Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/122869?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/122869?format=api", "purl": "pkg:rpm/redhat/kernel-rt@3.10.33-rt32.33?arch=el6rt", "type": "rpm", "namespace": "redhat", "name": "kernel-rt", "version": "3.10.33-rt32.33", "qualifiers": { "arch": "el6rt" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86410?format=api", "vulnerability_id": "VCID-57tg-h467-9yda", "summary": "kernel: netfilter: nf_conntrack_dccp: incorrect skb_header_pointer API usages", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2523.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2523.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2523", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04627", "scoring_system": "epss", "scoring_elements": "0.89229", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04627", "scoring_system": "epss", "scoring_elements": "0.89235", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04627", "scoring_system": "epss", "scoring_elements": "0.89249", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04627", "scoring_system": "epss", "scoring_elements": "0.89251", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04627", "scoring_system": "epss", "scoring_elements": "0.89269", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04627", "scoring_system": "epss", "scoring_elements": "0.89273", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04627", "scoring_system": "epss", "scoring_elements": "0.89282", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04627", "scoring_system": "epss", "scoring_elements": "0.89278", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04627", "scoring_system": "epss", "scoring_elements": "0.89275", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04627", "scoring_system": "epss", "scoring_elements": "0.89288", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04627", "scoring_system": "epss", "scoring_elements": "0.893", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04627", "scoring_system": "epss", "scoring_elements": "0.89305", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.04627", "scoring_system": "epss", "scoring_elements": "0.89308", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2523" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2523", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2523" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077343", "reference_id": "1077343", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077343" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0439", "reference_id": "RHSA-2014:0439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0439" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0475", "reference_id": "RHSA-2014:0475", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0475" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0520", "reference_id": "RHSA-2014:0520", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0520" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0593", "reference_id": "RHSA-2014:0593", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0593" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0634", "reference_id": "RHSA-2014:0634", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0634" }, { "reference_url": "https://usn.ubuntu.com/2173-1/", "reference_id": "USN-2173-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2173-1/" }, { "reference_url": "https://usn.ubuntu.com/2174-1/", "reference_id": "USN-2174-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2174-1/" }, { "reference_url": "https://usn.ubuntu.com/2221-1/", "reference_id": "USN-2221-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2221-1/" }, { "reference_url": "https://usn.ubuntu.com/2223-1/", "reference_id": "USN-2223-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2223-1/" }, { "reference_url": "https://usn.ubuntu.com/2224-1/", "reference_id": "USN-2224-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2224-1/" }, { "reference_url": "https://usn.ubuntu.com/2225-1/", "reference_id": "USN-2225-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2225-1/" }, { "reference_url": "https://usn.ubuntu.com/2227-1/", "reference_id": "USN-2227-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2227-1/" }, { "reference_url": "https://usn.ubuntu.com/2228-1/", "reference_id": "USN-2228-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2228-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-2523" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-57tg-h467-9yda" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86392?format=api", "vulnerability_id": "VCID-6trz-quab-zucq", "summary": "Kernel: SELinux: local denial-of-service", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1874.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1874.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1874", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17368", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17275", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17254", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17194", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22653", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22704", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22722", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22569", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22626", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22642", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22639", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22684", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22742", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22786", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22577", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1874" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1874", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1874" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1062356", "reference_id": "1062356", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1062356" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0439", "reference_id": "RHSA-2014:0439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0439" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0771", "reference_id": "RHSA-2014:0771", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0771" }, { "reference_url": "https://usn.ubuntu.com/2128-1/", "reference_id": "USN-2128-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2128-1/" }, { "reference_url": "https://usn.ubuntu.com/2129-1/", "reference_id": "USN-2129-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2129-1/" }, { "reference_url": "https://usn.ubuntu.com/2133-1/", "reference_id": "USN-2133-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2133-1/" }, { "reference_url": "https://usn.ubuntu.com/2134-1/", "reference_id": "USN-2134-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2134-1/" }, { "reference_url": "https://usn.ubuntu.com/2135-1/", "reference_id": "USN-2135-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2135-1/" }, { "reference_url": "https://usn.ubuntu.com/2136-1/", "reference_id": "USN-2136-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2136-1/" }, { "reference_url": "https://usn.ubuntu.com/2137-1/", "reference_id": "USN-2137-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2137-1/" }, { "reference_url": "https://usn.ubuntu.com/2138-1/", "reference_id": "USN-2138-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2138-1/" }, { "reference_url": "https://usn.ubuntu.com/2139-1/", "reference_id": "USN-2139-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2139-1/" }, { "reference_url": "https://usn.ubuntu.com/2140-1/", "reference_id": "USN-2140-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2140-1/" }, { "reference_url": "https://usn.ubuntu.com/2141-1/", "reference_id": "USN-2141-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2141-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-1874" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6trz-quab-zucq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86414?format=api", "vulnerability_id": "VCID-89k9-yu7x-2ffx", "summary": "kernel: x86: exceptions are not cleared in AMD FXSAVE workaround", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1438.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1438.