c67c8a86a0be86cfa0751a7
10
reference_url http://www.securityfocus.com/bid/69489
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/69489
11
reference_url http://www.ubuntu.com/usn/USN-2356-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2356-1
12
reference_url http://www.ubuntu.com/usn/USN-2357-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2357-1
13
reference_url http://www.ubuntu.com/usn/USN-2358-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2358-1
14
reference_url http://www.ubuntu.com/usn/USN-2359-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2359-1
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1131951
reference_id 1131951
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1131951
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_real_time_extension:11.0:sp3:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:linux_enterprise_real_time_extension:11.0:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_real_time_extension:11.0:sp3:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.16.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:3.16.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:3.16.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:11:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux_enterprise_server:11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:11:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3601
reference_id CVE-2014-3601
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:A/AC:H/Au:S/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-3601
25
reference_url https://access.redhat.com/errata/RHSA-2014:1392
reference_id RHSA-2014:1392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1392
26
reference_url https://usn.ubuntu.com/2356-1/
reference_id USN-2356-1
reference_type
scores
url https://usn.ubuntu.com/2356-1/
27
reference_url https://usn.ubuntu.com/2357-1/
reference_id USN-2357-1
reference_type
scores
url https://usn.ubuntu.com/2357-1/
28
reference_url https://usn.ubuntu.com/2358-1/
reference_id USN-2358-1
reference_type
scores
url https://usn.ubuntu.com/2358-1/
29
reference_url https://usn.ubuntu.com/2359-1/
reference_id USN-2359-1
reference_type
scores
url https://usn.ubuntu.com/2359-1/
fixed_packages
aliases CVE-2014-3601
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uptx-kfgr-wkgt
10
url VCID-vevd-uruj-fqad
vulnerability_id VCID-vevd-uruj-fqad
summary kernel: ipc: ipc_rcu_putref refcount races
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4483.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4483.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4483
reference_id
reference_type
scores
0
value 0.00092
scoring_system epss
scoring_elements 0.2586
published_at 2026-04-01T12:55:00Z
1
value 0.00092
scoring_system epss
scoring_elements 0.25923
published_at 2026-04-02T12:55:00Z
2
value 0.00092
scoring_system epss
scoring_elements 0.25965
published_at 2026-04-04T12:55:00Z
3
value 0.00092
scoring_system epss
scoring_elements 0.25732
published_at 2026-04-07T12:55:00Z
4
value 0.00092
scoring_system epss
scoring_elements 0.25803
published_at 2026-04-08T12:55:00Z
5
value 0.00092
scoring_system epss
scoring_elements 0.25855
published_at 2026-04-09T12:55:00Z
6
value 0.00092
scoring_system epss
scoring_elements 0.25866
published_at 2026-04-11T12:55:00Z
7
value 0.00092
scoring_system epss
scoring_elements 0.25824
published_at 2026-04-12T12:55:00Z
8
value 0.00092
scoring_system epss
scoring_elements 0.25768
published_at 2026-04-13T12:55:00Z
9
value 0.00092
scoring_system epss
scoring_elements 0.2577
published_at 2026-04-16T12:55:00Z
10
value 0.00092
scoring_system epss
scoring_elements 0.25753
published_at 2026-04-18T12:55:00Z
11
value 0.00092
scoring_system epss
scoring_elements 0.25725
published_at 2026-04-21T12:55:00Z
12
value 0.00092
scoring_system epss
scoring_elements 0.2567
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4483
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4483
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1024854
reference_id 1024854
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1024854
4
reference_url https://access.redhat.com/errata/RHSA-2014:0285
reference_id RHSA-2014:0285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0285
5
reference_url https://access.redhat.com/errata/RHSA-2014:0439
reference_id RHSA-2014:0439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0439
6
reference_url https://access.redhat.com/errata/RHSA-2014:1392
reference_id RHSA-2014:1392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1392
7
reference_url https://access.redhat.com/errata/RHSA-2015:0284
reference_id RHSA-2015:0284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0284
8
reference_url https://usn.ubuntu.com/2221-1/
reference_id USN-2221-1
reference_type
scores
url https://usn.ubuntu.com/2221-1/
9
reference_url https://usn.ubuntu.com/2223-1/
reference_id USN-2223-1
reference_type
scores
url https://usn.ubuntu.com/2223-1/
10
reference_url https://usn.ubuntu.com/2227-1/
reference_id USN-2227-1
reference_type
scores
url https://usn.ubuntu.com/2227-1/
11
reference_url https://usn.ubuntu.com/2233-1/
reference_id USN-2233-1
reference_type
scores
url https://usn.ubuntu.com/2233-1/
12
reference_url https://usn.ubuntu.com/2234-1/
reference_id USN-2234-1
reference_type
scores
url https://usn.ubuntu.com/2234-1/
13
reference_url https://usn.ubuntu.com/2238-1/
reference_id USN-2238-1
reference_type
scores
url https://usn.ubuntu.com/2238-1/
fixed_packages
aliases CVE-2013-4483
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vevd-uruj-fqad
11
url VCID-ynsk-tchm-rfc6
vulnerability_id VCID-ynsk-tchm-rfc6
summary Kernel: net: SCTP: fix a NULL pointer dereference during INIT collisions
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1be9a950c646c9092fb3618197f7b6bfb50e82aa
