Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/120580?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/120580?format=api", "purl": "pkg:rpm/redhat/kernel@2.6.18-400.1.1?arch=el5", "type": "rpm", "namespace": "redhat", "name": "kernel", "version": "2.6.18-400.1.1", "qualifiers": { "arch": "el5" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86025?format=api", "vulnerability_id": "VCID-nwvc-tydx-zqbu", "summary": "kernel: x86: local privesc due to bad_iret and paranoid entry incompatibility", "references": [ { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6f442be2fb22be02cafa606f1769fa1e6f894441", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6f442be2fb22be02cafa606f1769fa1e6f894441" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" }, { "reference_url": "http://marc.info/?l=bugtraq&m=142722450701342&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=142722450701342&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=142722544401658&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=142722544401658&w=2" }, { "reference_url": "http://osvdb.org/show/osvdb/115919", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/show/osvdb/115919" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1998.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1998.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-2008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-2008.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-2028.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-2028.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-2031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-2031.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-0009.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-0009.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9322.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9322.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9322", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0523", "scoring_system": "epss", "scoring_elements": "0.89916", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0523", "scoring_system": "epss", "scoring_elements": "0.89986", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0523", "scoring_system": "epss", "scoring_elements": "0.8997", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0523", "scoring_system": "epss", "scoring_elements": "0.89987", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0523", "scoring_system": "epss", "scoring_elements": "0.89919", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0523", "scoring_system": "epss", "scoring_elements": "0.89932", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0523", "scoring_system": "epss", "scoring_elements": "0.89938", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0523", "scoring_system": "epss", "scoring_elements": "0.89954", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0523", "scoring_system": "epss", "scoring_elements": "0.8996", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0523", "scoring_system": "epss", "scoring_elements": "0.89968", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0523", "scoring_system": "epss", "scoring_elements": "0.89966", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0523", "scoring_system": "epss", "scoring_elements": "0.89959", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0523", "scoring_system": "epss", "scoring_elements": "0.89973", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0523", "scoring_system": "epss", "scoring_elements": "0.89974", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9322" }, { "reference_url": "http://secunia.com/advisories/62336", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62336" }, { "reference_url": "https://github.com/torvalds/linux/commit/6f442be2fb22be02cafa606f1769fa1e6f894441", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/6f442be2fb22be02cafa606f1769fa1e6f894441" }, { "reference_url": "https://help.joyent.com/entries/98788667-Security-Advisory-ZDI-CAN-3263-ZDI-CAN-3284-and-ZDI-CAN-3364-Vulnerabilities", "reference_id": "", "reference_type": "", "scores": [], "url": "https://help.joyent.com/entries/98788667-Security-Advisory-ZDI-CAN-3263-ZDI-CAN-3284-and-ZDI-CAN-3364-Vulnerabilities" }, { "reference_url": "http://source.android.com/security/bulletin/2016-04-02.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://source.android.com/security/bulletin/2016-04-02.html" }, { "reference_url": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.5", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.5" }, { "reference_url": "http://www.exploit-db.com/exploits/36266", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.exploit-db.com/exploits/36266" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/12/15/6", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/12/15/6" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2491-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2491-1" }, { "reference_url": "http://www.zerodayinitiative.com/advisories/ZDI-16-170", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zerodayinitiative.com/advisories/ZDI-16-170" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1172806", "reference_id": "1172806", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1172806" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp4:*:*:ltss:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp4:*:*:ltss:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp4:*:*:ltss:*:*:*" }, { "reference_url": "https://github.com/RKX1209/CVE-2014-9322/tree/f5a215466ebe007338e845c715228f93232b95eb", "reference_id": "CVE-2014-9322", "reference_type": "exploit", "scores": [], "url": "https://github.com/RKX1209/CVE-2014-9322/tree/f5a215466ebe007338e845c715228f93232b95eb" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44205.md", "reference_id": "CVE-2014-9322", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44205.md" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9322", "reference_id": "CVE-2014-9322", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9322" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/dos/36266.c", "reference_id": "CVE-2014-9322;OSVDB-115919", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/dos/36266.c" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1997", "reference_id": "RHSA-2014:1997", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1997" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1998", "reference_id": "RHSA-2014:1998", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1998" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:2008", "reference_id": "RHSA-2014:2008", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:2008" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:2009", "reference_id": "RHSA-2014:2009", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:2009" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:2010", "reference_id": "RHSA-2014:2010", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:2010" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:2028", "reference_id": "RHSA-2014:2028", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:2028" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:2029", "reference_id": "RHSA-2014:2029", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:2029" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:2030", "reference_id": "RHSA-2014:2030", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:2030" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:2031", "reference_id": "RHSA-2014:2031", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:2031" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0009", "reference_id": "RHSA-2015:0009", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0009" }, { "reference_url": "https://usn.ubuntu.com/2443-1/", "reference_id": "USN-2443-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2443-1/" }, { "reference_url": "https://usn.ubuntu.com/2445-1/", "reference_id": "USN-2445-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2445-1/" }, { "reference_url": "https://usn.ubuntu.com/2446-1/", "reference_id": "USN-2446-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2446-1/" }, { "reference_url": "https://usn.ubuntu.com/2447-1/", "reference_id": "USN-2447-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2447-1/" }, { "reference_url": "https://usn.ubuntu.com/2448-1/", "reference_id": "USN-2448-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2448-1/" }, { "reference_url": "https://usn.ubuntu.com/2462-1/", "reference_id": "USN-2462-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2462-1/" }, { "reference_url": "https://usn.ubuntu.com/2464-1/", "reference_id": "USN-2464-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2464-1/" }, { "reference_url": "https://usn.ubuntu.com/2491-1/", "reference_id": "USN-2491-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2491-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-9322" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nwvc-tydx-zqbu" } ], "fixing_vulnerabilities": [], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.18-400.1.1%3Farch=el5" }