Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel-rt@3.10.33-rt32.45?arch=el6rt
Typerpm
Namespaceredhat
Namekernel-rt
Version3.10.33-rt32.45
Qualifiers
arch el6rt
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-2u1h-vvyb-rkeb
vulnerability_id VCID-2u1h-vvyb-rkeb
summary Kernel: ALSA: control: protect user controls against races & memory disclosure
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=07f4d9d74a04aa7c72c5dae0ef97565f28f17b92
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=07f4d9d74a04aa7c72c5dae0ef97565f28f17b92
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2014-1083.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1083.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2015-1272.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1272.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4652.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4652.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-4652
reference_id
reference_type
scores
0
value 0.00051
scoring_system epss
scoring_elements 0.15764
published_at 2026-04-24T12:55:00Z
1
value 0.00051
scoring_system epss
scoring_elements 0.15829
published_at 2026-04-01T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.15895
published_at 2026-04-02T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.15957
published_at 2026-04-04T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.15757
published_at 2026-04-07T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.15842
published_at 2026-04-08T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.15903
published_at 2026-04-09T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.15877
published_at 2026-04-11T12:55:00Z
8
value 0.00051
scoring_system epss
scoring_elements 0.15839
published_at 2026-04-12T12:55:00Z
9
value 0.00051
scoring_system epss
scoring_elements 0.1577
published_at 2026-04-13T12:55:00Z
10
value 0.00051
scoring_system epss
scoring_elements 0.15692
published_at 2026-04-16T12:55:00Z
11
value 0.00051
scoring_system epss
scoring_elements 0.15702
published_at 2026-04-18T12:55:00Z
12
value 0.00051
scoring_system epss
scoring_elements 0.15748
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-4652
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4652
7
reference_url http://secunia.com/advisories/59434
reference_id
reference_type
scores
url http://secunia.com/advisories/59434
8
reference_url http://secunia.com/advisories/59777
reference_id
reference_type
scores
url http://secunia.com/advisories/59777
9
reference_url http://secunia.com/advisories/60545
reference_id
reference_type
scores
url http://secunia.com/advisories/60545
10
reference_url http://secunia.com/advisories/60564
reference_id
reference_type
scores
url http://secunia.com/advisories/60564
11
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/94412
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/94412
12
reference_url https://github.com/torvalds/linux/commit/07f4d9d74a04aa7c72c5dae0ef97565f28f17b92
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/07f4d9d74a04aa7c72c5dae0ef97565f28f17b92
13
reference_url http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2
14
reference_url http://www.openwall.com/lists/oss-security/2014/06/26/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/06/26/6
15
reference_url http://www.ubuntu.com/usn/USN-2334-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2334-1
16
reference_url http://www.ubuntu.com/usn/USN-2335-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2335-1
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1113406
reference_id 1113406
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1113406
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-4652
reference_id CVE-2014-4652
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-4652
25
reference_url https://access.redhat.com/errata/RHSA-2014:1083
reference_id RHSA-2014:1083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1083
26
reference_url https://access.redhat.com/errata/RHSA-2014:1971
reference_id RHSA-2014:1971
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1971
27
reference_url https://access.redhat.com/errata/RHSA-2015:1272
reference_id RHSA-2015:1272
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1272
28
reference_url https://usn.ubuntu.com/2332-1/
reference_id USN-2332-1
reference_type
scores
url https://usn.ubuntu.com/2332-1/
29
reference_url https://usn.ubuntu.com/2333-1/
