Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-mzd5-dwty-bqhf
Summary
Multiple vulnerabilities have been found in Python, the worst of
    which could lead to arbitrary code execution.
Aliases
0
alias CVE-2014-7185
Fixed_packages
0
url pkg:deb/debian/python2.7@2.7.8-1?distro=bullseye
purl pkg:deb/debian/python2.7@2.7.8-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python2.7@2.7.8-1%3Fdistro=bullseye
1
url pkg:deb/debian/python2.7@2.7.9-2
purl pkg:deb/debian/python2.7@2.7.9-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1taa-a9e4-tbc5
1
vulnerability VCID-2czu-wy37-qugf
2
vulnerability VCID-2shb-2cvn-dyd2
3
vulnerability VCID-3mu8-g6x3-effb
4
vulnerability VCID-4py6-hkzp-v3d4
5
vulnerability VCID-4q79-666d-rygx
6
vulnerability VCID-4z89-3tfk-pyge
7
vulnerability VCID-57c6-hx7f-efc6
8
vulnerability VCID-7jat-6ags-qbdr
9
vulnerability VCID-9mcr-rmtb-mufj
10
vulnerability VCID-c97c-3177-wkhx
11
vulnerability VCID-dkxn-j9dr-sqbp
12
vulnerability VCID-dv5v-71b5-budp
13
vulnerability VCID-gfzb-b7tt-fkgz
14
vulnerability VCID-gkfp-ga1r-jkag
15
vulnerability VCID-hcq4-yq9k-jygb
16
vulnerability VCID-hgwh-tzsf-suc1
17
vulnerability VCID-j9s6-2y47-zbbt
18
vulnerability VCID-k18q-3e9y-ykgf
19
vulnerability VCID-ppqx-qup8-sqbz
20
vulnerability VCID-tyk4-kazt-kydj
21
vulnerability VCID-ugfy-dufq-hfb2
22
vulnerability VCID-v84j-ugn9-w3c8
23
vulnerability VCID-vpwj-d49q-1uh8
24
vulnerability VCID-w6k8-js68-87g4
25
vulnerability VCID-wq7w-nrar-ykde
26
vulnerability VCID-wxhp-wayg-qbd1
27
vulnerability VCID-x7h3-nmjt-aud5
28
vulnerability VCID-xv9p-nyha-xygv
29
vulnerability VCID-yqm8-fk44-4yhk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python2.7@2.7.9-2
2
url pkg:deb/debian/python2.7@2.7.18-8%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/python2.7@2.7.18-8%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python2.7@2.7.18-8%252Bdeb11u1%3Fdistro=bullseye
3
url pkg:ebuild/dev-lang/python@2.7.9-r1
purl pkg:ebuild/dev-lang/python@2.7.9-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/python@2.7.9-r1
4
url pkg:ebuild/dev-lang/python@3.3.5-r1
purl pkg:ebuild/dev-lang/python@3.3.5-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/python@3.3.5-r1
Affected_packages
0
url pkg:deb/debian/python2.7@2.7.3-6%2Bdeb7u2
purl pkg:deb/debian/python2.7@2.7.3-6%2Bdeb7u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1mw1-384y-huc7
1
vulnerability VCID-1taa-a9e4-tbc5
2
vulnerability VCID-2czu-wy37-qugf
3
vulnerability VCID-2shb-2cvn-dyd2
4
vulnerability VCID-3mu8-g6x3-effb
5
vulnerability VCID-4py6-hkzp-v3d4
6
vulnerability VCID-4q79-666d-rygx
7
vulnerability VCID-4z89-3tfk-pyge
8
vulnerability VCID-57c6-hx7f-efc6
9
vulnerability VCID-7jat-6ags-qbdr
10
vulnerability VCID-8aq9-8cf5-qbet
11
vulnerability VCID-8jfv-cqa8-7yb6
12
vulnerability VCID-9jj2-hsne-mbac
13
vulnerability VCID-9mcr-rmtb-mufj
14
vulnerability VCID-c97c-3177-wkhx
15
vulnerability VCID-dkxn-j9dr-sqbp
16
vulnerability VCID-dv5v-71b5-budp
17
vulnerability VCID-ez5b-fvw8-hkh3
18
vulnerability VCID-f5vu-k9rc-27fz
19
vulnerability VCID-g81p-pg7g-xfcf
20
vulnerability VCID-gfzb-b7tt-fkgz
21
vulnerability VCID-gkfp-ga1r-jkag
22
vulnerability VCID-hcq4-yq9k-jygb
23
vulnerability VCID-hgwh-tzsf-suc1
24
vulnerability VCID-j9s6-2y47-zbbt
25
vulnerability VCID-k18q-3e9y-ykgf
26
vulnerability VCID-mzd5-dwty-bqhf
27
vulnerability VCID-ppqx-qup8-sqbz
28
vulnerability VCID-tyk4-kazt-kydj
29
vulnerability VCID-ugfy-dufq-hfb2
30
vulnerability VCID-v84j-ugn9-w3c8
31
vulnerability VCID-vpwj-d49q-1uh8
32
vulnerability VCID-w6k8-js68-87g4
33
vulnerability VCID-w85n-mm5g-5yd1
34
vulnerability VCID-wq7w-nrar-ykde
35
vulnerability VCID-wxhp-wayg-qbd1
36
vulnerability VCID-x7h3-nmjt-aud5
37
vulnerability VCID-xv9p-nyha-xygv
38
vulnerability VCID-yqm8-fk44-4yhk
39
vulnerability VCID-z6kh-961g-duck
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python2.7@2.7.3-6%252Bdeb7u2
1
url pkg:rpm/redhat/python@2.6.6-64?arch=el6
purl pkg:rpm/redhat/python@2.6.6-64?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8jfv-cqa8-7yb6
1
vulnerability VCID-ez5b-fvw8-hkh3
2
vulnerability VCID-mzd5-dwty-bqhf
