Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/942222?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/942222?format=api", "purl": "pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid", "type": "deb", "namespace": "debian", "name": "virtualbox", "version": "6.1.12-dfsg-1", "qualifiers": { "distro": "sid" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "6.1.16-dfsg-1", "latest_non_vulnerable_version": "7.2.8-dfsg-1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47437?format=api", "vulnerability_id": "VCID-1kvg-9jhd-vuhq", "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n of which could allow an attacker to take control of VirtualBox.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14712", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00312", "scoring_system": "epss", "scoring_elements": "0.5433", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00312", "scoring_system": "epss", "scoring_elements": "0.54289", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00312", "scoring_system": "epss", "scoring_elements": "0.54375", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00312", "scoring_system": "epss", "scoring_elements": "0.54339", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00312", "scoring_system": "epss", "scoring_elements": "0.54354", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00312", "scoring_system": "epss", "scoring_elements": "0.54269", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00312", "scoring_system": "epss", "scoring_elements": "0.54319", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00312", "scoring_system": "epss", "scoring_elements": "0.54294", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00312", "scoring_system": "epss", "scoring_elements": "0.54345", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00312", "scoring_system": "epss", "scoring_elements": "0.54341", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00312", "scoring_system": "epss", "scoring_elements": "0.5439", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00312", "scoring_system": "epss", "scoring_elements": "0.54372", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00312", "scoring_system": "epss", "scoring_elements": "0.54351", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00312", "scoring_system": "epss", "scoring_elements": "0.54394", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14712" }, { "reference_url": "https://security.gentoo.org/glsa/202101-09", "reference_id": "GLSA-202101-09", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:10Z/" } ], "url": "https://security.gentoo.org/glsa/202101-09" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html", "reference_id": "msg00068.html", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:10Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html", "reference_id": "msg00079.html", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:10Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942222?format=api", "purl": "pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/942186?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059665?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1088739?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.8-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.8-dfsg-1%3Fdistro=sid" } ], "aliases": [ "CVE-2020-14712" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1kvg-9jhd-vuhq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47422?format=api", "vulnerability_id": "VCID-1ms1-6m6u-bkca", "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n of which could allow an attacker to take control of VirtualBox.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14676", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36498", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36989", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36911", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36895", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36837", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36618", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36586", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36832", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.37024", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36852", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36902", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36918", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36926", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36891", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36866", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14676" }, { "reference_url": "https://security.gentoo.org/glsa/202101-09", "reference_id": "GLSA-202101-09", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:47Z/" } ], "url": "https://security.gentoo.org/glsa/202101-09" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html", "reference_id": "msg00068.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:47Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html", "reference_id": "msg00079.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:47Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" }, { "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-20-894/", "reference_id": "ZDI-20-894", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:47Z/" } ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-894/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942222?format=api", "purl": "pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/942186?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059665?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1088739?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.8-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.8-dfsg-1%3Fdistro=sid" } ], "aliases": [ "CVE-2020-14676" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1ms1-6m6u-bkca" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47416?format=api", "vulnerability_id": "VCID-3acw-eupj-2fad", "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n of which could allow an attacker to take control of VirtualBox.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14649", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36498", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36989", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36911", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36895", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36837", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36618", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36586", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36832", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.37024", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36852", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36902", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36918", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36926", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36891", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36866", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14649" }, { "reference_url": "https://security.gentoo.org/glsa/202101-09", "reference_id": "GLSA-202101-09", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:53Z/" } ], "url": "https://security.gentoo.org/glsa/202101-09" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html", "reference_id": "msg00068.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:53Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html", "reference_id": "msg00079.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:53Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" }, { "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-20-891/", "reference_id": "ZDI-20-891", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:53Z/" } ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-891/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942222?format=api", "purl": "pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/942186?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059665?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1088739?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.8-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.8-dfsg-1%3Fdistro=sid" } ], "aliases": [ "CVE-2020-14649" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3acw-eupj-2fad" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47414?format=api", "vulnerability_id": "VCID-3nyp-v4dh-k7ft", "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n of which could allow an attacker to take control of VirtualBox.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14647", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36498", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36989", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36911", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36895", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36837", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36618", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36586", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36832", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.37024", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36852", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36902", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36918", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36926", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36891", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36866", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14647" }, { "reference_url": "https://security.gentoo.org/glsa/202101-09", "reference_id": "GLSA-202101-09", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:54Z/" } ], "url": "https://security.gentoo.org/glsa/202101-09" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html", "reference_id": "msg00068.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:54Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html", "reference_id": "msg00079.