reference_id USN-2333-1
reference_type
scores
url https://usn.ubuntu.com/2333-1/
30
reference_url https://usn.ubuntu.com/2334-1/
reference_id USN-2334-1
reference_type
scores
url https://usn.ubuntu.com/2334-1/
31
reference_url https://usn.ubuntu.com/2335-1/
reference_id USN-2335-1
reference_type
scores
url https://usn.ubuntu.com/2335-1/
32
reference_url https://usn.ubuntu.com/2336-1/
reference_id USN-2336-1
reference_type
scores
url https://usn.ubuntu.com/2336-1/
33
reference_url https://usn.ubuntu.com/2337-1/
reference_id USN-2337-1
reference_type
scores
url https://usn.ubuntu.com/2337-1/
fixed_packages
aliases CVE-2014-4652
risk_score 0.8
exploitability 0.5
weighted_severity 1.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2u1h-vvyb-rkeb
1
url VCID-bxc1-te21-3qfg
vulnerability_id VCID-bxc1-te21-3qfg
summary Kernel: ALSA: control: use-after-free in replacing user controls
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=82262a46627bebb0febcc26664746c25cef08563
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=82262a46627bebb0febcc26664746c25cef08563
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2014-1083.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1083.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4654.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4654.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-4654
reference_id
reference_type
scores
0
value 0.00066
scoring_system epss
scoring_elements 0.20397
published_at 2026-04-24T12:55:00Z
1
value 0.00066
scoring_system epss
scoring_elements 0.20545
published_at 2026-04-08T12:55:00Z
2
value 0.00066
scoring_system epss
scoring_elements 0.2069
published_at 2026-04-02T12:55:00Z
3
value 0.00066
scoring_system epss
scoring_elements 0.2075
published_at 2026-04-04T12:55:00Z
4
value 0.00066
scoring_system epss
scoring_elements 0.20467
published_at 2026-04-07T12:55:00Z
5
value 0.00066
scoring_system epss
scoring_elements 0.20604
published_at 2026-04-09T12:55:00Z
6
value 0.00066
scoring_system epss
scoring_elements 0.20623
published_at 2026-04-11T12:55:00Z
7
value 0.00066
scoring_system epss
scoring_elements 0.20581
published_at 2026-04-12T12:55:00Z
8
value 0.00066
scoring_system epss
scoring_elements 0.20528
published_at 2026-04-13T12:55:00Z
9
value 0.00066
scoring_system epss
scoring_elements 0.20514
published_at 2026-04-16T12:55:00Z
10
value 0.00066
scoring_system epss
scoring_elements 0.20513
published_at 2026-04-18T12:55:00Z
11
value 0.00066
scoring_system epss
scoring_elements 0.2051
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-4654
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4654
6
reference_url http://secunia.com/advisories/59434
reference_id
reference_type
scores
url http://secunia.com/advisories/59434
7
reference_url http://secunia.com/advisories/59777
reference_id
reference_type
scores
url http://secunia.com/advisories/59777
8
reference_url http://secunia.com/advisories/60545
reference_id
reference_type
scores
url http://secunia.com/advisories/60545
9
reference_url http://secunia.com/advisories/60564
reference_id
reference_type
scores
url http://secunia.com/advisories/60564
10
reference_url https://github.com/torvalds/linux/commit/82262a46627bebb0febcc26664746c25cef08563
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/82262a46627bebb0febcc26664746c25cef08563
11
reference_url http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2
12
reference_url http://www.openwall.com/lists/oss-security/2014/06/26/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/06/26/6
13
reference_url http://www.securityfocus.com/bid/68162
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68162
14
reference_url http://www.ubuntu.com/usn/USN-2334-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2334-1
15
reference_url http://www.ubuntu.com/usn/USN-2335-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2335-1
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1113445
reference_id 1113445
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1113445
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-4654
reference_id CVE-2014-4654
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-4654
21
reference_url https://access.redhat.com/errata/RHSA-2014:1083
reference_id RHSA-2014:1083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1083
22
reference_url https://access.redhat.com/errata/RHSA-2014:1392
reference_id RHSA-2014:1392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1392