3
vulnerability VCID-p57a-y8r3-qucc
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python@2.6.6-64%3Farch=el6
2
url pkg:rpm/redhat/python@2.7.5-34?arch=el7
purl pkg:rpm/redhat/python@2.7.5-34?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8jfv-cqa8-7yb6
1
vulnerability VCID-f5vu-k9rc-27fz
2
vulnerability VCID-mzd5-dwty-bqhf
3
vulnerability VCID-p57a-y8r3-qucc
4
vulnerability VCID-w85n-mm5g-5yd1
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python@2.7.5-34%3Farch=el7
3
url pkg:rpm/redhat/python27@1.1-17?arch=el6
purl pkg:rpm/redhat/python27@1.1-17?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8jfv-cqa8-7yb6
1
vulnerability VCID-ez5b-fvw8-hkh3
2
vulnerability VCID-f5vu-k9rc-27fz
3
vulnerability VCID-mzd5-dwty-bqhf
4
vulnerability VCID-p57a-y8r3-qucc
5
vulnerability VCID-w85n-mm5g-5yd1
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python27@1.1-17%3Farch=el6
4
url pkg:rpm/redhat/python27@1.1-20?arch=el7
purl pkg:rpm/redhat/python27@1.1-20?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8jfv-cqa8-7yb6
1
vulnerability VCID-ez5b-fvw8-hkh3
2
vulnerability VCID-f5vu-k9rc-27fz
3
vulnerability VCID-mzd5-dwty-bqhf
4
vulnerability VCID-p57a-y8r3-qucc
5
vulnerability VCID-w85n-mm5g-5yd1
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python27@1.1-20%3Farch=el7
5
url pkg:rpm/redhat/python27-python@2.7.8-3?arch=el7
purl pkg:rpm/redhat/python27-python@2.7.8-3?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8jfv-cqa8-7yb6
1
vulnerability VCID-ez5b-fvw8-hkh3
2
vulnerability VCID-f5vu-k9rc-27fz
3
vulnerability VCID-mzd5-dwty-bqhf
4
vulnerability VCID-p57a-y8r3-qucc
5
vulnerability VCID-w85n-mm5g-5yd1
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python27-python@2.7.8-3%3Farch=el7
6
url pkg:rpm/redhat/python27-python@2.7.8-3?arch=el6
purl pkg:rpm/redhat/python27-python@2.7.8-3?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8jfv-cqa8-7yb6
1
vulnerability VCID-ez5b-fvw8-hkh3
2
vulnerability VCID-f5vu-k9rc-27fz
3
vulnerability VCID-mzd5-dwty-bqhf
4
vulnerability VCID-p57a-y8r3-qucc
5
vulnerability VCID-w85n-mm5g-5yd1
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python27-python@2.7.8-3%3Farch=el6
7
url pkg:rpm/redhat/python27-python-pip@1.5.6-5?arch=el6
purl pkg:rpm/redhat/python27-python-pip@1.5.6-5?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8jfv-cqa8-7yb6
1
vulnerability VCID-ez5b-fvw8-hkh3
2
vulnerability VCID-f5vu-k9rc-27fz
3
vulnerability VCID-mzd5-dwty-bqhf
4
vulnerability VCID-p57a-y8r3-qucc
5
vulnerability VCID-w85n-mm5g-5yd1
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python27-python-pip@1.5.6-5%3Farch=el6
8
url pkg:rpm/redhat/python27-python-pip@1.5.6-5?arch=el7
purl pkg:rpm/redhat/python27-python-pip@1.5.6-5?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8jfv-cqa8-7yb6
1
vulnerability VCID-ez5b-fvw8-hkh3
2
vulnerability VCID-f5vu-k9rc-27fz
3
vulnerability VCID-mzd5-dwty-bqhf
4
vulnerability VCID-p57a-y8r3-qucc
5
vulnerability VCID-w85n-mm5g-5yd1
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python27-python-pip@1.5.6-5%3Farch=el7
9
url pkg:rpm/redhat/python27-python-setuptools@0.9.8-3?arch=el6
purl pkg:rpm/redhat/python27-python-setuptools@0.9.8-3?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8jfv-cqa8-7yb6
1
vulnerability VCID-ez5b-fvw8-hkh3
2
vulnerability VCID-f5vu-k9rc-27fz
3
vulnerability VCID-mzd5-dwty-bqhf
4
vulnerability VCID-p57a-y8r3-qucc
5
vulnerability VCID-w85n-mm5g-5yd1
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python27-python-setuptools@0.9.8-3%3Farch=el6
10
url pkg:rpm/redhat/python27-python-setuptools@0.9.8-5?arch=el7
purl pkg:rpm/redhat/python27-python-setuptools@0.9.8-5?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8jfv-cqa8-7yb6
1
vulnerability VCID-ez5b-fvw8-hkh3
2
vulnerability VCID-f5vu-k9rc-27fz
3
vulnerability VCID-mzd5-dwty-bqhf
4
vulnerability VCID-p57a-y8r3-qucc
5
vulnerability VCID-w85n-mm5g-5yd1
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python27-python-setuptools@0.9.8-5%3Farch=el7
11
url pkg:rpm/redhat/python27-python-simplejson@3.2.0-2?arch=el6