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1438", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13566", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13666", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13727", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13529", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13609", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13661", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13631", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13595", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13547", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.1346", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13455", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13538", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13511", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13403", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1438" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1438", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1438" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1052914", "reference_id": "1052914", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1052914" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=733551", "reference_id": "733551", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=733551" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0439", "reference_id": "RHSA-2014:0439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0439" }, { "reference_url": "https://usn.ubuntu.com/2113-1/", "reference_id": "USN-2113-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2113-1/" }, { "reference_url": "https://usn.ubuntu.com/2117-1/", "reference_id": "USN-2117-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2117-1/" }, { "reference_url": "https://usn.ubuntu.com/2133-1/", "reference_id": "USN-2133-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2133-1/" }, { "reference_url": "https://usn.ubuntu.com/2134-1/", "reference_id": "USN-2134-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2134-1/" }, { "reference_url": "https://usn.ubuntu.com/2135-1/", "reference_id": "USN-2135-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2135-1/" }, { "reference_url": "https://usn.ubuntu.com/2136-1/", "reference_id": "USN-2136-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2136-1/" }, { "reference_url": "https://usn.ubuntu.com/2138-1/", "reference_id": "USN-2138-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2138-1/" }, { "reference_url": "https://usn.ubuntu.com/2139-1/", "reference_id": "USN-2139-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2139-1/" }, { "reference_url": "https://usn.ubuntu.com/2141-1/", "reference_id": "USN-2141-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2141-1/" }, { "reference_url": "https://usn.ubuntu.com/2233-1/", "reference_id": "USN-2233-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2233-1/" }, { "reference_url": "https://usn.ubuntu.com/2234-1/", "reference_id": "USN-2234-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2234-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-1438" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-89k9-yu7x-2ffx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86419?format=api", "vulnerability_id": "VCID-8ypy-qspm-abef", "summary": "kernel: net: rds: dereference of a NULL device in rds_ib_laddr_check()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7339.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7339.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-7339", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26208", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26288", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26329", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26101", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26168", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26216", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26224", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26179", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26119", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26124", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26102", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26064", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26004", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.25951", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-7339" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7339", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7339" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1079214", "reference_id": "1079214", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1079214" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0439", "reference_id": "RHSA-2014:0439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0439" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0740", "reference_id": "RHSA-2014:0740", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0740" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0981", "reference_id": "RHSA-2014:0981", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0981" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1101", "reference_id": "RHSA-2014:1101", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1101" }, { "reference_url": "https://usn.ubuntu.com/2113-1/", "reference_id": "USN-2113-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2113-1/" }, { "reference_url": "https://usn.ubuntu.com/2117-1/", "reference_id": "USN-2117-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2117-1/" }, { "reference_url": "https://usn.ubuntu.com/2133-1/", "reference_id": "USN-2133-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2133-1/" }, { "reference_url": "https://usn.ubuntu.com/2134-1/", "reference_id": "USN-2134-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2134-1/" }, { "reference_url": "https://usn.ubuntu.com/2135-1/", "reference_id": "USN-2135-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2135-1/" }, { "reference_url": "https://usn.ubuntu.com/2136-1/", "reference_id": "USN-2136-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2136-1/" }, { "reference_url": "https://usn.ubuntu.com/2141-1/", "reference_id": "USN-2141-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2141-1/" }, { "reference_url": "https://usn.ubuntu.com/2219-1/", "reference_id": "USN-2219-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2219-1/" }, { "reference_url": "https://usn.ubuntu.com/2220-1/", "reference_id": "USN-2220-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2220-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-7339" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8ypy-qspm-abef" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86490?format=api", "vulnerability_id": "VCID-9ny6-5hnd-9fa1", "summary": "Kernel: net: leakage of uninitialized memory to user-space via recv syscalls", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7263.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7263.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-7263", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14273", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14354", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14418", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14226", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14309", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14363", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14271", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14215", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14104", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14103", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14178", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14211", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14187", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.1412", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-7263" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7263", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7263" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1035875", "reference_id": "1035875", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1035875" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0159", "reference_id": "RHSA-2014:0159", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0159" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0285", "reference_id": "RHSA-2014:0285", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0285" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0439", "reference_id": "RHSA-2014:0439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0439" }, { "reference_url": "https://usn.ubuntu.com/2107-1/", "reference_id": "USN-2107-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2107-1/" }, { "reference_url": "https://usn.ubuntu.com/2108-1/", "reference_id": "USN-2108-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2108-1/" }, { "reference_url": "https://usn.ubuntu.com/2109-1/", "reference_id": "USN-2109-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2109-1/" }, { "reference_url": "https://usn.ubuntu.com/2110-1/", "reference_id": "USN-2110-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2110-1/" }, { "reference_url": "https://usn.ubuntu.com/2113-1/", "reference_id": "USN-2113-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2113-1/" }, { "reference_url": "https://usn.ubuntu.com/2117-1/", "reference_id": "USN-2117-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2117-1/" }, { "reference_url": "https://usn.ubuntu.com/2135-1/", "reference_id": "USN-2135-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2135-1/" }, { "reference_url": "https://usn.ubuntu.com/2136-1/", "reference_id": "USN-2136-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2136-1/" }, { "reference_url": "https://usn.ubuntu.com/2138-1/", "reference_id": "USN-2138-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2138-1/" }, { "reference_url": "https://usn.ubuntu.com/2139-1/", "reference_id": "USN-2139-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2139-1/" }, { "reference_url": "https://usn.ubuntu.com/2141-1/", "reference_id": "USN-2141-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2141-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-7263" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9ny6-5hnd-9fa1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86492?format=api", "vulnerability_id": "VCID-b64x-trdh-gfa7", "summary": "Kernel: net: leakage of uninitialized memory to user-space via recv syscalls", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7265.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7265.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-7265", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.102", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.1032", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10386", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10286", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.1036", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10426", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10454", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10414", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10392", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10263", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10234", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10365", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10347", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10339", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10282", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-7265" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7265", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7265" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1035875", "reference_id": "1035875", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1035875" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0159", "reference_id": "RHSA-2014:0159", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0159" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0439", "reference_id": "RHSA-2014:0439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0439" }, { "reference_url": "https://usn.ubuntu.com/2107-1/", "reference_id": "USN-2107-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2107-1/" }, { "reference_url": "https://usn.ubuntu.com/2108-1/", "reference_id": "USN-2108-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2108-1/" }, { "reference_url": "https://usn.ubuntu.com/2109-1/", "reference_id": "USN-2109-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2109-1/" }, { "reference_url": "https://usn.ubuntu.com/2110-1/", "reference_id": "USN-2110-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2110-1/" }, { "reference_url": "https://usn.ubuntu.com/2113-1/", "reference_id": "USN-2113-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2113-1/" }, { "reference_url": "https://usn.ubuntu.com/2117-1/", "reference_id": "USN-2117-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2117-1/" }, { "reference_url": "https://usn.ubuntu.com/2135-1/", "reference_id": "USN-2135-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2135-1/" }, { "reference_url": "https://usn.ubuntu.com/2136-1/", "reference_id": "USN-2136-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2136-1/" }, { "reference_url": "https://usn.ubuntu.com/2138-1/", "reference_id": "USN-2138-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2138-1/" }, { "reference_url": "https://usn.ubuntu.com/2139-1/", "reference_id": "USN-2139-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2139-1/" }, { "reference_url": "https://usn.ubuntu.com/2141-1/", "reference_id": "USN-2141-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2141-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-7265" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b64x-trdh-gfa7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86358?format=api", "vulnerability_id": "VCID-cbak-5155-rygn", "summary": "Kernel: net: IPv6: crash due to router advertisement flooding", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2309.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2309.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2309", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75689", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75691", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75722", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75701", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75736", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75747", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75771", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75752", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75746", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75783", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75787", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75773", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75811", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75818", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75829", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2309" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2309", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2309" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1074471", "reference_id": "1074471", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1074471" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0439", "reference_id": "RHSA-2014:0439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0439" }, { "reference_url": "https://usn.ubuntu.com/2221-1/", "reference_id": "USN-2221-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2221-1/" }, { "reference_url": "https://usn.ubuntu.com/2223-1/", "reference_id": "USN-2223-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2223-1/" }, { "reference_url": "https://usn.ubuntu.com/2224-1/", "reference_id": "USN-2224-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2224-1/" }, { "reference_url": "https://usn.ubuntu.com/2225-1/", "reference_id": "USN-2225-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2225-1/" }, { "reference_url": "https://usn.ubuntu.com/2227-1/", "reference_id": "USN-2227-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2227-1/" }, { "reference_url": "https://usn.ubuntu.com/2228-1/", "reference_id": "USN-2228-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2228-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-2309" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cbak-5155-rygn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86413?format=api", "vulnerability_id": "VCID-exhf-r9dn-eqde", "summary": "Kernel: netfilter: nf_nat: leakage of uninitialized buffer in IRC NAT helper", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1690.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1690.