Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/122164?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/122164?format=api", "purl": "pkg:rpm/redhat/kernel-rt@3.10.33-rt32.43?arch=el6rt", "type": "rpm", "namespace": "redhat", "name": "kernel-rt", "version": "3.10.33-rt32.43", "qualifiers": { "arch": "el6rt" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86306?format=api", "vulnerability_id": "VCID-3hq3-npb3-wqau", "summary": "kernel: net: insufficient permision checks of netlink messages", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0181.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0181.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0181", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04668", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06902", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06887", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06909", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07624", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07642", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07433", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07615", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.0754", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07629", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07548", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.0759", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07566", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0181" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0181", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0181" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1094265", "reference_id": "1094265", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1094265" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746738", "reference_id": "746738", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746738" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0913", "reference_id": "RHSA-2014:0913", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0913" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1023", "reference_id": "RHSA-2014:1023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1392", "reference_id": "RHSA-2014:1392", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1392" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1959", "reference_id": "RHSA-2014:1959", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1959" }, { "reference_url": "https://usn.ubuntu.com/2336-1/", "reference_id": "USN-2336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2336-1/" }, { "reference_url": "https://usn.ubuntu.com/2337-1/", "reference_id": "USN-2337-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2337-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-0181" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3hq3-npb3-wqau" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86409?format=api", "vulnerability_id": "VCID-7xdm-kqrk-sqfr", "summary": "Kernel: target/rd: imformation leakage", "references": [ { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4442dc8a92b8f9ad8ee9e7f8438f4c04c03a22dc", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4442dc8a92b8f9ad8ee9e7f8438f4c04c03a22dc" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html" }, { "reference_url": "http://permalink.gmane.org/gmane.linux.scsi.target.devel/6618", "reference_id": "", "reference_type": "", "scores": [], "url": "http://permalink.gmane.org/gmane.linux.scsi.target.devel/6618" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4027.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4027.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-4027", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25583", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25765", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25837", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.2588", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.2565", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25721", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25769", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.2578", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.2574", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25681", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25684", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25668", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25643", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25591", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-4027" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027" }, { "reference_url": "http://secunia.com/advisories/59134", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59134" }, { "reference_url": "http://secunia.com/advisories/59777", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59777" }, { "reference_url": "http://secunia.com/advisories/60564", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60564" }, { "reference_url": "http://secunia.com/advisories/61310", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61310" }, { "reference_url": "https://github.com/torvalds/linux/commit/4442dc8a92b8f9ad8ee9e7f8438f4c04c03a22dc", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/4442dc8a92b8f9ad8ee9e7f8438f4c04c03a22dc" }, { "reference_url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15685.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15685.html" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/06/11/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/06/11/1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2334-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2334-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2335-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2335-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108744", "reference_id": "1108744", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108744" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:12.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_access_policy_manager:12.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:12.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:12.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_analytics:12.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:12.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:12.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_application_security_manager:12.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:12.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_domain_name_system:12.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_domain_name_system:12.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_domain_name_system:12.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:12.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_link_controller:12.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:12.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:12.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_local_traffic_manager:12.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:12.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-iq_application_delivery_controller:4.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-iq_application_delivery_controller:4.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-iq_application_delivery_controller:4.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-iq_cloud:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-iq_cloud:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-iq_cloud:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-iq_device:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-iq_device:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-iq_device:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-iq_security:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-iq_security:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-iq_security:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:enterprise_manager:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:enterprise_manager:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:enterprise_manager:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4027", "reference_id": "CVE-2014-4027", "reference_type": "", "scores": [ { "value": "2.3", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:M/Au:S/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4027" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0913", "reference_id": "RHSA-2014:0913", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0913" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1971", "reference_id": "RHSA-2014:1971", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1971" }, { "reference_url": "https://usn.ubuntu.com/2285-1/", "reference_id": "USN-2285-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2285-1/" }, { "reference_url": "https://usn.ubuntu.com/2334-1/", "reference_id": "USN-2334-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2334-1/" }, { "reference_url": "https://usn.ubuntu.com/2335-1/", "reference_id": "USN-2335-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2335-1/" }, { "reference_url": "https://usn.ubuntu.com/2336-1/", "reference_id": "USN-2336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2336-1/" }, { "reference_url": "https://usn.ubuntu.com/2337-1/", "reference_id": "USN-2337-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2337-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-4027" ], "risk_score": 1.1, "exploitability": "0.5", "weighted_severity": "2.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7xdm-kqrk-sqfr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57699?format=api", "vulnerability_id": "VCID-frqh-5rwt-9feq", "summary": "security update", "references": [ { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d3217b15a19a4779c39b212358a5c71d725822ee", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d3217b15a19a4779c39b212358a5c71d725822ee" }, { "reference_url": "http://linux.oracle.com/errata/ELSA-2014-3068.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://linux.oracle.com/errata/ELSA-2014-3068.html" }, { "reference_url": "http://linux.oracle.com/errata/ELSA-2014-3069.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://linux.oracle.com/errata/ELSA-2014-3069.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4667.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4667.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-4667", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.14138", "scoring_system": "epss", "scoring_elements": "0.94391", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.14138", "scoring_system": "epss", "scoring_elements": "0.94327", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.14138", "scoring_system": "epss", "scoring_elements": "0.94337", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.14138", "scoring_system": "epss", "scoring_elements": "0.94347", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.14138", "scoring_system": "epss", "scoring_elements": "0.94348", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.14138", "scoring_system": "epss", "scoring_elements": "0.94358", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.14138", "scoring_system": "epss", "scoring_elements": "0.94362", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.14138", "scoring_system": "epss", "scoring_elements": "0.94365", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.14138", "scoring_system": "epss", "scoring_elements": "0.94366", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.14138", "scoring_system": "epss", "scoring_elements": "0.94367", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.14138", "scoring_system": "epss", "scoring_elements": "0.94382", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.14138", "scoring_system": "epss", "scoring_elements": "0.94388", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.14138", "scoring_system": "epss", "scoring_elements": "0.9439", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-4667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3534", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3534" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943" }, { "reference_url": "http://secunia.com/advisories/59777", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59777" }, { "reference_url": "http://secunia.com/advisories/59790", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59790" }, { "reference_url": "http://secunia.com/advisories/60564", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60564" }, { "reference_url": "http://secunia.com/advisories/60596", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60596" }, { "reference_url": "https://github.com/torvalds/linux/commit/d3217b15a19a4779c39b212358a5c71d725822ee", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/d3217b15a19a4779c39b212358a5c71d725822ee" }, { "reference_url": "http://www.debian.org/security/2014/dsa-2992", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-2992" }, { "reference_url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/06/27/11", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/06/27/11" }, { "reference_url": "http://www.securityfocus.com/bid/68224", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/68224" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2334-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2334-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2335-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2335-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1113967