23
reference_url https://access.redhat.com/errata/RHSA-2014:1971
reference_id RHSA-2014:1971
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1971
24
reference_url https://usn.ubuntu.com/2332-1/
reference_id USN-2332-1
reference_type
scores
url https://usn.ubuntu.com/2332-1/
25
reference_url https://usn.ubuntu.com/2333-1/
reference_id USN-2333-1
reference_type
scores
url https://usn.ubuntu.com/2333-1/
26
reference_url https://usn.ubuntu.com/2334-1/
reference_id USN-2334-1
reference_type
scores
url https://usn.ubuntu.com/2334-1/
27
reference_url https://usn.ubuntu.com/2335-1/
reference_id USN-2335-1
reference_type
scores
url https://usn.ubuntu.com/2335-1/
28
reference_url https://usn.ubuntu.com/2336-1/
reference_id USN-2336-1
reference_type
scores
url https://usn.ubuntu.com/2336-1/
29
reference_url https://usn.ubuntu.com/2337-1/
reference_id USN-2337-1
reference_type
scores
url https://usn.ubuntu.com/2337-1/
fixed_packages
aliases CVE-2014-4654
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bxc1-te21-3qfg
2
url VCID-g34p-wkr7-aucq
vulnerability_id VCID-g34p-wkr7-aucq
summary Kernel: ALSA: control: integer overflow in id.index & id.numid
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=883a1d49f0d77d30012f114b2e19fc141beb3e8e
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=883a1d49f0d77d30012f114b2e19fc141beb3e8e
1
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ac902c112d90a89e59916f751c2745f4dbdbb4bd
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ac902c112d90a89e59916f751c2745f4dbdbb4bd
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2014-1083.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1083.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2015-0087.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0087.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4656.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4656.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-4656
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22486
published_at 2026-04-24T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22617
published_at 2026-04-01T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22791
published_at 2026-04-02T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22835
published_at 2026-04-04T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22624
published_at 2026-04-07T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.227
published_at 2026-04-08T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.2275
published_at 2026-04-09T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22772
published_at 2026-04-11T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22734
published_at 2026-04-12T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.22677
published_at 2026-04-13T12:55:00Z
10
value 0.00075
scoring_system epss
scoring_elements 0.22693
published_at 2026-04-16T12:55:00Z
11
value 0.00075
scoring_system epss
scoring_elements 0.22691
published_at 2026-04-18T12:55:00Z
12
value 0.00075
scoring_system epss
scoring_elements 0.22642
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-4656
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4656
8
reference_url http://secunia.com/advisories/59434
reference_id
reference_type
scores
url http://secunia.com/advisories/59434
9
reference_url http://secunia.com/advisories/59777
reference_id
reference_type
scores
url http://secunia.com/advisories/59777
10
reference_url http://secunia.com/advisories/60545
reference_id
reference_type
scores
url http://secunia.com/advisories/60545
11
reference_url http://secunia.com/advisories/60564
reference_id
reference_type
scores
url http://secunia.com/advisories/60564
12
reference_url https://github.com/torvalds/linux/commit/883a1d49f0d77d30012f114b2e19fc141beb3e8e
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/883a1d49f0d77d30012f114b2e19fc141beb3e8e
13
reference_url https://github.com/torvalds/linux/commit/ac902c112d90a89e59916f751c2745f4dbdbb4bd
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/ac902c112d90a89e59916f751c2745f4dbdbb4bd
14
reference_url https://source.android.com/security/bulletin/2017-04-01
reference_id
reference_type
scores
url https://source.android.com/security/bulletin/2017-04-01
15
reference_url http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2
16
reference_url http://www.openwall.com/lists/oss-security/2014/06/26/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/06/26/6