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:54Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" }, { "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-20-890/", "reference_id": "ZDI-20-890", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:54Z/" } ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-890/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942222?format=api", "purl": "pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/942186?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059665?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1088739?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.8-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.8-dfsg-1%3Fdistro=sid" } ], "aliases": [ "CVE-2020-14647" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3nyp-v4dh-k7ft" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47411?format=api", "vulnerability_id": "VCID-3y4z-5rfm-83g8", "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n of which could allow an attacker to take control of VirtualBox.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14628", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39179", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39569", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39585", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39555", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39471", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39276", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.3926", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39406", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39592", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39508", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39563", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39578", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39589", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39551", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39535", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14628" }, { "reference_url": "https://security.gentoo.org/glsa/202101-09", "reference_id": "GLSA-202101-09", "reference_type": "", "scores": [ { "value": "8.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:57Z/" } ], "url": "https://security.gentoo.org/glsa/202101-09" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html", "reference_id": "msg00068.html", "reference_type": "", "scores": [ { "value": "8.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:57Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html", "reference_id": "msg00079.html", "reference_type": "", "scores": [ { "value": "8.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:57Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" }, { "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-20-886/", "reference_id": "ZDI-20-886", "reference_type": "", "scores": [ { "value": "8.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:57Z/" } ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-886/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942222?format=api", "purl": "pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/942186?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059665?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1088739?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.8-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.8-dfsg-1%3Fdistro=sid" } ], "aliases": [ "CVE-2020-14628" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3y4z-5rfm-83g8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47415?format=api", "vulnerability_id": "VCID-4nyx-grab-93ha", "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n of which could allow an attacker to take control of VirtualBox.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14648", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34634", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35068", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35034", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35019", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34973", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34743", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34724", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.3487", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35095", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34975", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.3502", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35048", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35052", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35016", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34993", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14648" }, { "reference_url": "https://security.gentoo.org/glsa/202101-09", "reference_id": "GLSA-202101-09", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:33Z/" } ], "url": "https://security.gentoo.org/glsa/202101-09" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html", "reference_id": "msg00068.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:33Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html", "reference_id": "msg00079.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:33Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" }, { "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-20-889/", "reference_id": "ZDI-20-889", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:33Z/" } ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-889/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942222?format=api", "purl": "pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/942186?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059665?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1088739?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.8-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.8-dfsg-1%3Fdistro=sid" } ], "aliases": [ "CVE-2020-14648" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4nyx-grab-93ha" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47439?format=api", "vulnerability_id": "VCID-4vcx-trqp-97af", "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n of which could allow an attacker to take control of VirtualBox.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14714", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.25951", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26287", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26064", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26004", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.25999", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26207", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26328", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.261", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26167", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26215", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26224", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26178", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26119", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26124", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26102", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14714" }, { "reference_url": "https://security.gentoo.org/glsa/202101-09", "reference_id": "GLSA-202101-09", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:09Z/" } ], "url": "https://security.gentoo.org/glsa/202101-09" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html", "reference_id": "msg00068.html", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:09Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html", "reference_id": "msg00079.html", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:09Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942222?format=api", "purl": "pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/942186?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059665?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1088739?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.8-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.8-dfsg-1%3Fdistro=sid" } ], "aliases": [ "CVE-2020-14714" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4vcx-trqp-97af" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47433?format=api", "vulnerability_id": "VCID-4xnp-72y4-2uh4", "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n of which could allow an attacker to take control of VirtualBox.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14703", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.36936", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37436", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37348", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37331", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37276", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37053", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37022", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37271", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.3746", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37289", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.3734", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37351", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37363", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37329", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37301", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14703" }, { "reference_url": "https://security.gentoo.org/glsa/202101-09", "reference_id": "GLSA-202101-09", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:22Z/" } ], "url": "https://security.gentoo.org/glsa/202101-09" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html", "reference_id": "msg00068.html", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:22Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html", "reference_id": "msg00079.html", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:22Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" }, { "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-20-905/", "reference_id": "ZDI-20-905", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:22Z/" } ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-905/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942222?format=api", "purl": "pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/942186?