", "reference_id": "1113967", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1113967" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4667", "reference_id": "CVE-2014-4667", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4667" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0913", "reference_id": "RHSA-2014:0913", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0913" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1023", "reference_id": "RHSA-2014:1023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1167", "reference_id": "RHSA-2014:1167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1167" }, { "reference_url": "https://usn.ubuntu.com/2332-1/", "reference_id": "USN-2332-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2332-1/" }, { "reference_url": "https://usn.ubuntu.com/2333-1/", "reference_id": "USN-2333-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2333-1/" }, { "reference_url": "https://usn.ubuntu.com/2334-1/", "reference_id": "USN-2334-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2334-1/" }, { "reference_url": "https://usn.ubuntu.com/2335-1/", "reference_id": "USN-2335-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2335-1/" }, { "reference_url": "https://usn.ubuntu.com/2336-1/", "reference_id": "USN-2336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2336-1/" }, { "reference_url": "https://usn.ubuntu.com/2337-1/", "reference_id": "USN-2337-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2337-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-4667" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-frqh-5rwt-9feq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86235?format=api", "vulnerability_id": "VCID-mane-xx39-53fc", "summary": "kernel: aio: insufficient sanitization of head in aio_read_events_ring()", "references": [ { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=edfbbf388f293d70bf4b7c0bc38774d05e6f711a", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=edfbbf388f293d70bf4b7c0bc38774d05e6f711a" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0206.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0206.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0206", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.1738", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17507", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.1767", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17715", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17435", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17528", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17588", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17603", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17555", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17503", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17447", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17456", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17493", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17403", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0206" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0206", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0206" }, { "reference_url": "http://secunia.com/advisories/59278", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59278" }, { "reference_url": "https://github.com/torvalds/linux/commit/edfbbf388f293d70bf4b7c0bc38774d05e6f711a", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/edfbbf388f293d70bf4b7c0bc38774d05e6f711a" }, { "reference_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=edfbbf388f29", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=edfbbf388f29" }, { "reference_url": "https://source.android.com/security/bulletin/2017-04-01", "reference_id": "", "reference_type": "", "scores": [], "url": "https://source.android.com/security/bulletin/2017-04-01" }, { "reference_url": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.46", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.46" }, { "reference_url": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.24", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.24" }, { "reference_url": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.10", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.10" }, { "reference_url": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.3", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.3" }, { "reference_url": "http://www.securityfocus.com/bid/68176", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/68176" }, { "reference_url": "http://www.securitytracker.com/id/1030479", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030479" }, { "reference_url": "http://www.securitytracker.com/id/1038201", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1038201" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1094602", "reference_id": "1094602", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1094602" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0206", "reference_id": "CVE-2014-0206", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0206" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0786", "reference_id": "RHSA-2014:0786", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0786" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0913", "reference_id": "RHSA-2014:0913", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0913" }, { "reference_url": "https://usn.ubuntu.com/2336-1/", "reference_id": "USN-2336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2336-1/" }, { "reference_url": "https://usn.ubuntu.com/2337-1/", "reference_id": "USN-2337-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2337-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-0206" ], "risk_score": 0.9, "exploitability": "0.5", "weighted_severity": "1.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mane-xx39-53fc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86345?format=api", "vulnerability_id": "VCID-rjd6-73ck-y7eh", "summary": "Kernel: missing check during hugepage migration", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3940.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3940.