Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/122661?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/122661?format=api", "purl": "pkg:rpm/redhat/kernel@2.6.32-431.23.3?arch=el6", "type": "rpm", "namespace": "redhat", "name": "kernel", "version": "2.6.32-431.23.3", "qualifiers": { "arch": "el6" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87036?format=api", "vulnerability_id": "VCID-1phh-f42p-j7c1", "summary": "Kernel: futex: forbid uaddr == uaddr2 in futex_wait_requeue_pi()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6647.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6647.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-6647", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14132", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14212", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14271", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14083", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14164", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14216", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14162", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.1412", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14064", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.13958", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.13957", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14035", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14072", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14048", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.13976", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.13856", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14014", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-6647" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6647", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6647" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1097746", "reference_id": "1097746", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1097746" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0981", "reference_id": "RHSA-2014:0981", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0981" }, { "reference_url": "https://usn.ubuntu.com/1579-1/", "reference_id": "USN-1579-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1579-1/" }, { "reference_url": "https://usn.ubuntu.com/1580-1/", "reference_id": "USN-1580-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1580-1/" }, { "reference_url": "https://usn.ubuntu.com/1651-1/", "reference_id": "USN-1651-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1651-1/" }, { "reference_url": "https://usn.ubuntu.com/1653-1/", "reference_id": "USN-1653-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1653-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-6647" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1phh-f42p-j7c1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86367?format=api", "vulnerability_id": "VCID-7yup-xt8w-pqhd", "summary": "kernel: ath9k: tid->sched race in ath_tx_aggr_sleep()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2672.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2672.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2672", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.71185", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.71194", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.71212", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.71187", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.71229", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.71244", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.71266", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.71251", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.71236", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.71282", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.71288", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.71265", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.71318", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.71325", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.7133", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.71315", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.71351", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2672" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1083246", "reference_id": "1083246", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1083246" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0557", "reference_id": "RHSA-2014:0557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0981", "reference_id": "RHSA-2014:0981", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0981" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1023", "reference_id": "RHSA-2014:1023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1101", "reference_id": "RHSA-2014:1101", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1101" }, { "reference_url": "https://usn.ubuntu.com/2221-1/", "reference_id": "USN-2221-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2221-1/" }, { "reference_url": "https://usn.ubuntu.com/2223-1/", "reference_id": "USN-2223-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2223-1/" }, { "reference_url": "https://usn.ubuntu.com/2224-1/", "reference_id": "USN-2224-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2224-1/" }, { "reference_url": "https://usn.ubuntu.com/2225-1/", "reference_id": "USN-2225-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2225-1/" }, { "reference_url": "https://usn.ubuntu.com/2227-1/", "reference_id": "USN-2227-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2227-1/" }, { "reference_url": "https://usn.ubuntu.com/2228-1/", "reference_id": "USN-2228-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2228-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-2672" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7yup-xt8w-pqhd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86419?format=api", "vulnerability_id": "VCID-8ypy-qspm-abef", "summary": "kernel: net: rds: dereference of a NULL device in rds_ib_laddr_check()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7339.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7339.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-7339", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26208", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26288", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26329", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26101", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26168", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26216", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26224", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26179", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26119", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26124", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26102", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26064", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26004", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.25951", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.25843", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.25903", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-7339" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7339", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7339" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1079214", "reference_id": "1079214", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1079214" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0439", "reference_id": "RHSA-2014:0439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0439" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0740", "reference_id": "RHSA-2014:0740", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0740" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0981", "reference_id": "RHSA-2014:0981", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0981" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1101", "reference_id": "RHSA-2014:1101", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1101" }, { "reference_url": "https://usn.ubuntu.com/2113-1/", "reference_id": "USN-2113-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2113-1/" }, { "reference_url": "https://usn.ubuntu.com/2117-1/", "reference_id": "USN-2117-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2117-1/" }, { "reference_url": "https://usn.ubuntu.com/2133-1/", "reference_id": "USN-2133-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2133-1/" }, { "reference_url": "https://usn.ubuntu.com/2134-1/", "reference_id": "USN-2134-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2134-1/" }, { "reference_url": "https://usn.ubuntu.com/2135-1/", "reference_id": "USN-2135-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2135-1/" }, { "reference_url": "https://usn.ubuntu.com/2136-1/", "reference_id": "USN-2136-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2136-1/" }, { "reference_url": "https://usn.ubuntu.com/2141-1/", "reference_id": "USN-2141-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2141-1/" }, { "reference_url": "https://usn.ubuntu.com/2219-1/", "reference_id": "USN-2219-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2219-1/" }, { "reference_url": "https://usn.ubuntu.com/2220-1/", "reference_id": "USN-2220-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2220-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-7339" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8ypy-qspm-abef" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86335?format=api", "vulnerability_id": "VCID-aznb-jucj-g7gu", "summary": "kernel: net: rds: dereference of a NULL device in rds_iw_laddr_check()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2678.