purl pkg:rpm/redhat/python27-python-simplejson@3.2.0-2?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8jfv-cqa8-7yb6
1
vulnerability VCID-ez5b-fvw8-hkh3
2
vulnerability VCID-f5vu-k9rc-27fz
3
vulnerability VCID-mzd5-dwty-bqhf
4
vulnerability VCID-p57a-y8r3-qucc
5
vulnerability VCID-w85n-mm5g-5yd1
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python27-python-simplejson@3.2.0-2%3Farch=el6
12
url pkg:rpm/redhat/python27-python-simplejson@3.2.0-3?arch=el7
purl pkg:rpm/redhat/python27-python-simplejson@3.2.0-3?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8jfv-cqa8-7yb6
1
vulnerability VCID-ez5b-fvw8-hkh3
2
vulnerability VCID-f5vu-k9rc-27fz
3
vulnerability VCID-mzd5-dwty-bqhf
4
vulnerability VCID-p57a-y8r3-qucc
5
vulnerability VCID-w85n-mm5g-5yd1
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python27-python-simplejson@3.2.0-3%3Farch=el7
13
url pkg:rpm/redhat/python27-python-wheel@0.24.0-2?arch=el7
purl pkg:rpm/redhat/python27-python-wheel@0.24.0-2?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8jfv-cqa8-7yb6
1
vulnerability VCID-ez5b-fvw8-hkh3
2
vulnerability VCID-f5vu-k9rc-27fz
3
vulnerability VCID-mzd5-dwty-bqhf
4
vulnerability VCID-p57a-y8r3-qucc
5
vulnerability VCID-w85n-mm5g-5yd1
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python27-python-wheel@0.24.0-2%3Farch=el7
14
url pkg:rpm/redhat/python27-python-wheel@0.24.0-2?arch=el6
purl pkg:rpm/redhat/python27-python-wheel@0.24.0-2?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8jfv-cqa8-7yb6
1
vulnerability VCID-ez5b-fvw8-hkh3
2
vulnerability VCID-f5vu-k9rc-27fz
3
vulnerability VCID-mzd5-dwty-bqhf
4
vulnerability VCID-p57a-y8r3-qucc
5
vulnerability VCID-w85n-mm5g-5yd1
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python27-python-wheel@0.24.0-2%3Farch=el6
References
0
reference_url http://bugs.python.org/issue21831
reference_id
reference_type
scores
url http://bugs.python.org/issue21831
1
reference_url http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/139663.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/139663.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2014-10/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-10/msg00016.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2015-1064.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1064.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2015-1330.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1330.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7185.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7185.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-7185
reference_id
reference_type
scores
0
value 0.0087
scoring_system epss
scoring_elements 0.75228
published_at 2026-04-18T12:55:00Z
1
value 0.0087
scoring_system epss
scoring_elements 0.75142
published_at 2026-04-01T12:55:00Z
2
value 0.0087
scoring_system epss
scoring_elements 0.75145
published_at 2026-04-02T12:55:00Z
3
value 0.0087
scoring_system epss
scoring_elements 0.75176
published_at 2026-04-04T12:55:00Z
4
value 0.0087
scoring_system epss
scoring_elements 0.75152
published_at 2026-04-07T12:55:00Z
5
value 0.0087
scoring_system epss
scoring_elements 0.75186
published_at 2026-04-08T12:55:00Z
6
value 0.0087
scoring_system epss
scoring_elements 0.75198
published_at 2026-04-09T12:55:00Z
7
value 0.0087
scoring_system epss
scoring_elements 0.75219
published_at 2026-04-11T12:55:00Z
8
value 0.0087
scoring_system epss
scoring_elements 0.75197
published_at 2026-04-12T12:55:00Z
9
value 0.0087
scoring_system epss
scoring_elements 0.75185
published_at 2026-04-13T12:55:00Z
10
value 0.0087
scoring_system epss
scoring_elements 0.75222
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-7185
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7185
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/96193
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/96193
10
reference_url https://security.gentoo.org/glsa/201503-10
reference_id
reference_type
scores
url https://security.gentoo.org/glsa/201503-10
11
reference_url https://support.apple.com/kb/HT205031
reference_id
reference_type
scores
url https://support.apple.com/kb/HT205031
12