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3940", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12578", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12684", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12729", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12541", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12619", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12671", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12639", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12598", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12553", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.1246", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12466", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.1258", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12589", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12556", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3940" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3940", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3940" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1104097", "reference_id": "1104097", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1104097" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0913", "reference_id": "RHSA-2014:0913", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0913" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0290", "reference_id": "RHSA-2015:0290", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0290" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1272", "reference_id": "RHSA-2015:1272", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1272" }, { "reference_url": "https://usn.ubuntu.com/2288-1/", "reference_id": "USN-2288-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2288-1/" }, { "reference_url": "https://usn.ubuntu.com/2290-1/", "reference_id": "USN-2290-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2290-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-3940" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rjd6-73ck-y7eh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57629?format=api", "vulnerability_id": "VCID-teu7-acfs-4fek", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3145.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3145.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3145", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17888", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.18049", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.18104", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17806", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17894", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17954", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17971", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17926", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17877", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17819", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17829", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17867", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17772", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.1775", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3145" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3144", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3144" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3145", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3145" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1096775", "reference_id": "1096775", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1096775" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0786", "reference_id": "RHSA-2014:0786", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0786" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0913", "reference_id": "RHSA-2014:0913", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0913" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0981", "reference_id": "RHSA-2014:0981", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0981" }, { "reference_url": "https://usn.ubuntu.com/2251-1/", "reference_id": "USN-2251-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2251-1/" }, { "reference_url": "https://usn.ubuntu.com/2252-1/", "reference_id": "USN-2252-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2252-1/" }, { "reference_url": "https://usn.ubuntu.com/2259-1/", "reference_id": "USN-2259-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2259-1/" }, { "reference_url": "https://usn.ubuntu.com/2261-1/", "reference_id": "USN-2261-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2261-1/" }, { "reference_url": "https://usn.ubuntu.com/2262-1/", "reference_id": "USN-2262-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2262-1/" }, { "reference_url": "https://usn.ubuntu.com/2263-1/", "reference_id": "USN-2263-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2263-1/" }, { "reference_url": "https://usn.ubuntu.com/2264-1/", "reference_id": "USN-2264-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2264-1/" }, { "reference_url": "https://usn.ubuntu.com/2286-1/", "reference_id": "USN-2286-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2286-1/" }, { "reference_url": "https://usn.ubuntu.com/2288-1/", "reference_id": "USN-2288-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2288-1/" }, { "reference_url": "https://usn.ubuntu.com/2290-1/", "reference_id": "USN-2290-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2290-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-3145" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-teu7-acfs-4fek" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57628?format=api", "vulnerability_id": "VCID-tweh-zwpw-8fdk", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3144.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3144.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3144", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17888", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.18049", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.18104", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17806", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17894", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17954", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17971", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17926", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17877", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17819", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17829", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17867", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17772", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.1775", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3144" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3144", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3144" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3145", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3145" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1096775", "reference_id": "1096775", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1096775" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0786", "reference_id": "RHSA-2014:0786", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0786" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0913", "reference_id": "RHSA-2014:0913", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