17
reference_url http://www.securitytracker.com/id/1038201
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038201
18
reference_url http://www.ubuntu.com/usn/USN-2334-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2334-1
19
reference_url http://www.ubuntu.com/usn/USN-2335-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2335-1
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1113470
reference_id 1113470
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1113470
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-4656
reference_id CVE-2014-4656
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-4656
31
reference_url https://access.redhat.com/errata/RHSA-2014:1083
reference_id RHSA-2014:1083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1083
32
reference_url https://access.redhat.com/errata/RHSA-2014:1971
reference_id RHSA-2014:1971
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1971
33
reference_url https://access.redhat.com/errata/RHSA-2015:0087
reference_id RHSA-2015:0087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0087
34
reference_url https://usn.ubuntu.com/2332-1/
reference_id USN-2332-1
reference_type
scores
url https://usn.ubuntu.com/2332-1/
35
reference_url https://usn.ubuntu.com/2333-1/
reference_id USN-2333-1
reference_type
scores
url https://usn.ubuntu.com/2333-1/
36
reference_url https://usn.ubuntu.com/2334-1/
reference_id USN-2334-1
reference_type
scores
url https://usn.ubuntu.com/2334-1/
37
reference_url https://usn.ubuntu.com/2335-1/
reference_id USN-2335-1
reference_type
scores
url https://usn.ubuntu.com/2335-1/
38
reference_url https://usn.ubuntu.com/2336-1/
reference_id USN-2336-1
reference_type
scores
url https://usn.ubuntu.com/2336-1/
39
reference_url https://usn.ubuntu.com/2337-1/
reference_id USN-2337-1
reference_type
scores
url https://usn.ubuntu.com/2337-1/
fixed_packages
aliases CVE-2014-4656
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g34p-wkr7-aucq
3
url VCID-s6h8-2mdq-63ea
vulnerability_id VCID-s6h8-2mdq-63ea
summary Kernel: ALSA: control: do not access controls outside of protected regions
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fd9f26e4eca5d08a27d12c0933fceef76ed9663d
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fd9f26e4eca5d08a27d12c0933fceef76ed9663d
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2014-1083.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1083.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4653.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4653.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-4653
reference_id
reference_type
scores
0
value 0.00066
scoring_system epss
scoring_elements 0.20397
published_at 2026-04-24T12:55:00Z
1
value 0.00066
scoring_system epss
scoring_elements 0.20545
published_at 2026-04-08T12:55:00Z
2
value 0.00066
scoring_system epss
scoring_elements 0.2069
published_at 2026-04-02T12:55:00Z
3
value 0.00066
scoring_system epss
scoring_elements 0.2075
published_at 2026-04-04T12:55:00Z
4
value 0.00066
scoring_system epss
scoring_elements 0.20467
published_at 2026-04-07T12:55:00Z
5
value 0.00066
scoring_system epss
scoring_elements 0.20604
published_at 2026-04-09T12:55:00Z
6
value 0.00066
scoring_system epss
scoring_elements 0.20623
published_at 2026-04-11T12:55:00Z
7
value 0.00066
scoring_system epss
scoring_elements 0.20581
published_at 2026-04-12T12:55:00Z
8
value 0.00066
scoring_system epss
scoring_elements 0.20528
published_at 2026-04-13T12:55:00Z
9
value 0.00066
scoring_system epss
scoring_elements 0.20514
published_at 2026-04-16T12:55:00Z
10
value 0.00066
scoring_system epss
scoring_elements 0.20513
published_at 2026-04-18T12:55:00Z
11
value 0.00066
scoring_system epss
scoring_elements 0.2051
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-4653
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4653
6
reference_url http://secunia.com/advisories/59434
reference_id
reference_type
scores
url http://secunia.com/advisories/59434
7
reference_url http://secunia.com/advisories/59777
reference_id
reference_type
scores
url http://secunia.com/advisories/59777
8
reference_url http://secunia.com/advisories/60545
reference_id
reference_type
scores
url http://secunia.com/advisories/60545
9
reference_url http://secunia.com/advisories/60564
reference_id
reference_type
scores
url http://secunia.com/advisories/60564
10
reference_url https://github.com/torvalds/linux/commit/fd9f26e4eca5d08a27d12c0933fceef76ed9663d
