Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@3.10.0-123.6.3?arch=el7
Typerpm
Namespaceredhat
Namekernel
Version3.10.0-123.6.3
Qualifiers
arch el7
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-3hq3-npb3-wqau
vulnerability_id VCID-3hq3-npb3-wqau
summary kernel: net: insufficient permision checks of netlink messages
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0181.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0181.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0181
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04668
published_at 2026-04-18T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.06902
published_at 2026-04-21T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06887
published_at 2026-04-24T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07566
published_at 2026-04-07T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07624
published_at 2026-04-08T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07642
published_at 2026-04-11T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07433
published_at 2026-04-01T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07615
published_at 2026-04-13T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.0754
published_at 2026-04-16T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07629
published_at 2026-04-12T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07548
published_at 2026-04-02T12:55:00Z
11
value 0.00027
scoring_system epss
scoring_elements 0.0759
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0181
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0181
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1094265
reference_id 1094265
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1094265
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746738
reference_id 746738
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746738
5
reference_url https://access.redhat.com/errata/RHSA-2014:0913
reference_id RHSA-2014:0913
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0913
6
reference_url https://access.redhat.com/errata/RHSA-2014:1023
reference_id RHSA-2014:1023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1023
7
reference_url https://access.redhat.com/errata/RHSA-2014:1392
reference_id RHSA-2014:1392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1392
8
reference_url https://access.redhat.com/errata/RHSA-2014:1959
reference_id RHSA-2014:1959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1959
9
reference_url https://usn.ubuntu.com/2336-1/
reference_id USN-2336-1
reference_type
scores
url https://usn.ubuntu.com/2336-1/
10
reference_url https://usn.ubuntu.com/2337-1/
reference_id USN-2337-1
reference_type
scores
url https://usn.ubuntu.com/2337-1/
fixed_packages
aliases CVE-2014-0181
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3hq3-npb3-wqau
1
url VCID-7yup-xt8w-pqhd
vulnerability_id VCID-7yup-xt8w-pqhd
summary kernel: ath9k: tid->sched race in ath_tx_aggr_sleep()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2672.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2672.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2672
reference_id
reference_type
scores
0
value 0.00666
scoring_system epss
scoring_elements 0.71185
published_at 2026-04-01T12:55:00Z
1
value 0.00666
scoring_system epss
scoring_elements 0.71194
published_at 2026-04-02T12:55:00Z
2
value 0.00666
scoring_system epss
scoring_elements 0.71212
published_at 2026-04-04T12:55:00Z
3
value 0.00666
scoring_system epss
scoring_elements 0.71187
published_at 2026-04-07T12:55:00Z
4
value 0.00666
scoring_system epss
scoring_elements 0.71229
published_at 2026-04-08T12:55:00Z
5
value 0.00666
scoring_system epss
scoring_elements 0.71244
published_at 2026-04-09T12:55:00Z
6
value 0.00666
scoring_system epss
scoring_elements 0.71266
published_at 2026-04-11T12:55:00Z
7
value 0.00666
scoring_system epss
scoring_elements 0.71251
published_at 2026-04-12T12:55:00Z
8
value 0.00666
scoring_system epss
scoring_elements 0.71236
published_at 2026-04-13T12:55:00Z
9
value 0.00666
scoring_system epss
scoring_elements 0.71282
published_at 2026-04-16T12:55:00Z
10
value 0.00666
scoring_system epss
scoring_elements 0.71288
published_at 2026-04-18T12:55:00Z
11
value 0.00666
scoring_system epss
scoring_elements 0.71265
published_at 2026-04-21T12:55:00Z
12
value 0.00666
scoring_system epss
scoring_elements 0.71318
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2672
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2672
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1083246
reference_id 1083246
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1083246
4
reference_url https://access.redhat.com/errata/RHSA-2014:0557
reference_id RHSA-2014:0557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0557
5
reference_url https://access.redhat.com/errata/RHSA-2014:0981
reference_id RHSA-2014:0981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0981
6
reference_url https://access.redhat.com/errata/RHSA-2014:1023
reference_id RHSA-2014:1023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1023
7
reference_url https://access.redhat.com/errata/RHSA-2014:1101