0913" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0981", "reference_id": "RHSA-2014:0981", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0981" }, { "reference_url": "https://usn.ubuntu.com/2251-1/", "reference_id": "USN-2251-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2251-1/" }, { "reference_url": "https://usn.ubuntu.com/2252-1/", "reference_id": "USN-2252-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2252-1/" }, { "reference_url": "https://usn.ubuntu.com/2259-1/", "reference_id": "USN-2259-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2259-1/" }, { "reference_url": "https://usn.ubuntu.com/2261-1/", "reference_id": "USN-2261-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2261-1/" }, { "reference_url": "https://usn.ubuntu.com/2262-1/", "reference_id": "USN-2262-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2262-1/" }, { "reference_url": "https://usn.ubuntu.com/2263-1/", "reference_id": "USN-2263-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2263-1/" }, { "reference_url": "https://usn.ubuntu.com/2264-1/", "reference_id": "USN-2264-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2264-1/" }, { "reference_url": "https://usn.ubuntu.com/2286-1/", "reference_id": "USN-2286-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2286-1/" }, { "reference_url": "https://usn.ubuntu.com/2288-1/", "reference_id": "USN-2288-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2288-1/" }, { "reference_url": "https://usn.ubuntu.com/2290-1/", "reference_id": "USN-2290-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2290-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-3144" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tweh-zwpw-8fdk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57631?format=api", "vulnerability_id": "VCID-y2eh-4nzw-uubt", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3153.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3153.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3153", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.68892", "scoring_system": "epss", "scoring_elements": "0.98619", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.68892", "scoring_system": "epss", "scoring_elements": "0.98626", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.68892", "scoring_system": "epss", "scoring_elements": "0.9863", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.68892", "scoring_system": "epss", "scoring_elements": "0.98631", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.68892", "scoring_system": "epss", "scoring_elements": "0.98617", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.68892", "scoring_system": "epss", "scoring_elements": "0.98624", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.68892", "scoring_system": "epss", "scoring_elements": "0.98622", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.68892", "scoring_system": "epss", "scoring_elements": "0.98635", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.68892", "scoring_system": "epss", "scoring_elements": "0.98636", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.68892", "scoring_system": "epss", "scoring_elements": "0.9864", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.68892", "scoring_system": "epss", "scoring_elements": "0.98627", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.69328", "scoring_system": "epss", "scoring_elements": "0.98654", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3153" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3144", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3144" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3145", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3145" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153" }, { "reference_url": "http://www.securitytracker.com/id/1030451", "reference_id": "1030451", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T14:12:20Z/" } ], "url": "http://www.securitytracker.com/id/1030451" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103626", "reference_id": "1103626", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T14:12:20Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103626" }, { "reference_url": "http://openwall.com/lists/oss-security/2014/06/06/20", "reference_id": "20", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T14:12:20Z/" } ], "url": "http://openwall.com/lists/oss-security/2014/06/06/20" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/06/05/22", "reference_id": "22", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T14:12:20Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2014/06/05/22" }, { "reference_url": "http://openwall.com/lists/oss-security/2014/06/05/24", "reference_id": "24", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T14:12:20Z/" } ], "url": "http://openwall.com/lists/oss-security/2014/06/05/24" }, { "reference_url": "http://www.exploit-db.com/exploits/35370", "reference_id": "35370", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T14:12:20Z/" } ], "url": "http://www.exploit-db.com/exploits/35370" }, { "reference_url": "https://www.openwall.com/lists/oss-security/2021/02/01/4", "reference_id": "4", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T14:12:20Z/" } ], "url": "https://www.openwall.com/lists/oss-security/2021/02/01/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2021/02/01/4", "reference_id": "4", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T14:12:20Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2021/02/01/4" }, { "reference_url": "http://secunia.com/advisories/58500", "reference_id": "58500", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T14:12:20Z/" } ], "url": "http://secunia.com/advisories/58500" }, { "reference_url": "http://secunia.com/advisories/58990", "reference_id": "58990", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T14:12:20Z/" } ], "url": "http://secunia.com/advisories/58990" }, { "reference_url": "http://secunia.com/advisories/59029", "reference_id": "59029", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T14:12:20Z/" } ], "url": "http://secunia.com/advisories/59029" }, { "reference_url": "http://secunia.com/advisories/59092", "reference_id": "59092", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T14:12:20Z/" } ], "url": "http://secunia.com/advisories/59092" }, { "reference_url": "http://secunia.com/advisories/59153", "reference_id": "59153", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T14:12:20Z/" } ], "url": "http://secunia.com/advisories/59153" }, { "reference_url": "http://secunia.com/advisories/59386", "reference_id": "59386", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T14:12:20Z/" } ], "url": "http://secunia.com/advisories/59386" }, { "reference_url": "http://secunia.com/advisories/59599", "reference_id": "59599", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T14:12:20Z/" } ], "url": "http://secunia.com/advisories/59599" }, { "reference_url": "http://www.securityfocus.com/bid/67906", "reference_id": "67906", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T14:12:20Z/" } ], "url": "http://www.securityfocus.com/bid/67906" }, { "reference_url": "https://github.com/elongl/CVE-2014-3153", "reference_id": "CVE-2014-3153", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T14:12:20Z/" } ], "url": "https://github.com/elongl/CVE-2014-3153" }, { "reference_url": "https://elongl.github.io/exploitation/2021/01/08/cve-2014-3153.html", "reference_id": "cve-2014-3153.