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/fd9f26e4eca5d08a27d12c0933fceef76ed9663d
11
reference_url http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2
12
reference_url http://www.openwall.com/lists/oss-security/2014/06/26/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/06/26/6
13
reference_url http://www.securityfocus.com/bid/68164
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68164
14
reference_url http://www.ubuntu.com/usn/USN-2334-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2334-1
15
reference_url http://www.ubuntu.com/usn/USN-2335-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2335-1
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1113409
reference_id 1113409
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1113409
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-4653
reference_id CVE-2014-4653
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-4653
21
reference_url https://access.redhat.com/errata/RHSA-2014:1083
reference_id RHSA-2014:1083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1083
22
reference_url https://access.redhat.com/errata/RHSA-2014:1392
reference_id RHSA-2014:1392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1392
23
reference_url https://access.redhat.com/errata/RHSA-2014:1724
reference_id RHSA-2014:1724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1724
24
reference_url https://usn.ubuntu.com/2332-1/
reference_id USN-2332-1
reference_type
scores
url https://usn.ubuntu.com/2332-1/
25
reference_url https://usn.ubuntu.com/2333-1/
reference_id USN-2333-1
reference_type
scores
url https://usn.ubuntu.com/2333-1/
26
reference_url https://usn.ubuntu.com/2334-1/
reference_id USN-2334-1
reference_type
scores
url https://usn.ubuntu.com/2334-1/
27
reference_url https://usn.ubuntu.com/2335-1/
reference_id USN-2335-1
reference_type
scores
url https://usn.ubuntu.com/2335-1/
28
reference_url https://usn.ubuntu.com/2336-1/
reference_id USN-2336-1
reference_type
scores
url https://usn.ubuntu.com/2336-1/
29
reference_url https://usn.ubuntu.com/2337-1/
reference_id USN-2337-1
reference_type
scores
url https://usn.ubuntu.com/2337-1/
fixed_packages
aliases CVE-2014-4653
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s6h8-2mdq-63ea
4
url VCID-ssk8-9z69-mfez
vulnerability_id VCID-ssk8-9z69-mfez
summary Kernel: ALSA: control: use-after-free in replacing user controls
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=82262a46627bebb0febcc26664746c25cef08563
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=82262a46627bebb0febcc26664746c25cef08563
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2014-1083.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1083.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4655.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4655.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-4655
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11259
published_at 2026-04-24T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11248
published_at 2026-04-01T12:55:00Z
2
value 0.00038
scoring_system epss
scoring_elements 0.11396
published_at 2026-04-02T12:55:00Z
3
value 0.00038
scoring_system epss
scoring_elements 0.11453
published_at 2026-04-04T12:55:00Z
4
value 0.00038
scoring_system epss
scoring_elements 0.11245
published_at 2026-04-07T12:55:00Z
5
value 0.00038
scoring_system epss
scoring_elements 0.11327
published_at 2026-04-08T12:55:00Z
6
value 0.00038
scoring_system epss
scoring_elements 0.11381
published_at 2026-04-09T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.11388
published_at 2026-04-11T12:55:00Z
8
value 0.00038
scoring_system epss
scoring_elements 0.11354
published_at 2026-04-12T12:55:00Z
9
value 0.00038
scoring_system epss
scoring_elements 0.11325
published_at 2026-04-13T12:55:00Z
10
value 0.00038
scoring_system epss
scoring_elements 0.11188
published_at 2026-04-16T12:55:00Z
11
value 0.00038
scoring_system epss
scoring_elements 0.1119
published_at 2026-04-18T12:55:00Z
12
value 0.00038
scoring_system epss
scoring_elements 0.11319
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-4655
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4655
6
reference_url http://secunia.com/advisories/59434
reference_id
reference_type
scores
url http://secunia.com/advisories/59434
7
reference_url http://secunia.com/advisories/59777
reference_id
reference_type
scores
url http://secunia.com/advisories/59777
