Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/925226?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/925226?format=api", "purl": "pkg:deb/debian/icu@52.1-7.1?distro=trixie", "type": "deb", "namespace": "debian", "name": "icu", "version": "52.1-7.1", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "52.1-9", "latest_non_vulnerable_version": "78.3-1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31268?format=api", "vulnerability_id": "VCID-dr2n-9pz1-gfd5", "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n attackers to affect confidentiality, integrity, and availability through\n various vectors.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6585.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6585.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6585", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02579", "scoring_system": "epss", "scoring_elements": "0.85492", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02579", "scoring_system": "epss", "scoring_elements": "0.85504", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02579", "scoring_system": "epss", "scoring_elements": "0.85521", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02579", "scoring_system": "epss", "scoring_elements": "0.85525", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02579", "scoring_system": "epss", "scoring_elements": "0.85545", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02579", "scoring_system": "epss", "scoring_elements": "0.85556", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02579", "scoring_system": "epss", "scoring_elements": "0.8557", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02579", "scoring_system": "epss", "scoring_elements": "0.85567", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02579", "scoring_system": "epss", "scoring_elements": "0.85563", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02579", "scoring_system": "epss", "scoring_elements": "0.85586", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02579", "scoring_system": "epss", "scoring_elements": "0.85591", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02579", "scoring_system": "epss", "scoring_elements": "0.85588", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02579", "scoring_system": "epss", "scoring_elements": "0.85608", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1569", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1569" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2384", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2384" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2419", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2419" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7923", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7923" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7926", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7926" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7940", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7940" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9654", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9654" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183645", "reference_id": "1183645", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183645" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776264", "reference_id": "776264", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776264" }, { "reference_url": "https://security.gentoo.org/glsa/201507-14", "reference_id": "GLSA-201507-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201507-14" }, { "reference_url": "https://security.gentoo.org/glsa/201603-14", "reference_id": "GLSA-201603-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-14" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0067", "reference_id": "RHSA-2015:0067", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0067" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0068", "reference_id": "RHSA-2015:0068", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0068" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0069", "reference_id": "RHSA-2015:0069", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0069" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0079", "reference_id": "RHSA-2015:0079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0079" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0080", "reference_id": "RHSA-2015:0080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0085", "reference_id": "RHSA-2015:0085", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0085" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0086", "reference_id": "RHSA-2015:0086", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0133", "reference_id": "RHSA-2015:0133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0133" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0134", "reference_id": "RHSA-2015:0134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0135", "reference_id": "RHSA-2015:0135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0136", "reference_id": "RHSA-2015:0136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0263", "reference_id": "RHSA-2015:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0263" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0264", "reference_id": "RHSA-2015:0264", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0264" }, { "reference_url": "https://usn.ubuntu.com/2486-1/", "reference_id": "USN-2486-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2486-1/" }, { "reference_url": "https://usn.ubuntu.com/2487-1/", "reference_id": "USN-2487-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2487-1/" }, { "reference_url": "https://usn.ubuntu.com/2522-1/", "reference_id": "USN-2522-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2522-1/" }, { "reference_url": "https://usn.ubuntu.com/2522-3/", "reference_id": "USN-2522-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2522-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/925226?format=api", "purl": "pkg:deb/debian/icu@52.1-7.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@52.1-7.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925218?format=api", "purl": "pkg:deb/debian/icu@67.1-7?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@67.1-7%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925216?format=api", "purl": "pkg:deb/debian/icu@72.1-3%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@72.1-3%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925220?format=api", "purl": "pkg:deb/debian/icu@76.1-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@76.1-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925219?format=api", "purl": "pkg:deb/debian/icu@78.3-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@78.3-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2014-6585" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dr2n-9pz1-gfd5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54611?format=api", "vulnerability_id": "VCID-faut-x7vy-g3dq", "summary": "security update", "references": [ { "reference_url": "http://bugs.icu-project.org/trac/changeset/36801", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.icu-project.org/trac/changeset/36801" }, { "reference_url": "http://bugs.icu-project.org/trac/ticket/11371", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.icu-project.org/trac/ticket/11371" }, { "reference_url": "http://openwall.com/lists/oss-security/2015/02/05/15", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2015/02/05/15" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9654.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9654.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9654", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01671", "scoring_system": "epss", "scoring_elements": "0.82182", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01671", "scoring_system": "epss", "scoring_elements": "0.8216", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01671", "scoring_system": "epss", "scoring_elements": "0.82056", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01671", "scoring_system": "epss", "scoring_elements": "0.82068", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01671", "scoring_system": "epss", "scoring_elements": "0.82089", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01671", "scoring_system": "epss", "scoring_elements": "0.82085", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01671", "scoring_system": "epss", "scoring_elements": "0.82111", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01671", "scoring_system": "epss", "scoring_elements": "0.82118", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01671", "scoring_system": "epss", "scoring_elements": "0.82137", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01671", "scoring_system": "epss", "scoring_elements": "0.82128", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01671", "scoring_system": "epss", "scoring_elements": "0.8212", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01671", "scoring_system": "epss", "scoring_elements": "0.82157", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9654" }, { "reference_url": "https://chromium.googlesource.com/chromium/deps/icu/+/dd727641e190d60e4593bcb3a35c7f51eb4925c5", "reference_id": "", "reference_type": "", "scores": [], "url": "https://chromium.googlesource.com/chromium/deps/icu/+/dd727641e190d60e4593bcb3a35c7f51eb4925c5" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=432209", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=432209" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1569", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1569" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2384", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2384" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2419", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2419" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7923", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7923" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7926", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7926" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7940", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7940" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9654", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9654" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "reference_url": "http://www.securitytracker.com/id/1035410", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035410" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190129", "reference_id": "1190129", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190129" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776719", "reference_id": "776719", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776719" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:icu-project:international_components_for_unicode:*:*:*:*:*:c\\/c\\+\\+:*:*", "reference_id": "cpe:2.3:a:icu-project:international_components_for_unicode:*:*:*:*:*:c\\/c\\+\\+:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:icu-project:international_components_for_unicode:*:*:*:*:*:c\\/c\\+\\+:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9654", "reference_id": "CVE-2014-9654", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9654" }, { "reference_url": "https://security.gentoo.org/glsa/201503-06", "reference_id": "GLSA-201503-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0093", "reference_id": "RHSA-2015:0093", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0093" }, { "reference_url": "https://usn.ubuntu.com/2522-1/", "reference_id": "USN-2522-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2522-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/925226?format=api", "purl": "pkg:deb/debian/icu@52.1-7.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@52.1-7.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925218?format=api", "purl": "pkg:deb/debian/icu@67.1-7?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@67.1-7%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925216?format=api", "purl": "pkg:deb/debian/icu@72.1-3%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@72.1-3%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925220?format=api", "purl": "pkg:deb/debian/icu@76.1-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@76.1-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925219?format=api", "purl": "pkg:deb/debian/icu@78.3-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@78.3-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2014-9654" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-faut-x7vy-g3dq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34434?format=api", "vulnerability_id": "VCID-jm8s-9gr6-ebax", "summary": "Multiple vulnerabilities have been found in Chromium, the worst of\n which can allow remote attackers to cause Denial of Service or gain\n escalated privileges.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7923.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7923.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-7923", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02277", "scoring_system": "epss", "scoring_elements": "0.84592", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02277", "scoring_system": "epss", "scoring_elements": "0.84607", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02277", "scoring_system": "epss", "scoring_elements": "0.84627", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02277", "scoring_system": "epss", "scoring_elements": "0.84629", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02277", "scoring_system": "epss", "scoring_elements": "0.84651", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02277", "scoring_system": "epss", "scoring_elements": "0.84657", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02277", "scoring_system": "epss", "scoring_elements": "0.84675", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02277", "scoring_system": "epss", "scoring_elements": "0.8467", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02277", "scoring_system": "epss", "scoring_elements": "0.84665", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02277", "scoring_system": "epss", "scoring_elements": "0.84687", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02277", "scoring_system": "epss", "scoring_elements": "0.84688", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02564", "scoring_system": "epss", "scoring_elements": "0.85548", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02564", "scoring_system": "epss", "scoring_elements": "0.8557", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-7923" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1569", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1569" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2384", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2384" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2419", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2419" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7923", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7923" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7926", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7926" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7940", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7940" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9654", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9654" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185202", "reference_id": "1185202", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185202" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776265", "reference_id": "776265", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776265" }, { "reference_url": "https://security.gentoo.org/glsa/201502-13", "reference_id": "GLSA-201502-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201502-13" }, { "reference_url": "https://security.gentoo.org/glsa/201503-06", "reference_id": "GLSA-201503-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0093", "reference_id": "RHSA-2015:0093", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0093" }, { "reference_url": "https://usn.ubuntu.com/2476-1/", "reference_id": "USN-2476-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2476-1/" }, { "reference_url": "https://usn.ubuntu.com/2522-1/", "reference_id": "USN-2522-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2522-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/925226?format=api", "purl": "pkg:deb/debian/icu@52.1-7.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@52.1-7.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925218?format=api", "purl": "pkg:deb/debian/icu@67.1-7?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@67.1-7%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925216?format=api", "purl": "pkg:deb/debian/icu@72.1-3%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@72.1-3%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925220?format=api", "purl": "pkg:deb/debian/icu@76.1-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@76.1-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925219?format=api", "purl": "pkg:deb/debian/icu@78.3-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@78.3-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2014-7923" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jm8s-9gr6-ebax" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34451?format=api", "vulnerability_id": "VCID-mzjf-ej5z-57eh", "summary": "Multiple vulnerabilities have been found in Chromium, the worst of\n which can allow remote attackers to cause Denial of Service or gain\n escalated privileges.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7940.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7940.