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059665?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1088739?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.8-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.8-dfsg-1%3Fdistro=sid" } ], "aliases": [ "CVE-2020-14703" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4xnp-72y4-2uh4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47435?format=api", "vulnerability_id": "VCID-7gts-v1hm-sbgs", "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n of which could allow an attacker to take control of VirtualBox.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14707", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00221", "scoring_system": "epss", "scoring_elements": "0.44569", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00221", "scoring_system": "epss", "scoring_elements": "0.44743", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00221", "scoring_system": "epss", "scoring_elements": "0.44721", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00221", "scoring_system": "epss", "scoring_elements": "0.4464", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00221", "scoring_system": "epss", "scoring_elements": "0.44647", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00221", "scoring_system": "epss", "scoring_elements": "0.44663", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00221", "scoring_system": "epss", "scoring_elements": "0.44764", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00221", "scoring_system": "epss", "scoring_elements": "0.44702", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00221", "scoring_system": "epss", "scoring_elements": "0.44755", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00221", "scoring_system": "epss", "scoring_elements": "0.44758", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00221", "scoring_system": "epss", "scoring_elements": "0.44774", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00221", "scoring_system": "epss", "scoring_elements": "0.44744", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00221", "scoring_system": "epss", "scoring_elements": "0.44799", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00221", "scoring_system": "epss", "scoring_elements": "0.44791", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14707" }, { "reference_url": "https://security.gentoo.org/glsa/202101-09", "reference_id": "GLSA-202101-09", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:16Z/" } ], "url": "https://security.gentoo.org/glsa/202101-09" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html", "reference_id": "msg00068.html", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:16Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html", "reference_id": "msg00079.html", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:16Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942222?format=api", "purl": "pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/942186?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059665?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1088739?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.8-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.8-dfsg-1%3Fdistro=sid" } ], "aliases": [ "CVE-2020-14707" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7gts-v1hm-sbgs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47432?format=api", "vulnerability_id": "VCID-96ab-3phb-mqe1", "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n of which could allow an attacker to take control of VirtualBox.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14700", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34634", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35068", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35034", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35019", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34973", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34743", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34724", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.3487", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35095", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34975", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.3502", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35048", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35052", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35016", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34993", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14700" }, { "reference_url": "https://security.gentoo.org/glsa/202101-09", "reference_id": "GLSA-202101-09", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:26Z/" } ], "url": "https://security.gentoo.org/glsa/202101-09" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html", "reference_id": "msg00068.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:26Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html", "reference_id": "msg00079.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:26Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" }, { "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-20-903/", "reference_id": "ZDI-20-903", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:26Z/" } ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-903/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942222?format=api", "purl": "pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/942186?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059665?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1088739?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.8-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.8-dfsg-1%3Fdistro=sid" } ], "aliases": [ "CVE-2020-14700" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-96ab-3phb-mqe1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47425?format=api", "vulnerability_id": "VCID-ace3-vcfx-fkby", "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n of which could allow an attacker to take control of VirtualBox.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14694", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34634", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35068", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35034", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35019", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34973", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34743", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34724", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.3487", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35095", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34975", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.3502", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35048", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35052", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35016", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34993", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14694" }, { "reference_url": "https://security.gentoo.org/glsa/202101-09", "reference_id": "GLSA-202101-09", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:33Z/" } ], "url": "https://security.gentoo.org/glsa/202101-09" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html", "reference_id": "msg00068.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:33Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html", "reference_id": "msg00079.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:33Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" }, { "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-20-899/", "reference_id": "ZDI-20-899", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:33Z/" } ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-899/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942222?format=api", "purl": "pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/942186?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059665?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1088739?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.8-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.8-dfsg-1%3Fdistro=sid" } ], "aliases": [ "CVE-2020-14694" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ace3-vcfx-fkby" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47427?format=api", "vulnerability_id": "VCID-cud1-bcu6-1ydf", "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n of which could allow an attacker to take control of VirtualBox.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14695", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34634", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35068", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35034", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35019", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34973", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34743", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34724", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.3487", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35095", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34975", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.3502", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35048", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35052", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35016", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34993", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14695" }, { "reference_url": "https://security.gentoo.org/glsa/202101-09", "reference_id": "GLSA-202101-09", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:31Z/" } ], "url": "https://security.gentoo.org/glsa/202101-09" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html", "reference_id": "msg00068.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:31Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html", "reference_id": "msg00079.