Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/122830?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/122830?format=api", "purl": "pkg:rpm/redhat/kernel@2.6.32-431.11.2?arch=el6", "type": "rpm", "namespace": "redhat", "name": "kernel", "version": "2.6.32-431.11.2", "qualifiers": { "arch": "el6" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86362?format=api", "vulnerability_id": "VCID-3jmk-dccw-dbcb", "summary": "kernel: net: sctp: null pointer dereference when processing authenticated cookie_echo chunk", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0101.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0101.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0101", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86728", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86738", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86758", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86757", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86776", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86785", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86798", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86795", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.8679", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86805", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.8681", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86808", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86824", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86831", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86854", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86873", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0101" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0101", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0101" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1070705", "reference_id": "1070705", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1070705" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0328", "reference_id": "RHSA-2014:0328", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0328" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0419", "reference_id": "RHSA-2014:0419", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0419" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0432", "reference_id": "RHSA-2014:0432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0520", "reference_id": "RHSA-2014:0520", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0520" }, { "reference_url": "https://usn.ubuntu.com/2173-1/", "reference_id": "USN-2173-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2173-1/" }, { "reference_url": "https://usn.ubuntu.com/2174-1/", "reference_id": "USN-2174-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2174-1/" }, { "reference_url": "https://usn.ubuntu.com/2221-1/", "reference_id": "USN-2221-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2221-1/" }, { "reference_url": "https://usn.ubuntu.com/2223-1/", "reference_id": "USN-2223-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2223-1/" }, { "reference_url": "https://usn.ubuntu.com/2224-1/", "reference_id": "USN-2224-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2224-1/" }, { "reference_url": "https://usn.ubuntu.com/2225-1/", "reference_id": "USN-2225-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2225-1/" }, { "reference_url": "https://usn.ubuntu.com/2227-1/", "reference_id": "USN-2227-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2227-1/" }, { "reference_url": "https://usn.ubuntu.com/2228-1/", "reference_id": "USN-2228-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2228-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-0101" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3jmk-dccw-dbcb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86396?format=api", "vulnerability_id": "VCID-ahxv-wf9f-vfak", "summary": "kernel: nfs: data leak during extended writes", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2038.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2038.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2038", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.1577", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.1584", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15905", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15705", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15791", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.1585", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15829", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15793", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15723", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15644", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15653", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15699", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15716", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15712", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15655", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15526", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15646", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2038" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2038", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2038" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1066939", "reference_id": "1066939", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1066939" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0328", "reference_id": "RHSA-2014:0328", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0328" }, { "reference_url": "https://usn.ubuntu.com/2137-1/", "reference_id": "USN-2137-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2137-1/" }, { "reference_url": "https://usn.ubuntu.com/2140-1/", "reference_id": "USN-2140-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2140-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-2038" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ahxv-wf9f-vfak" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86482?format=api", "vulnerability_id": "VCID-bknx-chsq-aqfu", "summary": "Kernel: net: information leak in recvmsg handler msg_name & msg_namelen logic", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7270.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7270.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-7270", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14052", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14133", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14189", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14005", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14087", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14139", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14083", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14041", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.13989", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.13883", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.13875", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.13954", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.1399", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.13964", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.13898", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.1378", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.13939", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-7270" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7270", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7270" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039845", "reference_id": "1039845", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039845" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0328", "reference_id": "RHSA-2014:0328", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0328" }, { "reference_url": "https://usn.ubuntu.com/2109-1/", "reference_id": "USN-2109-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2109-1/" }, { "reference_url": "https://usn.ubuntu.com/2110-1/", "reference_id": "USN-2110-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2110-1/" }, { "reference_url": "https://usn.ubuntu.com/2113-1/", "reference_id": "USN-2113-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2113-1/" }, { "reference_url": "https://usn.ubuntu.com/2117-1/", "reference_id": "USN-2117-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2117-1/" }, { "reference_url": "https://usn.ubuntu.com/2128-1/", "reference_id": "USN-2128-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2128-1/" }, { "reference_url": "https://usn.ubuntu.com/2129-1/", "reference_id": "USN-2129-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2129-1/" }, { "reference_url": "https://usn.ubuntu.com/2135-1/", "reference_id": "USN-2135-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2135-1/" }, { "reference_url": "https://usn.ubuntu.com/2136-1/", "reference_id": "USN-2136-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2136-1/" }, { "reference_url": "https://usn.ubuntu.com/2138-1/", "reference_id": "USN-2138-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2138-1/" }, { "reference_url": "https://usn.ubuntu.com/2139-1/", "reference_id": "USN-2139-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2139-1/" }, { "reference_url": "https://usn.ubuntu.com/2141-1/", "reference_id": "USN-2141-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2141-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-7270" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bknx-chsq-aqfu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86340?format=api", "vulnerability_id": "VCID-kjfe-u963-vfhv", "summary": "kernel: vhost-net: insufficient handling of error conditions in get_rx_bufs()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0055.