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-7940", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02151", "scoring_system": "epss", "scoring_elements": "0.84179", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02151", "scoring_system": "epss", "scoring_elements": "0.84193", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02151", "scoring_system": "epss", "scoring_elements": "0.84211", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02151", "scoring_system": "epss", "scoring_elements": "0.84212", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02151", "scoring_system": "epss", "scoring_elements": "0.84234", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02151", "scoring_system": "epss", "scoring_elements": "0.8424", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02151", "scoring_system": "epss", "scoring_elements": "0.84258", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02151", "scoring_system": "epss", "scoring_elements": "0.84253", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02151", "scoring_system": "epss", "scoring_elements": "0.8425", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02151", "scoring_system": "epss", "scoring_elements": "0.84271", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02151", "scoring_system": "epss", "scoring_elements": "0.84273", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02423", "scoring_system": "epss", "scoring_elements": "0.85157", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02423", "scoring_system": "epss", "scoring_elements": "0.85181", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-7940" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1569", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1569" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2384", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2384" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2419", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2419" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7923", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7923" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7926", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7926" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7940", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7940" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9654", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9654" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185220", "reference_id": "1185220", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185220" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776265", "reference_id": "776265", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776265" }, { "reference_url": "https://security.gentoo.org/glsa/201502-13", "reference_id": "GLSA-201502-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201502-13" }, { "reference_url": "https://security.gentoo.org/glsa/201503-06", "reference_id": "GLSA-201503-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0093", "reference_id": "RHSA-2015:0093", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0093" }, { "reference_url": "https://usn.ubuntu.com/2476-1/", "reference_id": "USN-2476-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2476-1/" }, { "reference_url": "https://usn.ubuntu.com/2522-1/", "reference_id": "USN-2522-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2522-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/925226?format=api", "purl": "pkg:deb/debian/icu@52.1-7.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@52.1-7.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925218?format=api", "purl": "pkg:deb/debian/icu@67.1-7?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@67.1-7%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925216?format=api", "purl": "pkg:deb/debian/icu@72.1-3%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@72.1-3%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925220?format=api", "purl": "pkg:deb/debian/icu@76.1-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@76.1-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925219?format=api", "purl": "pkg:deb/debian/icu@78.3-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@78.3-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2014-7940" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mzjf-ej5z-57eh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34437?format=api", "vulnerability_id": "VCID-yz8d-49gf-u3bw", "summary": "Multiple vulnerabilities have been found in Chromium, the worst of\n which can allow remote attackers to cause Denial of Service or gain\n escalated privileges.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7926.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7926.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-7926", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02277", "scoring_system": "epss", "scoring_elements": "0.84592", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02277", "scoring_system": "epss", "scoring_elements": "0.84607", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02277", "scoring_system": "epss", "scoring_elements": "0.84627", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02277", "scoring_system": "epss", "scoring_elements": "0.84629", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02277", "scoring_system": "epss", "scoring_elements": "0.84651", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02277", "scoring_system": "epss", "scoring_elements": "0.84657", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02277", "scoring_system": "epss", "scoring_elements": "0.84675", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02277", "scoring_system": "epss", "scoring_elements": "0.8467", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02277", "scoring_system": "epss", "scoring_elements": "0.84665", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02277", "scoring_system": "epss", "scoring_elements": "0.84687", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02277", "scoring_system": "epss", "scoring_elements": "0.84688", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02564", "scoring_system": "epss", "scoring_elements": "0.85548", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02564", "scoring_system": "epss", "scoring_elements": "0.8557", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-7926" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1569", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1569" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2384", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2384" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2419", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2419" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7923", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7923" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7926", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7926" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7940", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7940" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9654", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9654" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185205", "reference_id": "1185205", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185205" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776265", "reference_id": "776265", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776265" }, { "reference_url": "https://security.gentoo.org/glsa/201502-13", "reference_id": "GLSA-201502-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201502-13" }, { "reference_url": "https://security.gentoo.org/glsa/201503-06", "reference_id": "GLSA-201503-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0093", "reference_id": "RHSA-2015:0093", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0093" }, { "reference_url": "https://usn.ubuntu.com/2476-1/", "reference_id": "USN-2476-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2476-1/" }, { "reference_url": "https://usn.ubuntu.com/2522-1/", "reference_id": "USN-2522-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2522-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/925226?format=api", "purl": "pkg:deb/debian/icu@52.1-7.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@52.1-7.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925218?format=api", "purl": "pkg:deb/debian/icu@67.1-7?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@67.1-7%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925216?format=api", "purl": "pkg:deb/debian/icu@72.1-3%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@72.1-3%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925220?format=api", "purl": "pkg:deb/debian/icu@76.1-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@76.1-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925219?format=api", "purl": "pkg:deb/debian/icu@78.3-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@78.3-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2014-7926" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yz8d-49gf-u3bw" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@52.1-7.1%3Fdistro=trixie" }