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T14:12:20Z/" } ], "url": "https://elongl.github.io/exploitation/2021/01/08/cve-2014-3153.html" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/35370.c", "reference_id": "CVE-2014-3153;OSVDB-107752", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/35370.c" }, { "reference_url": "http://www.debian.org/security/2014/dsa-2949", "reference_id": "dsa-2949", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T14:12:20Z/" } ], "url": "http://www.debian.org/security/2014/dsa-2949" }, { "reference_url": "https://github.com/torvalds/linux/commit/e9c243a5a6de0be8e584c604d353412584b592f8", "reference_id": "e9c243a5a6de0be8e584c604d353412584b592f8", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T14:12:20Z/" } ], "url": "https://github.com/torvalds/linux/commit/e9c243a5a6de0be8e584c604d353412584b592f8" }, { "reference_url": "http://linux.oracle.com/errata/ELSA-2014-3037.html", "reference_id": "ELSA-2014-3037.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T14:12:20Z/" } ], "url": "http://linux.oracle.com/errata/ELSA-2014-3037.html" }, { "reference_url": "http://linux.oracle.com/errata/ELSA-2014-3038.html", "reference_id": "ELSA-2014-3038.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T14:12:20Z/" } ], "url": "http://linux.oracle.com/errata/ELSA-2014-3038.html" }, { "reference_url": "http://linux.oracle.com/errata/ELSA-2014-3039.html", "reference_id": "ELSA-2014-3039.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T14:12:20Z/" } ], "url": "http://linux.oracle.com/errata/ELSA-2014-3039.html" }, { "reference_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=13fbca4c6ecd96ec1a1cfa2e4f2ce191fe928a5e", "reference_id": "?id=13fbca4c6ecd96ec1a1cfa2e4f2ce191fe928a5e", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T14:12:20Z/" } ], "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=13fbca4c6ecd96ec1a1cfa2e4f2ce191fe928a5e" }, { "reference_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=54a217887a7b658e2650c3feff22756ab80c7339", "reference_id": "?id=54a217887a7b658e2650c3feff22756ab80c7339", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T14:12:20Z/" } ], "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=54a217887a7b658e2650c3feff22756ab80c7339" }, { "reference_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b3eaa9fc5cd0a4d74b18f6b8dc617aeaf1873270", "reference_id": "?id=b3eaa9fc5cd0a4d74b18f6b8dc617aeaf1873270", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T14:12:20Z/" } ], "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b3eaa9fc5cd0a4d74b18f6b8dc617aeaf1873270" }, { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e9c243a5a6de0be8e584c604d353412584b592f8", "reference_id": "linux-2.6.git%3Ba=commit%3Bh=e9c243a5a6de0be8e584c604d353412584b592f8", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T14:12:20Z/" } ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e9c243a5a6de0be8e584c604d353412584b592f8" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-07/msg00006.html", "reference_id": "msg00006.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T14:12:20Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-07/msg00006.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00014.html", "reference_id": "msg00014.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T14:12:20Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00014.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00018.html", "reference_id": "msg00018.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T14:12:20Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00018.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00025.html", "reference_id": "msg00025.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T14:12:20Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00025.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0771", "reference_id": "RHSA-2014:0771", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0771" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0786", "reference_id": "RHSA-2014:0786", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0786" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0800", "reference_id": "RHSA-2014:0800", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0800" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-0800.html", "reference_id": "RHSA-2014-0800.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T14:12:20Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0800.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0900", "reference_id": "RHSA-2014:0900", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0900" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0913", "reference_id": "RHSA-2014:0913", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0913" }, { "reference_url": "https://usn.ubuntu.com/2233-1/", "reference_id": "USN-2233-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2233-1/" }, { "reference_url": "https://usn.ubuntu.com/2234-1/", "reference_id": "USN-2234-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2234-1/" }, { "reference_url": "https://usn.ubuntu.com/2235-1/", "reference_id": "USN-2235-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2235-1/" }, { "reference_url": "https://usn.ubuntu.com/2236-1/", "reference_id": "USN-2236-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2236-1/" }, { "reference_url": "https://usn.ubuntu.com/2237-1/", "reference_id": "USN-2237-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2237-1/" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2237-1", "reference_id": "USN-2237-1", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T14:12:20Z/" } ], "url": "http://www.ubuntu.com/usn/USN-2237-1" }, { "reference_url": "https://usn.ubuntu.com/2238-1/", "reference_id": "USN-2238-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2238-1/" }, { "reference_url": "https://usn.ubuntu.com/2239-1/", "reference_id": "USN-2239-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2239-1/" }, { "reference_url": "https://usn.ubuntu.com/2240-1/", "reference_id": "USN-2240-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2240-1/" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2240-1", "reference_id": "USN-2240-1", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T14:12:20Z/" } ], "url": "http://www.ubuntu.com/usn/USN-2240-1" }, { "reference_url": "https://usn.ubuntu.com/2241-1/", "reference_id": "USN-2241-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2241-1/" }, { "reference_url": "https://usn.ubuntu.com/2260-1/", "reference_id": "USN-2260-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2260-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-3153" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y2eh-4nzw-uubt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57849?format=api", "vulnerability_id": "VCID-ys7u-e61k-nfd7", "summary": "security update", "references": [ { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b9cd18de4db3c9ffa7e17b0dc0ca99ed5aa4d43a", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b9cd18de4db3c9ffa7e17b0dc0ca99ed5aa4d43a" }, { "reference_url": "http://linux.oracle.com/errata/ELSA-2014-0924.