reference_id RHSA-2014:1101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1101
8
reference_url https://usn.ubuntu.com/2221-1/
reference_id USN-2221-1
reference_type
scores
url https://usn.ubuntu.com/2221-1/
9
reference_url https://usn.ubuntu.com/2223-1/
reference_id USN-2223-1
reference_type
scores
url https://usn.ubuntu.com/2223-1/
10
reference_url https://usn.ubuntu.com/2224-1/
reference_id USN-2224-1
reference_type
scores
url https://usn.ubuntu.com/2224-1/
11
reference_url https://usn.ubuntu.com/2225-1/
reference_id USN-2225-1
reference_type
scores
url https://usn.ubuntu.com/2225-1/
12
reference_url https://usn.ubuntu.com/2227-1/
reference_id USN-2227-1
reference_type
scores
url https://usn.ubuntu.com/2227-1/
13
reference_url https://usn.ubuntu.com/2228-1/
reference_id USN-2228-1
reference_type
scores
url https://usn.ubuntu.com/2228-1/
fixed_packages
aliases CVE-2014-2672
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7yup-xt8w-pqhd
2
url VCID-e5ch-tsab-k7b2
vulnerability_id VCID-e5ch-tsab-k7b2
summary security update
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=dab6cf55f81a6e16b8147aed9a843e1691dcd318
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=dab6cf55f81a6e16b8147aed9a843e1691dcd318
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3534.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3534.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3534
reference_id
reference_type
scores
0
value 0.00074
scoring_system epss
scoring_elements 0.22122
published_at 2026-04-24T12:55:00Z
1
value 0.00074
scoring_system epss
scoring_elements 0.22255
published_at 2026-04-07T12:55:00Z
2
value 0.00074
scoring_system epss
scoring_elements 0.22422
published_at 2026-04-02T12:55:00Z
3
value 0.00074
scoring_system epss
scoring_elements 0.22467
published_at 2026-04-04T12:55:00Z
4
value 0.00074
scoring_system epss
scoring_elements 0.22338
published_at 2026-04-08T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.22393
published_at 2026-04-09T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22413
published_at 2026-04-11T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.22372
published_at 2026-04-12T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22314
published_at 2026-04-13T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.22329
published_at 2026-04-16T12:55:00Z
10
value 0.00074
scoring_system epss
scoring_elements 0.22322
published_at 2026-04-18T12:55:00Z
11
value 0.00074
scoring_system epss
scoring_elements 0.22271
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3534
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3534
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3534
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943
6
reference_url http://secunia.com/advisories/59790
reference_id
reference_type
scores
url http://secunia.com/advisories/59790
7
reference_url http://secunia.com/advisories/60351
reference_id
reference_type
scores
url http://secunia.com/advisories/60351
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/95069
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/95069
9
reference_url https://github.com/torvalds/linux/commit/dab6cf55f81a6e16b8147aed9a843e1691dcd318
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/dab6cf55f81a6e16b8147aed9a843e1691dcd318
10
reference_url http://www.debian.org/security/2014/dsa-2992
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-2992
11
reference_url http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.8
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.8
12
reference_url http://www.osvdb.org/109546
reference_id
reference_type
scores
url http://www.osvdb.org/109546
13
reference_url http://www.securityfocus.com/bid/68940
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68940
14
reference_url http://www.securitytracker.com/id/1030683
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030683
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1114089
reference_id 1114089
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1114089
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=728705
reference_id 728705
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=728705
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3534
reference_id CVE-2014-3534
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-3534
20
reference_url https://access.redhat.com/errata/RHSA-2014:1023
reference_id RHSA-2014:1023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1023
fixed_packages
aliases CVE-2014-3534
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e5ch-tsab-k7b2
3
url VCID-eea8-ay16-xbam
vulnerability_id VCID-eea8-ay16-xbam
summary kernel: powerpc: tm: crash when forking inside a transaction
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2673.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2673.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2673
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.11996
published_at 2026-04-01T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.12109
published_at 2026-04-02T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.12155
published_at 2026-04-04T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.11959
