Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/122663?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/122663?format=api", "purl": "pkg:rpm/redhat/qemu-kvm@2:0.12.1.2-2.415.el6_5?arch=8", "type": "rpm", "namespace": "redhat", "name": "qemu-kvm", "version": "2:0.12.1.2-2.415.el6_5", "qualifiers": { "arch": "8" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49752?format=api", "vulnerability_id": "VCID-3jeq-fwjy-c7gg", "summary": "Multiple vulnerabilities have been found in QEMU, worst of which\n allows local attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0142.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0142.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0142", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29535", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29602", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29651", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29472", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29573", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29575", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.2953", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29477", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29496", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29469", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29423", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29308", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29194", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29129", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.28985", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29046", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0142" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0142", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0142" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0143", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0143" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0144", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0144" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0145", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0145" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0146", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0146" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0147", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0147" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3615", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3615" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1078201", "reference_id": "1078201", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1078201" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742730", "reference_id": "742730", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742730" }, { "reference_url": "https://security.gentoo.org/glsa/201408-17", "reference_id": "GLSA-201408-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201408-17" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0420", "reference_id": "RHSA-2014:0420", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0420" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0421", "reference_id": "RHSA-2014:0421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0434", "reference_id": "RHSA-2014:0434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0435", "reference_id": "RHSA-2014:0435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0435" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0674", "reference_id": "RHSA-2014:0674", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0674" }, { "reference_url": "https://usn.ubuntu.com/2342-1/", "reference_id": "USN-2342-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2342-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-0142" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3jeq-fwjy-c7gg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49757?format=api", "vulnerability_id": "VCID-5fe5-865e-qbhm", "summary": "Multiple vulnerabilities have been found in QEMU, worst of which\n allows local attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0147.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0147.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0147", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31046", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31171", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31217", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31037", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31094", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31124", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31131", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31087", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31042", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31074", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31055", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31022", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.30866", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.30745", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.30661", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.30518", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.30586", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0147" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0142", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0142" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0143", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0143" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0144", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0144" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0145", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0145" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0146", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0146" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0147", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0147" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3615", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3615" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1078848", "reference_id": "1078848", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1078848" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742730", "reference_id": "742730", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742730" }, { "reference_url": "https://security.gentoo.org/glsa/201408-17", "reference_id": "GLSA-201408-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201408-17" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0420", "reference_id": "RHSA-2014:0420", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0420" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0421", "reference_id": "RHSA-2014:0421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0434", "reference_id": "RHSA-2014:0434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0435", "reference_id": "RHSA-2014:0435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0435" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0674", "reference_id": "RHSA-2014:0674", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0674" }, { "reference_url": "https://usn.ubuntu.com/2342-1/", "reference_id": "USN-2342-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2342-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-0147" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5fe5-865e-qbhm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86337?format=api", "vulnerability_id": "VCID-69fs-q8fc-ebcv", "summary": "Qemu: vhdx: bounds checking for block_size and logical_sector_size", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0148.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0148.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0148", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30609", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30745", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30793", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30667", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30699", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30704", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30658", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30613", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30639", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30621", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30586", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30407", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30293", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30213", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30072", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30141", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0148" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0148", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0148" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1078212", "reference_id": "1078212", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1078212" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742730", "reference_id": "742730", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742730" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0420", "reference_id": "RHSA-2014:0420", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0420" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0421", "reference_id": "RHSA-2014:0421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0434", "reference_id": "RHSA-2014:0434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0435", "reference_id": "RHSA-2014:0435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0435" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0674", "reference_id": "RHSA-2014:0674", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0674" } ], "fixed_packages": [], "aliases": [ "CVE-2014-0148" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-69fs-q8fc-ebcv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49756?format=api", "vulnerability_id": "VCID-6u8x-4sqe-ckbp", "summary": "Multiple vulnerabilities have been found in QEMU, worst of which\n allows local attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0146.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0146.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0146", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30058", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30095", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30143", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.29957", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30017", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30052", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30057", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30013", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.29963", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.29979", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.29958", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.29912", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.29838", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.29725", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.29662", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.29519", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.2958", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0146" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0142", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0142" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0143", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0143" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0144", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0144" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0145", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0145" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0146", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0146" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0147", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0147" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3615", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3615" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1078232", "reference_id": "1078232", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1078232" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742730", "reference_id": "742730", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742730" }, { "reference_url": "https://security.gentoo.org/glsa/201408-17", "reference_id": "GLSA-201408-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201408-17" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0420", "reference_id": "RHSA-2014:0420", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0420" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0421", "reference_id": "RHSA-2014:0421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0434", "reference_id": "RHSA-2014:0434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0435", "reference_id": "RHSA-2014:0435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0435" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0674", "reference_id": "RHSA-2014:0674", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0674" }, { "reference_url": "https://usn.ubuntu.com/2342-1/", "reference_id": "USN-2342-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2342-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-0146" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6u8x-4sqe-ckbp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49755?format=api", "vulnerability_id": "VCID-bx3b-281e-wfb2", "summary": "Multiple vulnerabilities have been found in QEMU, worst of which\n allows local attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0145.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0145.