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:31Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" }, { "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-20-900/", "reference_id": "ZDI-20-900", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:31Z/" } ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-900/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942222?format=api", "purl": "pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/942186?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059665?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1088739?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.8-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.8-dfsg-1%3Fdistro=sid" } ], "aliases": [ "CVE-2020-14695" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cud1-bcu6-1ydf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47418?format=api", "vulnerability_id": "VCID-eqve-qqdp-13ah", "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n of which could allow an attacker to take control of VirtualBox.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14650", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34634", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35068", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35034", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35019", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34973", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34743", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34724", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.3487", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35095", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34975", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.3502", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35048", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35052", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35016", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34993", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14650" }, { "reference_url": "https://security.gentoo.org/glsa/202101-09", "reference_id": "GLSA-202101-09", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:31Z/" } ], "url": "https://security.gentoo.org/glsa/202101-09" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html", "reference_id": "msg00068.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:31Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html", "reference_id": "msg00079.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:31Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" }, { "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-20-892/", "reference_id": "ZDI-20-892", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:31Z/" } ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-892/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942222?format=api", "purl": "pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/942186?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059665?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1088739?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.8-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.8-dfsg-1%3Fdistro=sid" } ], "aliases": [ "CVE-2020-14650" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eqve-qqdp-13ah" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47421?format=api", "vulnerability_id": "VCID-fv28-4e9k-pqhv", "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n of which could allow an attacker to take control of VirtualBox.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14675", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31166", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31696", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.316", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31577", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31545", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31372", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31246", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31559", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.3174", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31558", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.3161", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31639", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31643", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31601", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31565", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14675" }, { "reference_url": "https://security.gentoo.org/glsa/202101-09", "reference_id": "GLSA-202101-09", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:48Z/" } ], "url": "https://security.gentoo.org/glsa/202101-09" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html", "reference_id": "msg00068.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:48Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html", "reference_id": "msg00079.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:48Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" }, { "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-20-895/", "reference_id": "ZDI-20-895", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:48Z/" } ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-895/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942222?format=api", "purl": "pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/942186?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059665?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1088739?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.8-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.8-dfsg-1%3Fdistro=sid" } ], "aliases": [ "CVE-2020-14675" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fv28-4e9k-pqhv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47428?format=api", "vulnerability_id": "VCID-nqkb-c7nt-17fj", "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n of which could allow an attacker to take control of VirtualBox.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14698", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34634", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35068", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35034", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35019", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34973", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34743", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34724", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.3487", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35095", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34975", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.3502", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35048", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35052", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35016", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34993", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14698" }, { "reference_url": "https://security.gentoo.org/glsa/202101-09", "reference_id": "GLSA-202101-09", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:29Z/" } ], "url": "https://security.gentoo.org/glsa/202101-09" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html", "reference_id": "msg00068.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:29Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html", "reference_id": "msg00079.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:29Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" }, { "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-20-901/", "reference_id": "ZDI-20-901", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:29Z/" } ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-901/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942222?format=api", "purl": "pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/942186?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059665?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1088739?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.8-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.8-dfsg-1%3Fdistro=sid" } ], "aliases": [ "CVE-2020-14698" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nqkb-c7nt-17fj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47419?format=api", "vulnerability_id": "VCID-q9ws-v22k-t7a5", "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n of which could allow an attacker to take control of VirtualBox.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14673", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34634", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35068", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35034", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35019", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34973", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34743", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34724", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.3487", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35095", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34975", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.3502", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35048", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35052", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35016", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34993", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14673" }, { "reference_url": "https://security.gentoo.org/glsa/202101-09", "reference_id": "GLSA-202101-09", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:08Z/" } ], "url": "https://security.gentoo.org/glsa/202101-09" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html", "reference_id": "msg00068.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:08Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html", "reference_id": "msg00079.