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1be9a950c646c9092fb3618197f7b6bfb50e82aa
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2014-1083.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1083.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2014-1668.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1668.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2014-1763.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1763.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5077.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5077.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-5077
reference_id
reference_type
scores
0
value 0.12777
scoring_system epss
scoring_elements 0.94034
published_at 2026-04-24T12:55:00Z
1
value 0.12777
scoring_system epss
scoring_elements 0.93973
published_at 2026-04-01T12:55:00Z
2
value 0.12777
scoring_system epss
scoring_elements 0.93983
published_at 2026-04-02T12:55:00Z
3
value 0.12777
scoring_system epss
scoring_elements 0.93992
published_at 2026-04-04T12:55:00Z
4
value 0.12777
scoring_system epss
scoring_elements 0.93995
published_at 2026-04-07T12:55:00Z
5
value 0.12777
scoring_system epss
scoring_elements 0.94004
published_at 2026-04-08T12:55:00Z
6
value 0.12777
scoring_system epss
scoring_elements 0.94007
published_at 2026-04-09T12:55:00Z
7
value 0.12777
scoring_system epss
scoring_elements 0.94012
published_at 2026-04-13T12:55:00Z
8
value 0.12777
scoring_system epss
scoring_elements 0.94027
published_at 2026-04-16T12:55:00Z
9
value 0.12777
scoring_system epss
scoring_elements 0.94032
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-5077
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077
9
reference_url http://secunia.com/advisories/59777
reference_id
reference_type
scores
url http://secunia.com/advisories/59777
10
reference_url http://secunia.com/advisories/60430
reference_id
reference_type
scores
url http://secunia.com/advisories/60430
11
reference_url http://secunia.com/advisories/60545
reference_id
reference_type
scores
url http://secunia.com/advisories/60545
12
reference_url http://secunia.com/advisories/60564
reference_id
reference_type
scores
url http://secunia.com/advisories/60564
13
reference_url http://secunia.com/advisories/60744
reference_id
reference_type
scores
url http://secunia.com/advisories/60744
14
reference_url http://secunia.com/advisories/62563
reference_id
reference_type
scores
url http://secunia.com/advisories/62563
15
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/95134
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/95134
16
reference_url https://github.com/torvalds/linux/commit/1be9a950c646c9092fb3618197f7b6bfb50e82aa
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/1be9a950c646c9092fb3618197f7b6bfb50e82aa
17
reference_url http://www.openwall.com/lists/oss-security/2014/07/26/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/07/26/1
18
reference_url http://www.securityfocus.com/bid/68881
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68881
19
reference_url http://www.securitytracker.com/id/1030681
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030681
20
reference_url http://www.ubuntu.com/usn/USN-2334-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2334-1
21
reference_url http://www.ubuntu.com/usn/USN-2335-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2335-1
22
reference_url http://www.ubuntu.com/usn/USN-2358-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2358-1
23
reference_url http://www.ubuntu.com/usn/USN-2359-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2359-1
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1122982
reference_id 1122982
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1122982
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp3:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
36
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-5077
reference_id CVE-2014-5077
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-5077
37
reference_url https://access.redhat.com/errata/RHSA-2014:1083
reference_id RHSA-2014:1083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1083
38
reference_url https://access.redhat.com/errata/RHSA-2014:1392
reference_id RHSA-2014:1392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1392
39
reference_url https://access.redhat.com/errata/RHSA-2014:1668
reference_id RHSA-2014:1668
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1668
40
reference_url https://access.redhat.com/errata/RHSA-2014:1724
reference_id RHSA-2014:1724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1724
41
reference_url https://access.redhat.com/errata/RHSA-2014:1763
reference_id RHSA-2014:1763
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1763
42
reference_url https://access.redhat.com/errata/RHSA-2014:1872
reference_id RHSA-2014:1872
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1872
43
reference_url https://usn.ubuntu.com/2332-1/
reference_id USN-2332-1
reference_type
scores
url https://usn.ubuntu.com/2332-1/
44
reference_url https://usn.ubuntu.com/2333-1/
reference_id USN-2333-1
reference_type
scores
url https://usn.ubuntu.com/2333-1/
45
reference_url https://usn.ubuntu.com/2334-1/
reference_id USN-2334-1
reference_type
scores
url https://usn.ubuntu.com/2334-1/
46
reference_url https://usn.ubuntu.com/2335-1/
reference_id USN-2335-1
reference_type
scores
url https://usn.ubuntu.com/2335-1/
47
reference_url https://usn.ubuntu.com/2358-1/
reference_id USN-2358-1
reference_type
scores
url https://usn.ubuntu.com/2358-1/
48
reference_url https://usn.ubuntu.com/2359-1/
reference_id USN-2359-1
reference_type
scores
url https://usn.ubuntu.com/2359-1/
fixed_packages
aliases CVE-2014-5077
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ynsk-tchm-rfc6
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.32-504%3Farch=el6