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2678.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2678", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25855", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25919", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25961", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25727", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25799", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.2585", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25861", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.2582", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25764", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25766", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25749", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.2572", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25665", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25656", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25608", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25497", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25562", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2678" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2678", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2678" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1083274", "reference_id": "1083274", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1083274" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0557", "reference_id": "RHSA-2014:0557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0926", "reference_id": "RHSA-2014:0926", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0926" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0981", "reference_id": "RHSA-2014:0981", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0981" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1101", "reference_id": "RHSA-2014:1101", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1101" }, { "reference_url": "https://usn.ubuntu.com/2219-1/", "reference_id": "USN-2219-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2219-1/" }, { "reference_url": "https://usn.ubuntu.com/2220-1/", "reference_id": "USN-2220-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2220-1/" }, { "reference_url": "https://usn.ubuntu.com/2221-1/", "reference_id": "USN-2221-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2221-1/" }, { "reference_url": "https://usn.ubuntu.com/2223-1/", "reference_id": "USN-2223-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2223-1/" }, { "reference_url": "https://usn.ubuntu.com/2224-1/", "reference_id": "USN-2224-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2224-1/" }, { "reference_url": "https://usn.ubuntu.com/2225-1/", "reference_id": "USN-2225-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2225-1/" }, { "reference_url": "https://usn.ubuntu.com/2227-1/", "reference_id": "USN-2227-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2227-1/" }, { "reference_url": "https://usn.ubuntu.com/2228-1/", "reference_id": "USN-2228-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2228-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-2678" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aznb-jucj-g7gu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86368?format=api", "vulnerability_id": "VCID-js1d-vcnb-gyev", "summary": "Kernel: net: mac80211: crash dues to AP powersave TX vs. wakeup race", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2706.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2706.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2706", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03101", "scoring_system": "epss", "scoring_elements": "0.86744", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03101", "scoring_system": "epss", "scoring_elements": "0.86754", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03101", "scoring_system": "epss", "scoring_elements": "0.86774", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03101", "scoring_system": "epss", "scoring_elements": "0.86771", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03101", "scoring_system": "epss", "scoring_elements": "0.86791", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03101", "scoring_system": "epss", "scoring_elements": "0.868", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03101", "scoring_system": "epss", "scoring_elements": "0.86813", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03101", "scoring_system": "epss", "scoring_elements": "0.8681", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03101", "scoring_system": "epss", "scoring_elements": "0.86805", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03101", "scoring_system": "epss", "scoring_elements": "0.86821", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03101", "scoring_system": "epss", "scoring_elements": "0.86825", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03101", "scoring_system": "epss", "scoring_elements": "0.86823", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03101", "scoring_system": "epss", "scoring_elements": "0.8684", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03101", "scoring_system": "epss", "scoring_elements": "0.86847", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03101", "scoring_system": "epss", "scoring_elements": "0.86846", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03101", "scoring_system": "epss", "scoring_elements": "0.8687", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.03101", "scoring_system": "epss", "scoring_elements": "0.86889", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2706" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1083512", "reference_id": "1083512", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1083512" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0557", "reference_id": "RHSA-2014:0557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0981", "reference_id": "RHSA-2014:0981", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0981" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1023", "reference_id": "RHSA-2014:1023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1101", "reference_id": "RHSA-2014:1101", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1101" }, { "reference_url": "https://usn.ubuntu.com/2221-1/", "reference_id": "USN-2221-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2221-1/" }, { "reference_url": "https://usn.ubuntu.com/2223-1/", "reference_id": "USN-2223-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2223-1/" }, { "reference_url": "https://usn.ubuntu.com/2224-1/", "reference_id": "USN-2224-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2224-1/" }, { "reference_url": "https://usn.ubuntu.com/2225-1/", "reference_id": "USN-2225-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2225-1/" }, { "reference_url": "https://usn.ubuntu.com/2227-1/", "reference_id": "USN-2227-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2227-1/" }, { "reference_url": "https://usn.ubuntu.com/2228-1/", "reference_id": "USN-2228-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2228-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-2706" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-js1d-vcnb-gyev" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56033?format=api", "vulnerability_id": "VCID-t5vb-aeb7-2kez", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2851.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2851.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2851", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44564", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44643", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44664", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.446", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44652", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44655", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.4467", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.4464", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44641", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44697", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44689", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.4462", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44534", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44538", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44458", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44335", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44413", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0196", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0196" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1738", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1738" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3122", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3122" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1086730", "reference_id": "1086730", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1086730" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/32926.c", "reference_id": "CVE-2014-2851;OSVDB-105712", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/32926.c" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0557", "reference_id": "RHSA-2014:0557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0786", "reference_id": "RHSA-2014:0786", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0786" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0981", "reference_id": "RHSA-2014:0981", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0981" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1101", "reference_id": "RHSA-2014:1101", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1101" }, { "reference_url": "https://usn.ubuntu.com/2221-1/", "reference_id": "USN-2221-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2221-1/" }, { "reference_url": "https://usn.ubuntu.com/2223-1/", "reference_id": "USN-2223-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2223-1/" }, { "reference_url": "https://usn.ubuntu.com/2224-1/", "reference_id": "USN-2224-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2224-1/" }, { "reference_url": "https://usn.ubuntu.com/2225-1/", "reference_id": "USN-2225-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2225-1/" }, { "reference_url": "https://usn.ubuntu.com/2226-1/", "reference_id": "USN-2226-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2226-1/" }, { "reference_url": "https://usn.ubuntu.com/2227-1/", "reference_id": "USN-2227-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2227-1/" }, { "reference_url": "https://usn.ubuntu.com/2228-1/", "reference_id": "USN-2228-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2228-1/" }, { "reference_url": "https://usn.ubuntu.com/2260-1/", "reference_id": "USN-2260-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2260-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-2851" ], "risk_score": null, "exploitability": "2.0", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t5vb-aeb7-2kez" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57629?format=api", "vulnerability_id": "VCID-teu7-acfs-4fek", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3145.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3145.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3145", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17888", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.18049", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.18104", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17806", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17894", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17954", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17971", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17926", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17877", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17819", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17829", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17867", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17772", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.1775", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17716", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.1757", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17663", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3145" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3144", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3144" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3145", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3145" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1096775", "reference_id": "1096775", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1096775" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0786", "reference_id": "RHSA-2014:0786", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0786" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0913", "reference_id": "RHSA-2014:0913", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0913" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0981", "reference_id": "RHSA-2014:0981", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0981" }, { "reference_url": "https://usn.ubuntu.com/2251-1/", "reference_id": "USN-2251-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2251-1/" }, { "reference_url": "https://usn.ubuntu.com/2252-1/", "reference_id": "USN-2252-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2252-1/" }, { "reference_url": "https://usn.ubuntu.com/2259-1/", "reference_id": "USN-2259-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2259-1/" }, { "reference_url": "https://usn.ubuntu.com/2261-1/", "reference_id": "USN-2261-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2261-1/" }, { "reference_url": "https://usn.ubuntu.com/2262-1/", "reference_id": "USN-2262-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2262-1/" }, { "reference_url": "https://usn.ubuntu.com/2263-1/", "reference_id": "USN-2263-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2263-1/" }, { "reference_url": "https://usn.ubuntu.com/2264-1/", "reference_id": "USN-2264-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2264-1/" }, { "reference_url": "https://usn.ubuntu.com/2286-1/", "reference_id": "USN-2286-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2286-1/" }, { "reference_url": "https://usn.ubuntu.com/2288-1/", "reference_id": "USN-2288-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2288-1/" }, { "reference_url": "https://usn.ubuntu.com/2290-1/", "reference_id": "USN-2290-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2290-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-3145" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-teu7-acfs-4fek" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57628?format=api", "vulnerability_id": "VCID-tweh-zwpw-8fdk", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3144.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3144.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3144", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17888", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.18049", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.18104", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17806", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17894", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17954", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17971", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17926", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17877", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17819", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17829", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17867", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17772", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.1775", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17716", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.1757", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17663", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3144" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3144", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3144" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3145", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3145" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1096775", "reference_id": "1096775", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1096775" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0786", "reference_id": "RHSA-2014:0786", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0786" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0913", "reference_id": "RHSA-2014:0913", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0913" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0981", "reference_id": "RHSA-2014:0981", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0981" }, { "reference_url": "https://usn.ubuntu.com/2251-1/", "reference_id": "USN-2251-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2251-1/" }, { "reference_url": "https://usn.ubuntu.com/2252-1/", "reference_id": "USN-2252-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2252-1/" }, { "reference_url": "https://usn.ubuntu.com/2259-1/", "reference_id": "USN-2259-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2259-1/" }, { "reference_url": "https://usn.ubuntu.com/2261-1/", "reference_id": "USN-2261-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2261-1/" }, { "reference_url": "https://usn.ubuntu.com/2262-1/", "reference_id": "USN-2262-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2262-1/" }, { "reference_url": "https://usn.ubuntu.com/2263-1/", "reference_id": "USN-2263-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2263-1/" }, { "reference_url": "https://usn.ubuntu.com/2264-1/", "reference_id": "USN-2264-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2264-1/" }, { "reference_url": "https://usn.ubuntu.com/2286-1/", "reference_id": "USN-2286-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2286-1/" }, { "reference_url": "https://usn.ubuntu.com/2288-1/", "reference_id": "USN-2288-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2288-1/" }, { "reference_url": "https://usn.ubuntu.com/2290-1/", "reference_id": "USN-2290-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2290-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-3144" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tweh-zwpw-8fdk" } ], "fixing_vulnerabilities": [], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.32-431.23.3%3Farch=el6" }