reference_url http://www.openwall.com/lists/oss-security/2014/09/23/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/09/23/5
13
reference_url http://www.openwall.com/lists/oss-security/2014/09/25/47
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/09/25/47
14
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
15
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
16
reference_url http://www.securityfocus.com/bid/70089
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70089
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1146026
reference_id 1146026
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1146026
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=763848
reference_id 763848
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=763848
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:2.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:python:python:2.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:2.7.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:2.7.1150:*:*:*:*:*:*:*
reference_id cpe:2.3:a:python:python:2.7.1150:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:2.7.1150:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:2.7.1150:*:*:*:*:*:x64:*
reference_id cpe:2.3:a:python:python:2.7.1150:*:*:*:*:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:2.7.1150:*:*:*:*:*:x64:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:2.7.1:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:python:python:2.7.1:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:2.7.1:rc1:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:2.7.2150:*:*:*:*:*:*:*
reference_id cpe:2.3:a:python:python:2.7.2150:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:2.7.2150:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:2.7.2:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:python:python:2.7.2:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:2.7.2:rc1:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:2.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:python:python:2.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:2.7.3:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:2.7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:python:python:2.7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:2.7.4:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:2.7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:python:python:2.7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:2.7.5:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:2.7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:python:python:2.7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:2.7.6:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-7185
reference_id CVE-2014-7185
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-7185
32
reference_url https://access.redhat.com/errata/RHSA-2015:1064
reference_id RHSA-2015:1064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1064
33
reference_url https://access.redhat.com/errata/RHSA-2015:1330
reference_id RHSA-2015:1330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1330
34
reference_url https://access.redhat.com/errata/RHSA-2015:2101
reference_id RHSA-2015:2101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2101
35
reference_url https://usn.ubuntu.com/2653-1/
reference_id USN-2653-1
reference_type
scores
url https://usn.ubuntu.com/2653-1/
Weaknesses
0
cwe_id 190
name Integer Overflow or Wraparound
description The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
1
cwe_id 125
name Out-of-bounds Read
description The product reads data past the end, or before the beginning, of the intended buffer.
2
cwe_id 200
name Exposure of Sensitive Information to an Unauthorized Actor
description The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
3
cwe_id 189
name Numeric Errors
description Weaknesses in this category are related to improper calculation or conversion of numbers.
Exploits
Severity_range_score6.4 - 6.4
Exploitability0.5
Weighted_severity5.8
Risk_score2.9
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-mzd5-dwty-bqhf