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:08Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" }, { "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-20-898/", "reference_id": "ZDI-20-898", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:08Z/" } ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-898/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942222?format=api", "purl": "pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/942186?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059665?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1088739?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.8-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.8-dfsg-1%3Fdistro=sid" } ], "aliases": [ "CVE-2020-14673" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q9ws-v22k-t7a5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47438?format=api", "vulnerability_id": "VCID-rjcs-mufm-h7fs", "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n of which could allow an attacker to take control of VirtualBox.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14713", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24656", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24944", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24772", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24711", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24699", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24865", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24985", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24759", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24827", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24871", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24885", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24847", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24791", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24803", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24794", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14713" }, { "reference_url": "https://security.gentoo.org/glsa/202101-09", "reference_id": "GLSA-202101-09", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T19:54:19Z/" } ], "url": "https://security.gentoo.org/glsa/202101-09" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html", "reference_id": "msg00068.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T19:54:19Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html", "reference_id": "msg00079.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T19:54:19Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942222?format=api", "purl": "pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/942186?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059665?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1088739?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.8-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.8-dfsg-1%3Fdistro=sid" } ], "aliases": [ "CVE-2020-14713" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rjcs-mufm-h7fs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47434?format=api", "vulnerability_id": "VCID-rjg7-ntnn-2ya5", "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n of which could allow an attacker to take control of VirtualBox.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14704", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.36936", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37436", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37348", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37331", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37276", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37053", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37022", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37271", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.3746", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37289", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.3734", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37351", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37363", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37329", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37301", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14704" }, { "reference_url": "https://security.gentoo.org/glsa/202101-09", "reference_id": "GLSA-202101-09", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:21Z/" } ], "url": "https://security.gentoo.org/glsa/202101-09" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html", "reference_id": "msg00068.html", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:21Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html", "reference_id": "msg00079.html", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:21Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" }, { "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-20-904/", "reference_id": "ZDI-20-904", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:21Z/" } ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-904/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942222?format=api", "purl": "pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/942186?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059665?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1088739?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.8-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.8-dfsg-1%3Fdistro=sid" } ], "aliases": [ "CVE-2020-14704" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rjg7-ntnn-2ya5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47424?format=api", "vulnerability_id": "VCID-tdga-tubw-53db", "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n of which could allow an attacker to take control of VirtualBox.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14677", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31166", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31696", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.316", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31577", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31545", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31372", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31246", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31559", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.3174", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31558", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.3161", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31639", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31643", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31601", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31565", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14677" }, { "reference_url": "https://security.gentoo.org/glsa/202101-09", "reference_id": "GLSA-202101-09", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:45Z/" } ], "url": "https://security.gentoo.org/glsa/202101-09" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html", "reference_id": "msg00068.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:45Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html", "reference_id": "msg00079.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:45Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" }, { "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-20-893/", "reference_id": "ZDI-20-893", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:45Z/" } ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-893/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942222?format=api", "purl": "pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/942186?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059665?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1088739?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.8-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.8-dfsg-1%3Fdistro=sid" } ], "aliases": [ "CVE-2020-14677" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tdga-tubw-53db" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47430?format=api", "vulnerability_id": "VCID-th8u-azds-w7eg", "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n of which could allow an attacker to take control of VirtualBox.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14699", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36498", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36989", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36911", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36895", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36837", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36618", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36586", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36832", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.37024", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36852", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36902", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36918", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36926", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36891", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36866", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14699" }, { "reference_url": "https://security.gentoo.org/glsa/202101-09", "reference_id": "GLSA-202101-09", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T19:54:26Z/" } ], "url": "https://security.gentoo.org/glsa/202101-09" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html", "reference_id": "msg00068.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T19:54:26Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html", "reference_id": "msg00079.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T19:54:26Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" }, { "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-20-902/", "reference_id": "ZDI-20-902", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T19:54:26Z/" } ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-902/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942222?format=api", "purl": "pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/942186?