8
reference_url http://secunia.com/advisories/60545
reference_id
reference_type
scores
url http://secunia.com/advisories/60545
9
reference_url http://secunia.com/advisories/60564
reference_id
reference_type
scores
url http://secunia.com/advisories/60564
10
reference_url https://github.com/torvalds/linux/commit/82262a46627bebb0febcc26664746c25cef08563
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/82262a46627bebb0febcc26664746c25cef08563
11
reference_url http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2
12
reference_url http://www.openwall.com/lists/oss-security/2014/06/26/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/06/26/6
13
reference_url http://www.securityfocus.com/bid/68162
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68162
14
reference_url http://www.securitytracker.com/id/1036763
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1036763
15
reference_url http://www.ubuntu.com/usn/USN-2334-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2334-1
16
reference_url http://www.ubuntu.com/usn/USN-2335-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2335-1
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1113445
reference_id 1113445
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1113445
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-4655
reference_id CVE-2014-4655
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-4655
22
reference_url https://access.redhat.com/errata/RHSA-2014:1083
reference_id RHSA-2014:1083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1083
23
reference_url https://access.redhat.com/errata/RHSA-2014:1392
reference_id RHSA-2014:1392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1392
24
reference_url https://access.redhat.com/errata/RHSA-2014:1971
reference_id RHSA-2014:1971
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1971
25
reference_url https://usn.ubuntu.com/2332-1/
reference_id USN-2332-1
reference_type
scores
url https://usn.ubuntu.com/2332-1/
26
reference_url https://usn.ubuntu.com/2333-1/
reference_id USN-2333-1
reference_type
scores
url https://usn.ubuntu.com/2333-1/
27
reference_url https://usn.ubuntu.com/2334-1/
reference_id USN-2334-1
reference_type
scores
url https://usn.ubuntu.com/2334-1/
28
reference_url https://usn.ubuntu.com/2335-1/
reference_id USN-2335-1
reference_type
scores
url https://usn.ubuntu.com/2335-1/
29
reference_url https://usn.ubuntu.com/2336-1/
reference_id USN-2336-1
reference_type
scores
url https://usn.ubuntu.com/2336-1/
30
reference_url https://usn.ubuntu.com/2337-1/
reference_id USN-2337-1
reference_type
scores
url https://usn.ubuntu.com/2337-1/
fixed_packages
aliases CVE-2014-4655
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ssk8-9z69-mfez
5
url VCID-ynsk-tchm-rfc6
vulnerability_id VCID-ynsk-tchm-rfc6
summary Kernel: net: SCTP: fix a NULL pointer dereference during INIT collisions
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1be9a950c646c9092fb3618197f7b6bfb50e82aa
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1be9a950c646c9092fb3618197f7b6bfb50e82aa
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2014-1083.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1083.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2014-1668.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1668.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2014-1763.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1763.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5077.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5077.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-5077
reference_id
reference_type
scores
0
value 0.12777
scoring_system epss
scoring_elements 0.94034
published_at 2026-04-24T12:55:00Z
1
value 0.12777
scoring_system epss
scoring_elements 0.93973
published_at 2026-04-01T12:55:00Z
2
value 0.12777
scoring_system epss
scoring_elements 0.93983
published_at 2026-04-02T12:55:00Z
3
value 0.12777
scoring_system epss
scoring_elements 0.93992
published_at 2026-04-04T12:55:00Z
4
value 0.12777
scoring_system epss
scoring_elements 0.93995
published_at 2026-04-07T12:55:00Z
5
value 0.12777
scoring_system epss
scoring_elements 0.94004
published_at 2026-04-08T12:55:00Z
6
value 0.12777
scoring_system epss
scoring_elements 0.94007
published_at 2026-04-09T12:55:00Z
7
value 0.12777
scoring_system epss
scoring_elements 0.94012
published_at 2026-04-13T12:55:00Z
8
value 0.12777
scoring_system epss