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://linux.oracle.com/errata/ELSA-2014-0924.html" }, { "reference_url": "http://linux.oracle.com/errata/ELSA-2014-3047.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://linux.oracle.com/errata/ELSA-2014-3047.html" }, { "reference_url": "http://linux.oracle.com/errata/ELSA-2014-3048.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://linux.oracle.com/errata/ELSA-2014-3048.html" }, { "reference_url": "http://openwall.com/lists/oss-security/2014/07/05/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2014/07/05/4" }, { "reference_url": "http://openwall.com/lists/oss-security/2014/07/08/16", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2014/07/08/16" }, { "reference_url": "http://openwall.com/lists/oss-security/2014/07/08/5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2014/07/08/5" }, { "reference_url": "http://packetstormsecurity.com/files/127573/Linux-Kernel-ptrace-sysret-Local-Privilege-Escalation.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/127573/Linux-Kernel-ptrace-sysret-Local-Privilege-Escalation.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4699.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4699.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-4699", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01141", "scoring_system": "epss", "scoring_elements": "0.78487", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01141", "scoring_system": "epss", "scoring_elements": "0.78371", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01141", "scoring_system": "epss", "scoring_elements": "0.78377", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01141", "scoring_system": "epss", "scoring_elements": "0.78408", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01141", "scoring_system": "epss", "scoring_elements": "0.78391", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01141", "scoring_system": "epss", "scoring_elements": "0.78418", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01141", "scoring_system": "epss", "scoring_elements": "0.78423", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01141", "scoring_system": "epss", "scoring_elements": "0.78449", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01141", "scoring_system": "epss", "scoring_elements": "0.78432", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01141", "scoring_system": "epss", "scoring_elements": "0.78424", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01141", "scoring_system": "epss", "scoring_elements": "0.78452", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01141", "scoring_system": "epss", "scoring_elements": "0.78451", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01141", "scoring_system": "epss", "scoring_elements": "0.78446", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01141", "scoring_system": "epss", "scoring_elements": "0.7848", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-4699" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4699", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4699" }, { "reference_url": "http://secunia.com/advisories/59633", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59633" }, { "reference_url": "http://secunia.com/advisories/59639", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59639" }, { "reference_url": "http://secunia.com/advisories/59654", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59654" }, { "reference_url": "http://secunia.com/advisories/60220", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60220" }, { "reference_url": "http://secunia.com/advisories/60380", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60380" }, { "reference_url": "http://secunia.com/advisories/60393", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60393" }, { "reference_url": "https://github.com/torvalds/linux/commit/b9cd18de4db3c9ffa7e17b0dc0ca99ed5aa4d43a", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/b9cd18de4db3c9ffa7e17b0dc0ca99ed5aa4d43a" }, { "reference_url": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.47", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.47" }, { "reference_url": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.11", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.11" }, { "reference_url": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.97", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.97" }, { "reference_url": "http://www.debian.org/security/2014/dsa-2972", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-2972" }, { "reference_url": "http://www.exploit-db.com/exploits/34134", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.exploit-db.com/exploits/34134" }, { "reference_url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/07/04/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/07/04/4" }, { "reference_url": "http://www.osvdb.org/108754", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.osvdb.org/108754" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2266-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2266-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2267-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2267-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2268-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2268-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2269-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2269-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2270-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2270-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2271-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2271-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2272-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2272-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2273-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