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059665?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1088739?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.8-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.8-dfsg-1%3Fdistro=sid" } ], "aliases": [ "CVE-2020-14699" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-th8u-azds-w7eg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47440?format=api", "vulnerability_id": "VCID-uvp9-fefd-9kgq", "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n of which could allow an attacker to take control of VirtualBox.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14715", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.25951", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26287", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26064", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26004", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.25999", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26207", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26328", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.261", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26167", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26215", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26224", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26178", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26119", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26124", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26102", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14715" }, { "reference_url": "https://security.gentoo.org/glsa/202101-09", "reference_id": "GLSA-202101-09", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:08Z/" } ], "url": "https://security.gentoo.org/glsa/202101-09" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html", "reference_id": "msg00068.html", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:08Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html", "reference_id": "msg00079.html", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:08Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942222?format=api", "purl": "pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/942186?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059665?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1088739?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.8-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.8-dfsg-1%3Fdistro=sid" } ], "aliases": [ "CVE-2020-14715" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uvp9-fefd-9kgq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47413?format=api", "vulnerability_id": "VCID-va8t-xvrn-kfec", "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n of which could allow an attacker to take control of VirtualBox.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14646", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36498", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36989", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36911", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36895", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36837", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36618", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36586", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36832", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.37024", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36852", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36902", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36918", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36926", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36891", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36866", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14646" }, { "reference_url": "https://security.gentoo.org/glsa/202101-09", "reference_id": "GLSA-202101-09", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:56Z/" } ], "url": "https://security.gentoo.org/glsa/202101-09" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html", "reference_id": "msg00068.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:56Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html", "reference_id": "msg00079.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:56Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" }, { "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-20-888/", "reference_id": "ZDI-20-888", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:56Z/" } ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-888/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942222?format=api", "purl": "pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/942186?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059665?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1088739?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.8-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.8-dfsg-1%3Fdistro=sid" } ], "aliases": [ "CVE-2020-14646" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-va8t-xvrn-kfec" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47420?format=api", "vulnerability_id": "VCID-wcsg-earr-87dm", "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n of which could allow an attacker to take control of VirtualBox.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14674", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.29951", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30392", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30269", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30251", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30207", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30142", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30026", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30363", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30438", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30248", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30308", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30342", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30346", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30302", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30254", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14674" }, { "reference_url": "https://security.gentoo.org/glsa/202101-09", "reference_id": "GLSA-202101-09", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:49Z/" } ], "url": "https://security.gentoo.org/glsa/202101-09" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html", "reference_id": "msg00068.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:49Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html", "reference_id": "msg00079.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:49Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" }, { "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-20-896/", "reference_id": "ZDI-20-896", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:49Z/" } ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-896/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942222?format=api", "purl": "pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/942186?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059665?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1088739?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.8-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.8-dfsg-1%3Fdistro=sid" } ], "aliases": [ "CVE-2020-14674" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wcsg-earr-87dm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47412?format=api", "vulnerability_id": "VCID-xbus-k1re-k3cg", "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n of which could allow an attacker to take control of VirtualBox.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14629", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.36936", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37436", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37348", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37331", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37276", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37053", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37022", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37271", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.3746", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37289", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.3734", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37351", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37363", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37329", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37301", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14629" }, { "reference_url": "https://security.gentoo.org/glsa/202101-09", "reference_id": "GLSA-202101-09", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:00Z/" } ], "url": "https://security.gentoo.org/glsa/202101-09" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html", "reference_id": "msg00068.html", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:00Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html", "reference_id": "msg00079.html", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:00Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" }, { "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-20-887/", "reference_id": "ZDI-20-887", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:00Z/" } ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-887/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942222?format=api", "purl": "pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/942186?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059665?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1088739?format=api", "purl": "pkg:deb/debian/virtualbox@7.2.8-dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.8-dfsg-1%3Fdistro=sid" } ], "aliases": [ "CVE-2020-14629" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xbus-k1re-k3cg" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid" }