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0055.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0055", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54012", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.5403", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54056", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54033", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54084", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54082", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54129", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.5411", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54093", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54133", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54136", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54116", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54066", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54015", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54057", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0055" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0055", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0055" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1062577", "reference_id": "1062577", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1062577" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0328", "reference_id": "RHSA-2014:0328", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0328" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0339", "reference_id": "RHSA-2014:0339", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0339" }, { "reference_url": "https://usn.ubuntu.com/2223-1/", "reference_id": "USN-2223-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2223-1/" }, { "reference_url": "https://usn.ubuntu.com/2224-1/", "reference_id": "USN-2224-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2224-1/" }, { "reference_url": "https://usn.ubuntu.com/2225-1/", "reference_id": "USN-2225-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2225-1/" }, { "reference_url": "https://usn.ubuntu.com/2228-1/", "reference_id": "USN-2228-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2228-1/" }, { "reference_url": "https://usn.ubuntu.com/2235-1/", "reference_id": "USN-2235-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2235-1/" }, { "reference_url": "https://usn.ubuntu.com/2236-1/", "reference_id": "USN-2236-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2236-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-0055" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kjfe-u963-vfhv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86478?format=api", "vulnerability_id": "VCID-usjm-9vqg-uqem", "summary": "Kernel: net: information leak in recvmsg handler msg_name & msg_namelen logic", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7266.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7266.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-7266", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.102", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.1032", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10386", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10286", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.1036", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10426", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10454", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10414", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10392", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10263", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10234", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10365", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10347", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10339", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10282", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10231", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10377", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-7266" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7266", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7266" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039845", "reference_id": "1039845", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039845" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0328", "reference_id": "RHSA-2014:0328", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0328" }, { "reference_url": "https://usn.ubuntu.com/2109-1/", "reference_id": "USN-2109-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2109-1/" }, { "reference_url": "https://usn.ubuntu.com/2110-1/", "reference_id": "USN-2110-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2110-1/" }, { "reference_url": "https://usn.ubuntu.com/2113-1/", "reference_id": "USN-2113-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2113-1/" }, { "reference_url": "https://usn.ubuntu.com/2117-1/", "reference_id": "USN-2117-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2117-1/" }, { "reference_url": "https://usn.ubuntu.com/2128-1/", "reference_id": "USN-2128-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2128-1/" }, { "reference_url": "https://usn.ubuntu.com/2129-1/", "reference_id": "USN-2129-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2129-1/" }, { "reference_url": "https://usn.ubuntu.com/2135-1/", "reference_id": "USN-2135-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2135-1/" }, { "reference_url": "https://usn.ubuntu.com/2136-1/", "reference_id": "USN-2136-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2136-1/" }, { "reference_url": "https://usn.ubuntu.com/2138-1/", "reference_id": "USN-2138-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2138-1/" }, { "reference_url": "https://usn.ubuntu.com/2139-1/", "reference_id": "USN-2139-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2139-1/" }, { "reference_url": "https://usn.ubuntu.com/2141-1/", "reference_id": "USN-2141-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2141-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-7266" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-usjm-9vqg-uqem" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86733?format=api", "vulnerability_id": "VCID-x5vz-j7fs-mqb9", "summary": "kernel: usb: cdc-wdm buffer overflow triggered by device", "references": [ { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c0f5ecee4e741667b2493c742b60b6218d40b3aa", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c0f5ecee4e741667b2493c742b60b6218d40b3aa" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-0328.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-0328.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-0339.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-0339.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1860.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1860.