published_at 2026-04-07T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.12041
published_at 2026-04-08T12:55:00Z
5
value 0.0004
scoring_system epss
scoring_elements 0.12093
published_at 2026-04-09T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.12101
published_at 2026-04-11T12:55:00Z
7
value 0.0004
scoring_system epss
scoring_elements 0.12064
published_at 2026-04-12T12:55:00Z
8
value 0.0004
scoring_system epss
scoring_elements 0.12035
published_at 2026-04-13T12:55:00Z
9
value 0.0004
scoring_system epss
scoring_elements 0.11907
published_at 2026-04-16T12:55:00Z
10
value 0.0004
scoring_system epss
scoring_elements 0.11903
published_at 2026-04-18T12:55:00Z
11
value 0.0004
scoring_system epss
scoring_elements 0.12023
published_at 2026-04-21T12:55:00Z
12
value 0.0004
scoring_system epss
scoring_elements 0.11999
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2673
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2673
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1083213
reference_id 1083213
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1083213
4
reference_url https://access.redhat.com/errata/RHSA-2014:1023
reference_id RHSA-2014:1023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1023
5
reference_url https://usn.ubuntu.com/2225-1/
reference_id USN-2225-1
reference_type
scores
url https://usn.ubuntu.com/2225-1/
6
reference_url https://usn.ubuntu.com/2228-1/
reference_id USN-2228-1
reference_type
scores
url https://usn.ubuntu.com/2228-1/
fixed_packages
aliases CVE-2014-2673
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eea8-ay16-xbam
4
url VCID-frqh-5rwt-9feq
vulnerability_id VCID-frqh-5rwt-9feq
summary security update
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d3217b15a19a4779c39b212358a5c71d725822ee
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d3217b15a19a4779c39b212358a5c71d725822ee
1
reference_url http://linux.oracle.com/errata/ELSA-2014-3068.html
reference_id
reference_type
scores
url http://linux.oracle.com/errata/ELSA-2014-3068.html
2
reference_url http://linux.oracle.com/errata/ELSA-2014-3069.html
reference_id
reference_type
scores
url http://linux.oracle.com/errata/ELSA-2014-3069.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4667.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4667.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-4667
reference_id
reference_type
scores
0
value 0.14138
scoring_system epss
scoring_elements 0.94391
published_at 2026-04-24T12:55:00Z
1
value 0.14138
scoring_system epss
scoring_elements 0.94327
published_at 2026-04-01T12:55:00Z
2
value 0.14138
scoring_system epss
scoring_elements 0.94337
published_at 2026-04-02T12:55:00Z
3
value 0.14138
scoring_system epss
scoring_elements 0.94347
published_at 2026-04-04T12:55:00Z
4
value 0.14138
scoring_system epss
scoring_elements 0.94348
published_at 2026-04-07T12:55:00Z
5
value 0.14138
scoring_system epss
scoring_elements 0.94358
published_at 2026-04-08T12:55:00Z
6
value 0.14138
scoring_system epss
scoring_elements 0.94362
published_at 2026-04-09T12:55:00Z
7
value 0.14138
scoring_system epss
scoring_elements 0.94365
published_at 2026-04-11T12:55:00Z
8
value 0.14138
scoring_system epss
scoring_elements 0.94366
published_at 2026-04-12T12:55:00Z
9
value 0.14138
scoring_system epss
scoring_elements 0.94367
published_at 2026-04-13T12:55:00Z
10
value 0.14138
scoring_system epss
scoring_elements 0.94382
published_at 2026-04-16T12:55:00Z
11
value 0.14138
scoring_system epss
scoring_elements 0.94388
published_at 2026-04-18T12:55:00Z
12
value 0.14138
scoring_system epss
scoring_elements 0.9439
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-4667
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3534
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3534
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943
11
reference_url http://secunia.com/advisories/59777
reference_id
reference_type
scores
url http://secunia.com/advisories/59777
12
reference_url http://secunia.com/advisories/59790
reference_id
reference_type
scores
url http://secunia.com/advisories/59790
13
reference_url http://secunia.com/advisories/60564
reference_id
reference_type
scores
url http://secunia.com/advisories/60564
14
reference_url http://secunia.com/advisories/60596
reference_id
reference_type
scores
url http://secunia.com/advisories/60596
15
reference_url https://github.com/torvalds/linux/commit/d3217b15a19a4779c39b212358a5c71d725822ee
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/d3217b15a19a4779c39b212358a5c71d725822ee
16
reference_url http://www.debian.org/security/2014/dsa-2992
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-2992
17
reference_url http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2
18
reference_url http://www.openwall.com/lists/oss-security/2014/06/27/11
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/06/27/11
19
reference_url http://www.securityfocus.com/bid/68224
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68224
20
reference_url http://www.ubuntu.com/usn/USN-2334-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2334-1
21