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0145", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32566", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32702", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32736", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32557", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32605", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32631", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32633", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32595", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.39361", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.39413", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.39384", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.39298", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.39101", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.39083", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.39002", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.38876", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.38949", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0145" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0142", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0142" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0143", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0143" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0144", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0144" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0145", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0145" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0146", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0146" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0147", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0147" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3615", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3615" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1078885", "reference_id": "1078885", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1078885" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742730", "reference_id": "742730", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742730" }, { "reference_url": "https://security.gentoo.org/glsa/201408-17", "reference_id": "GLSA-201408-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201408-17" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0420", "reference_id": "RHSA-2014:0420", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0420" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0421", "reference_id": "RHSA-2014:0421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0434", "reference_id": "RHSA-2014:0434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0435", "reference_id": "RHSA-2014:0435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0435" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0674", "reference_id": "RHSA-2014:0674", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0674" }, { "reference_url": "https://usn.ubuntu.com/2342-1/", "reference_id": "USN-2342-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2342-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-0145" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bx3b-281e-wfb2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49758?format=api", "vulnerability_id": "VCID-fenu-d57d-cbgj", "summary": "Multiple vulnerabilities have been found in QEMU, worst of which\n allows local attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0150.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0150.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0150", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67924", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67946", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67965", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67944", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67996", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68009", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68033", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68019", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67984", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68021", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68035", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68017", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.6806", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68068", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68074", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68047", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68089", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0150" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0150", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0150" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1078846", "reference_id": "1078846", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1078846" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=744221", "reference_id": "744221", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=744221" }, { "reference_url": "https://security.gentoo.org/glsa/201408-17", "reference_id": "GLSA-201408-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201408-17" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0420", "reference_id": "RHSA-2014:0420", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0420" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0421", "reference_id": "RHSA-2014:0421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0434", "reference_id": "RHSA-2014:0434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0435", "reference_id": "RHSA-2014:0435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0435" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0674", "reference_id": "RHSA-2014:0674", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0674" }, { "reference_url": "https://usn.ubuntu.com/2182-1/", "reference_id": "USN-2182-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2182-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-0150" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fenu-d57d-cbgj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49753?format=api", "vulnerability_id": "VCID-fzn9-nn4a-3ffj", "summary": "Multiple vulnerabilities have been found in QEMU, worst of which\n allows local attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0143.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0143.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0143", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.2875", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.2883", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28879", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28686", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28753", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28792", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28796", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28752", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28703", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28723", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28699", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.2865", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28538", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28426", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28352", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28192", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28247", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0143" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0142", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0142" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0143", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0143" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0144", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0144" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0145", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0145" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0146", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0146" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0147", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0147" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3615", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3615" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1079140", "reference_id": "1079140", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1079140" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742730", "reference_id": "742730", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742730" }, { "reference_url": "https://security.gentoo.org/glsa/201408-17", "reference_id": "GLSA-201408-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201408-17" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0420", "reference_id": "RHSA-2014:0420", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0420" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0421", "reference_id": "RHSA-2014:0421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0434", "reference_id": "RHSA-2014:0434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0435", "reference_id": "RHSA-2014:0435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0435" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0674", "reference_id": "RHSA-2014:0674", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0674" }, { "reference_url": "https://usn.ubuntu.com/2342-1/", "reference_id": "USN-2342-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2342-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-0143" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fzn9-nn4a-3ffj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49754?format=api", "vulnerability_id": "VCID-r7hp-ht55-5qgr", "summary": "Multiple vulnerabilities have been found in QEMU, worst of which\n allows local attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0144.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0144.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0144", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00642", "scoring_system": "epss", "scoring_elements": "0.70529", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00642", "scoring_system": "epss", "scoring_elements": "0.70543", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00642", "scoring_system": "epss", "scoring_elements": "0.7056", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00642", "scoring_system": "epss", "scoring_elements": "0.70538", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00642", "scoring_system": "epss", "scoring_elements": "0.70583", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00642", "scoring_system": "epss", "scoring_elements": "0.70598", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00642", "scoring_system": "epss", "scoring_elements": "0.70621", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00642", "scoring_system": "epss", "scoring_elements": "0.70606", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00642", "scoring_system": "epss", "scoring_elements": "0.70593", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00642", "scoring_system": "epss", "scoring_elements": "0.70637", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00642", "scoring_system": "epss", "scoring_elements": "0.70646", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00642", "scoring_system": "epss", "scoring_elements": "0.70625", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00642", "scoring_system": "epss", "scoring_elements": "0.70676", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00642", "scoring_system": "epss", "scoring_elements": "0.70686", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00642", "scoring_system": "epss", "scoring_elements": "0.70663", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00642", "scoring_system": "epss", "scoring_elements": "0.70704", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0144" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0142", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0142" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0143", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0143" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0144", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0144" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0145", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0145" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0146", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0146" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0147", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0147" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3615", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3615" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1079240", "reference_id": "1079240", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1079240" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742730", "reference_id": "742730", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742730" }, { "reference_url": "https://security.gentoo.org/glsa/201408-17", "reference_id": "GLSA-201408-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201408-17" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0420", "reference_id": "RHSA-2014:0420", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0420" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0421", "reference_id": "RHSA-2014:0421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0434", "reference_id": "RHSA-2014:0434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0435", "reference_id": "RHSA-2014:0435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0435" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0674", "reference_id": "RHSA-2014:0674", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0674" }, { "reference_url": "https://usn.ubuntu.com/2342-1/", "reference_id": "USN-2342-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2342-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-0144" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r7hp-ht55-5qgr" } ], "fixing_vulnerabilities": [], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/qemu-kvm@2:0.12.1.2-2.415.el6_5%3Farch=8" }