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1860", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00122", "scoring_system": "epss", "scoring_elements": "0.30861", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00122", "scoring_system": "epss", "scoring_elements": "0.31322", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00122", "scoring_system": "epss", "scoring_elements": "0.31463", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00122", "scoring_system": "epss", "scoring_elements": "0.31505", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00122", "scoring_system": "epss", "scoring_elements": "0.31323", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00122", "scoring_system": "epss", "scoring_elements": "0.31377", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00122", "scoring_system": "epss", "scoring_elements": "0.31407", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00122", "scoring_system": "epss", "scoring_elements": "0.31411", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00122", "scoring_system": "epss", "scoring_elements": "0.31367", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00122", "scoring_system": "epss", "scoring_elements": "0.31329", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00122", "scoring_system": "epss", "scoring_elements": "0.31362", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00122", "scoring_system": "epss", "scoring_elements": "0.31342", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00122", "scoring_system": "epss", "scoring_elements": "0.31313", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00122", "scoring_system": "epss", "scoring_elements": "0.31142", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00122", "scoring_system": "epss", "scoring_elements": "0.31021", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00122", "scoring_system": "epss", "scoring_elements": "0.30942", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00122", "scoring_system": "epss", "scoring_elements": "0.30792", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1860" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1860", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1860" }, { "reference_url": "https://github.com/torvalds/linux/commit/c0f5ecee4e741667b2493c742b60b6218d40b3aa", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/torvalds/linux/commit/c0f5ecee4e741667b2493c742b60b6218d40b3aa" }, { "reference_url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.4" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/03/15/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/03/15/3" }, { "reference_url": "http://www.securityfocus.com/bid/58510", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/58510" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1809-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1809-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1811-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1811-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1812-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1812-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1813-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1813-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1814-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1814-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1829-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1829-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=921970", "reference_id": "921970", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=921970" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1860", "reference_id": "CVE-2013-1860", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1860" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0829", "reference_id": "RHSA-2013:0829", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0829" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0328", "reference_id": "RHSA-2014:0328", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0328" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0339", "reference_id": "RHSA-2014:0339", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0339" }, { "reference_url": "https://usn.ubuntu.com/1809-1/", "reference_id": "USN-1809-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1809-1/" }, { "reference_url": "https://usn.ubuntu.com/1811-1/", "reference_id": "USN-1811-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1811-1/" }, { "reference_url": "https://usn.ubuntu.com/1812-1/", "reference_id": "USN-1812-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1812-1/" }, { "reference_url": "https://usn.ubuntu.com/1813-1/", "reference_id": "USN-1813-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1813-1/" }, { "reference_url": "https://usn.ubuntu.com/1814-1/", "reference_id": "USN-1814-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1814-1/" }, { "reference_url": "https://usn.ubuntu.com/1824-1/", "reference_id": "USN-1824-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1824-1/" }, { "reference_url": "https://usn.ubuntu.com/1829-1/", "reference_id": "USN-1829-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1829-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-1860" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x5vz-j7fs-mqb9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86370?format=api", "vulnerability_id": "VCID-xdw5-pdeh-qbag", "summary": "kernel: cifs: incorrect handling of bogus user pointers during uncached writes", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0069.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0069.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0069", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15299", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15336", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15406", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15209", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15298", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15348", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.1531", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15271", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15205", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.1512", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15127", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15184", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15223", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15222", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15165", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15029", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15153", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0069" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0069", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0069" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1064253", "reference_id": "1064253", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1064253" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741958", "reference_id": "741958", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0328", "reference_id": "RHSA-2014:0328", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0328" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0439", "reference_id": "RHSA-2014:0439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0439" }, { "reference_url": "https://usn.ubuntu.com/2175-1/", "reference_id": "USN-2175-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2175-1/" }, { "reference_url": "https://usn.ubuntu.com/2176-1/", "reference_id": "USN-2176-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2176-1/" }, { "reference_url": "https://usn.ubuntu.com/2177-1/", "reference_id": "USN-2177-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2177-1/" }, { "reference_url": "https://usn.ubuntu.com/2178-1/", "reference_id": "USN-2178-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2178-1/" }, { "reference_url": "https://usn.ubuntu.com/2179-1/", "reference_id": "USN-2179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2179-1/" }, { "reference_url": "https://usn.ubuntu.com/2180-1/", "reference_id": "USN-2180-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2180-1/" }, { "reference_url": "https://usn.ubuntu.com/2181-1/", "reference_id": "USN-2181-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2181-1/" }, { "reference_url": "https://usn.ubuntu.com/2221-1/", "reference_id": "USN-2221-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2221-1/" }, { "reference_url": "https://usn.ubuntu.com/2227-1/", "reference_id": "USN-2227-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2227-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-0069" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xdw5-pdeh-qbag" } ], "fixing_vulnerabilities": [], "risk_score": "3.1", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.32-431.11.2%3Farch=el6" }