scoring_elements 0.94027
published_at 2026-04-16T12:55:00Z
9
value 0.12777
scoring_system epss
scoring_elements 0.94032
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-5077
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077
9
reference_url http://secunia.com/advisories/59777
reference_id
reference_type
scores
url http://secunia.com/advisories/59777
10
reference_url http://secunia.com/advisories/60430
reference_id
reference_type
scores
url http://secunia.com/advisories/60430
11
reference_url http://secunia.com/advisories/60545
reference_id
reference_type
scores
url http://secunia.com/advisories/60545
12
reference_url http://secunia.com/advisories/60564
reference_id
reference_type
scores
url http://secunia.com/advisories/60564
13
reference_url http://secunia.com/advisories/60744
reference_id
reference_type
scores
url http://secunia.com/advisories/60744
14
reference_url http://secunia.com/advisories/62563
reference_id
reference_type
scores
url http://secunia.com/advisories/62563
15
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/95134
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/95134
16
reference_url https://github.com/torvalds/linux/commit/1be9a950c646c9092fb3618197f7b6bfb50e82aa
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/1be9a950c646c9092fb3618197f7b6bfb50e82aa
17
reference_url http://www.openwall.com/lists/oss-security/2014/07/26/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/07/26/1
18
reference_url http://www.securityfocus.com/bid/68881
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68881
19
reference_url http://www.securitytracker.com/id/1030681
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030681
20
reference_url http://www.ubuntu.com/usn/USN-2334-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2334-1
21
reference_url http://www.ubuntu.com/usn/USN-2335-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2335-1
22
reference_url http://www.ubuntu.com/usn/USN-2358-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2358-1
23
reference_url http://www.ubuntu.com/usn/USN-2359-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2359-1
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1122982
reference_id 1122982
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1122982
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp3:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
36
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-5077
reference_id CVE-2014-5077
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-5077
37
reference_url https://access.redhat.com/errata/RHSA-2014:1083
reference_id RHSA-2014:1083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1083
38
reference_url https://access.redhat.com/errata/RHSA-2014:1392
reference_id RHSA-2014:1392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1392
39
reference_url https://access.redhat.com/errata/RHSA-2014:1668
reference_id RHSA-2014:1668
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1668
40
reference_url https://access.redhat.com/errata/RHSA-2014:1724
reference_id RHSA-2014:1724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1724
41
reference_url https://access.redhat.com/errata/RHSA-2014:1763
reference_id RHSA-2014:1763
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1763
42
reference_url https://access.redhat.com/errata/RHSA-2014:1872
reference_id RHSA-2014:1872
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1872
43
reference_url https://usn.ubuntu.com/2332-1/
reference_id USN-2332-1
reference_type
scores
url https://usn.ubuntu.com/2332-1/
44
reference_url https://usn.ubuntu.com/2333-1/
reference_id USN-2333-1
reference_type
scores
url https://usn.ubuntu.com/2333-1/
45
reference_url https://usn.ubuntu.com/2334-1/
reference_id USN-2334-1
reference_type
scores
url https://usn.ubuntu.com/2334-1/
46
reference_url https://usn.ubuntu.com/2335-1/
reference_id USN-2335-1
reference_type
scores
url https://usn.ubuntu.com/2335-1/
47
reference_url https://usn.ubuntu.com/2358-1/
reference_id USN-2358-1
reference_type
scores
url https://usn.ubuntu.com/2358-1/
48
reference_url https://usn.ubuntu.com/2359-1/
reference_id USN-2359-1
reference_type
scores
url https://usn.ubuntu.com/2359-1/
fixed_packages
aliases CVE-2014-5077
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ynsk-tchm-rfc6
Fixing_vulnerabilities
Risk_score3.2
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@3.10.33-rt32.45%3Farch=el6rt