reference_url http://www.ubuntu.com/usn/USN-2335-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2335-1
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1113967
reference_id 1113967
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1113967
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp3:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
31
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-4667
reference_id CVE-2014-4667
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-4667
32
reference_url https://access.redhat.com/errata/RHSA-2014:0913
reference_id RHSA-2014:0913
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0913
33
reference_url https://access.redhat.com/errata/RHSA-2014:1023
reference_id RHSA-2014:1023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1023
34
reference_url https://access.redhat.com/errata/RHSA-2014:1167
reference_id RHSA-2014:1167
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1167
35
reference_url https://usn.ubuntu.com/2332-1/
reference_id USN-2332-1
reference_type
scores
url https://usn.ubuntu.com/2332-1/
36
reference_url https://usn.ubuntu.com/2333-1/
reference_id USN-2333-1
reference_type
scores
url https://usn.ubuntu.com/2333-1/
37
reference_url https://usn.ubuntu.com/2334-1/
reference_id USN-2334-1
reference_type
scores
url https://usn.ubuntu.com/2334-1/
38
reference_url https://usn.ubuntu.com/2335-1/
reference_id USN-2335-1
reference_type
scores
url https://usn.ubuntu.com/2335-1/
39
reference_url https://usn.ubuntu.com/2336-1/
reference_id USN-2336-1
reference_type
scores
url https://usn.ubuntu.com/2336-1/
40
reference_url https://usn.ubuntu.com/2337-1/
reference_id USN-2337-1
reference_type
scores
url https://usn.ubuntu.com/2337-1/
fixed_packages
aliases CVE-2014-4667
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-frqh-5rwt-9feq
5
url VCID-js1d-vcnb-gyev
vulnerability_id VCID-js1d-vcnb-gyev
summary Kernel: net: mac80211: crash dues to AP powersave TX vs. wakeup race
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2706.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2706.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2706
reference_id
reference_type
scores
0
value 0.03101
scoring_system epss
scoring_elements 0.86744
published_at 2026-04-01T12:55:00Z
1
value 0.03101
scoring_system epss
scoring_elements 0.86754
published_at 2026-04-02T12:55:00Z
2
value 0.03101
scoring_system epss
scoring_elements 0.86774
published_at 2026-04-04T12:55:00Z
3
value 0.03101
scoring_system epss
scoring_elements 0.86771
published_at 2026-04-07T12:55:00Z
4
value 0.03101
scoring_system epss
scoring_elements 0.86791
published_at 2026-04-08T12:55:00Z
5
value 0.03101
scoring_system epss
scoring_elements 0.868
published_at 2026-04-09T12:55:00Z
6
value 0.03101
scoring_system epss
scoring_elements 0.86813
published_at 2026-04-11T12:55:00Z
7
value 0.03101
scoring_system epss
scoring_elements 0.8681
published_at 2026-04-12T12:55:00Z
8
value 0.03101
scoring_system epss
scoring_elements 0.86805
published_at 2026-04-13T12:55:00Z
9
value 0.03101
scoring_system epss
scoring_elements 0.86821
published_at 2026-04-16T12:55:00Z
10
value 0.03101
scoring_system epss
scoring_elements 0.86825
published_at 2026-04-18T12:55:00Z
11
value 0.03101
scoring_system epss
scoring_elements 0.86823
published_at 2026-04-21T12:55:00Z
12
value 0.03101
scoring_system epss
scoring_elements 0.8684
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2706
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1083512
reference_id 1083512
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1083512
4
reference_url https://access.redhat.com/errata/RHSA-2014:0557
reference_id RHSA-2014:0557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0557
5
reference_url https://access.redhat.com/errata/RHSA-2014:0981
reference_id RHSA-2014:0981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0981
6
reference_url https://access.redhat.com/errata/RHSA-2014:1023
reference_id RHSA-2014:1023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1023
7
reference_url https://access.redhat.com/errata/RHSA-2014:1101
reference_id RHSA-2014:1101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1101
8
reference_url https://usn.ubuntu.com/2221-1/
reference_id USN-2221-1
reference_type
scores
url https://usn.ubuntu.com/2221-1/
9
reference_url https://usn.ubuntu.com/2223-1/
reference_id USN-2223-1
reference_type
scores
url https://usn.ubuntu.com/2223-1/
10
reference_url https://usn.ubuntu.com/2224-1/
reference_id USN-2224-1
reference_type
scores
url https://usn.ubuntu.com/2224-1/
11
reference_url https://usn.ubuntu.com/2225-1/
reference_id USN-2225-1
reference_type
scores
url https://usn.ubuntu.com/2225-1/
12
reference_url https://usn.ubuntu.com/2227-1/
reference_id USN-2227-1
reference_type
scores
url https://usn.ubuntu.com/2227-1/
13
reference_url https://usn.ubuntu.com/2228-1/
reference_id USN-2228-1
reference_type
scores
url https://usn.ubuntu.com/2228-1/
fixed_packages
aliases CVE-2014-2706
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-js1d-vcnb-gyev
Fixing_vulnerabilities
Risk_score3.2
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@3.10.0-123.6.3%3Farch=el7