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1690", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.008", "scoring_system": "epss", "scoring_elements": "0.74009", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.008", "scoring_system": "epss", "scoring_elements": "0.74016", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.008", "scoring_system": "epss", "scoring_elements": "0.74042", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.008", "scoring_system": "epss", "scoring_elements": "0.74013", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.008", "scoring_system": "epss", "scoring_elements": "0.74046", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.008", "scoring_system": "epss", "scoring_elements": "0.74061", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.008", "scoring_system": "epss", "scoring_elements": "0.74083", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.008", "scoring_system": "epss", "scoring_elements": "0.74065", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.008", "scoring_system": "epss", "scoring_elements": "0.74058", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.008", "scoring_system": "epss", "scoring_elements": "0.74097", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.008", "scoring_system": "epss", "scoring_elements": "0.74106", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.008", "scoring_system": "epss", "scoring_elements": "0.74098", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.008", "scoring_system": "epss", "scoring_elements": "0.74133", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.008", "scoring_system": "epss", "scoring_elements": "0.74141", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.008", "scoring_system": "epss", "scoring_elements": "0.7414", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1690" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1690", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1690" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1058748", "reference_id": "1058748", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1058748" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0439", "reference_id": "RHSA-2014:0439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0439" }, { "reference_url": "https://usn.ubuntu.com/2137-1/", "reference_id": "USN-2137-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2137-1/" }, { "reference_url": "https://usn.ubuntu.com/2140-1/", "reference_id": "USN-2140-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2140-1/" }, { "reference_url": "https://usn.ubuntu.com/2158-1/", "reference_id": "USN-2158-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2158-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-1690" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-exhf-r9dn-eqde" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86522?format=api", "vulnerability_id": "VCID-vevd-uruj-fqad", "summary": "kernel: ipc: ipc_rcu_putref refcount races", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4483.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4483.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4483", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.2586", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25923", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25965", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25732", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25803", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25855", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25866", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25824", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25768", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.2577", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25753", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25725", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.2567", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25661", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25612", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4483" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4483", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4483" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1024854", "reference_id": "1024854", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1024854" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0285", "reference_id": "RHSA-2014:0285", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0285" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0439", "reference_id": "RHSA-2014:0439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0439" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1392", "reference_id": "RHSA-2014:1392", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1392" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0284", "reference_id": "RHSA-2015:0284", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0284" }, { "reference_url": "https://usn.ubuntu.com/2221-1/", "reference_id": "USN-2221-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2221-1/" }, { "reference_url": "https://usn.ubuntu.com/2223-1/", "reference_id": "USN-2223-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2223-1/" }, { "reference_url": "https://usn.ubuntu.com/2227-1/", "reference_id": "USN-2227-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2227-1/" }, { "reference_url": "https://usn.ubuntu.com/2233-1/", "reference_id": "USN-2233-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2233-1/" }, { "reference_url": "https://usn.ubuntu.com/2234-1/", "reference_id": "USN-2234-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2234-1/" }, { "reference_url": "https://usn.ubuntu.com/2238-1/", "reference_id": "USN-2238-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2238-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-4483" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vevd-uruj-fqad" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86370?format=api", "vulnerability_id": "VCID-xdw5-pdeh-qbag", "summary": "kernel: cifs: incorrect handling of bogus user pointers during uncached writes", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0069.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0069.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0069", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15299", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15336", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15406", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15209", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15298", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15348", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.1531", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15271", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15205", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.1512", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15127", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15184", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15223", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15222", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15165", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0069" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0069", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0069" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1064253", "reference_id": "1064253", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1064253" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741958", "reference_id": "741958", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0328", "reference_id": "RHSA-2014:0328", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0328" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0439", "reference_id": "RHSA-2014:0439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0439" }, { "reference_url": "https://usn.ubuntu.com/2175-1/", "reference_id": "USN-2175-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2175-1/" }, { "reference_url": "https://usn.ubuntu.com/2176-1/", "reference_id": "USN-2176-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2176-1/" }, { "reference_url": "https://usn.ubuntu.com/2177-1/", "reference_id": "USN-2177-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2177-1/" }, { "reference_url": "https://usn.ubuntu.com/2178-1/", "reference_id": "USN-2178-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2178-1/" }, { "reference_url": "https://usn.ubuntu.com/2179-1/", "reference_id": "USN-2179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2179-1/" }, { "reference_url": "https://usn.ubuntu.com/2180-1/", "reference_id": "USN-2180-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2180-1/" }, { "reference_url": "https://usn.ubuntu.com/2181-1/", "reference_id": "USN-2181-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2181-1/" }, { "reference_url": "https://usn.ubuntu.com/2221-1/", "reference_id": "USN-2221-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2221-1/" }, { "reference_url": "https://usn.ubuntu.com/2227-1/", "reference_id": "USN-2227-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2227-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-0069" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xdw5-pdeh-qbag" } ], "fixing_vulnerabilities": [], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@3.10.33-rt32.33%3Farch=el6rt" }