2273-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2274-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2274-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1115927", "reference_id": "1115927", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1115927" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4699", "reference_id": "CVE-2014-4699", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4699" }, { "reference_url": "http://cyseclabs.com/exploits/poc_v0.c", "reference_id": "CVE-2014-4699;OSVDB-108754", "reference_type": "exploit", "scores": [], "url": "http://cyseclabs.com/exploits/poc_v0.c" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/local/34134.c", "reference_id": "CVE-2014-4699;OSVDB-108754", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/local/34134.c" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0913", "reference_id": "RHSA-2014:0913", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0913" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0923", "reference_id": "RHSA-2014:0923", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0923" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0924", "reference_id": "RHSA-2014:0924", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0924" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0925", "reference_id": "RHSA-2014:0925", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0925" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0949", "reference_id": "RHSA-2014:0949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0949" }, { "reference_url": "https://usn.ubuntu.com/2266-1/", "reference_id": "USN-2266-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2266-1/" }, { "reference_url": "https://usn.ubuntu.com/2267-1/", "reference_id": "USN-2267-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2267-1/" }, { "reference_url": "https://usn.ubuntu.com/2268-1/", "reference_id": "USN-2268-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2268-1/" }, { "reference_url": "https://usn.ubuntu.com/2269-1/", "reference_id": "USN-2269-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2269-1/" }, { "reference_url": "https://usn.ubuntu.com/2270-1/", "reference_id": "USN-2270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2270-1/" }, { "reference_url": "https://usn.ubuntu.com/2271-1/", "reference_id": "USN-2271-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2271-1/" }, { "reference_url": "https://usn.ubuntu.com/2272-1/", "reference_id": "USN-2272-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2272-1/" }, { "reference_url": "https://usn.ubuntu.com/2273-1/", "reference_id": "USN-2273-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2273-1/" }, { "reference_url": "https://usn.ubuntu.com/2274-1/", "reference_id": "USN-2274-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2274-1/" }, { "reference_url": "https://usn.ubuntu.com/2284-1/", "reference_id": "USN-2284-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2284-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-4699" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ys7u-e61k-nfd7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86270?format=api", "vulnerability_id": "VCID-zdxm-6bqg-pff9", "summary": "kernel: DoS with syscall auditing", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3917.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3917.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3917", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25398", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25462", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25498", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.2527", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25337", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25381", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25393", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25352", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25299", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25306", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25297", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25267", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25229", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25219", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3917" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3917", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3917" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102571", "reference_id": "1102571", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102571" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0913", "reference_id": "RHSA-2014:0913", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0913" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1143", "reference_id": "RHSA-2014:1143", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1143" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1167", "reference_id": "RHSA-2014:1167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1281", "reference_id": "RHSA-2014:1281", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1281" }, { "reference_url": "https://usn.ubuntu.com/2281-1/", "reference_id": "USN-2281-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2281-1/" }, { "reference_url": "https://usn.ubuntu.com/2282-1/", "reference_id": "USN-2282-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2282-1/" }, { "reference_url": "https://usn.ubuntu.com/2285-1/", "reference_id": "USN-2285-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2285-1/" }, { "reference_url": "https://usn.ubuntu.com/2286-1/", "reference_id": "USN-2286-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2286-1/" }, { "reference_url": "https://usn.ubuntu.com/2287-1/", "reference_id": "USN-2287-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2287-1/" }, { "reference_url": "https://usn.ubuntu.com/2289-1/", "reference_id": "USN-2289-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2289-1/" }, { "reference_url": "https://usn.ubuntu.com/2313-1/", "reference_id": "USN-2313-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2313-1/" }, { "reference_url": "https://usn.ubuntu.com/2314-1/", "reference_id": "USN-2314-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2314-1/" }, { "reference_url": "https://usn.ubuntu.com/2334-1/", "reference_id": "USN-2334-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2334-1/" }, { "reference_url": "https://usn.ubuntu.com/2335-1/", "reference_id": "USN-2335-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2335-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-3917" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zdxm-6bqg-pff9" } ], "fixing_vulnerabilities": [], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@3.10.33-rt32.43%3Farch=el6rt" }