{"url":"http://public2.vulnerablecode.io/api/packages/84669?format=json","purl":"pkg:ebuild/app-emulation/virtualbox@4.3.28","type":"ebuild","namespace":"app-emulation","name":"virtualbox","version":"4.3.28","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"5.0.32","latest_non_vulnerable_version":"7.0.12","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59753?format=json","vulnerability_id":"VCID-2atk-1h4j-jqbb","summary":"Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which allows local users to escalate privileges.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6595","reference_id":"","reference_type":"","scores":[{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23302","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23475","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23513","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23296","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23369","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.2342","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23439","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23402","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23348","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23366","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.2336","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.2334","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23149","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23142","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23134","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23027","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.2311","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23184","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23146","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23163","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23242","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6595"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775888","reference_id":"775888","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775888"},{"reference_url":"https://security.gentoo.org/glsa/201612-27","reference_id":"GLSA-201612-27","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-27"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84669?format=json","purl":"pkg:ebuild/app-emulation/virtualbox@4.3.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox@4.3.28"}],"aliases":["CVE-2014-6595"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2atk-1h4j-jqbb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59750?format=json","vulnerability_id":"VCID-2vj4-6kgd-kfap","summary":"Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which allows local users to escalate privileges.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6588","reference_id":"","reference_type":"","scores":[{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23302","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23475","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23513","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23296","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23369","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.2342","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23439","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23402","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23348","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23366","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.2336","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.2334","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23149","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23142","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23134","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23027","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.2311","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23184","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23146","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23163","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23242","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6588"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775888","reference_id":"775888","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775888"},{"reference_url":"https://security.gentoo.org/glsa/201612-27","reference_id":"GLSA-201612-27","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-27"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84669?format=json","purl":"pkg:ebuild/app-emulation/virtualbox@4.3.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox@4.3.28"}],"aliases":["CVE-2014-6588"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2vj4-6kgd-kfap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59082?format=json","vulnerability_id":"VCID-45uz-b4kt-ykdg","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0418","reference_id":"","reference_type":"","scores":[{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22319","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22484","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22529","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22317","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22399","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22454","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22474","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22433","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22378","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22395","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22392","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22342","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22194","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22181","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22174","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2207","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2215","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2223","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22198","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22221","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22304","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0418"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775888","reference_id":"775888","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775888"},{"reference_url":"https://security.gentoo.org/glsa/201612-27","reference_id":"GLSA-201612-27","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-27"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84669?format=json","purl":"pkg:ebuild/app-emulation/virtualbox@4.3.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox@4.3.28"}],"aliases":["CVE-2015-0418"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-45uz-b4kt-ykdg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4017?format=json","vulnerability_id":"VCID-8q9q-fs5n-gyfj","summary":"Privilege escalation via emulated floppy disk drive","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3456.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3456.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3456","reference_id":"","reference_type":"","scores":[{"value":"0.32263","scoring_system":"epss","scoring_elements":"0.96888","published_at":"2026-05-14T12:55:00Z"},{"value":"0.32263","scoring_system":"epss","scoring_elements":"0.96816","published_at":"2026-04-02T12:55:00Z"},{"value":"0.32263","scoring_system":"epss","scoring_elements":"0.96841","published_at":"2026-04-16T12:55:00Z"},{"value":"0.32263","scoring_system":"epss","scoring_elements":"0.96845","published_at":"2026-04-18T12:55:00Z"},{"value":"0.32263","scoring_system":"epss","scoring_elements":"0.96848","published_at":"2026-04-24T12:55:00Z"},{"value":"0.32263","scoring_system":"epss","scoring_elements":"0.9685","published_at":"2026-04-26T12:55:00Z"},{"value":"0.32263","scoring_system":"epss","scoring_elements":"0.96871","published_at":"2026-05-11T12:55:00Z"},{"value":"0.32263","scoring_system":"epss","scoring_elements":"0.96877","published_at":"2026-05-12T12:55:00Z"},{"value":"0.32263","scoring_system":"epss","scoring_elements":"0.96809","published_at":"2026-04-01T12:55:00Z"},{"value":"0.32813","scoring_system":"epss","scoring_elements":"0.96907","published_at":"2026-05-05T12:55:00Z"},{"value":"0.32813","scoring_system":"epss","scoring_elements":"0.96911","published_at":"2026-05-07T12:55:00Z"},{"value":"0.32813","scoring_system":"epss","scoring_elements":"0.96918","published_at":"2026-05-09T12:55:00Z"},{"value":"0.32813","scoring_system":"epss","scoring_elements":"0.96903","published_at":"2026-04-29T12:55:00Z"},{"value":"0.36084","scoring_system":"epss","scoring_elements":"0.97088","published_at":"2026-04-08T12:55:00Z"},{"value":"0.36084","scoring_system":"epss","scoring_elements":"0.97089","published_at":"2026-04-09T12:55:00Z"},{"value":"0.36084","scoring_system":"epss","scoring_elements":"0.97092","published_at":"2026-04-11T12:55:00Z"},{"value":"0.36084","scoring_system":"epss","scoring_elements":"0.97093","published_at":"2026-04-12T12:55:00Z"},{"value":"0.36084","scoring_system":"epss","scoring_elements":"0.97094","published_at":"2026-04-13T12:55:00Z"},{"value":"0.36084","scoring_system":"epss","scoring_elements":"0.97079","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3456"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9718","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9718"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1218611","reference_id":"1218611","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1218611"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=785424","reference_id":"785424","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=785424"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37053.c","reference_id":"CVE-2015-3456;OSVDB-122072","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37053.c"},{"reference_url":"https://marc.info/?l=oss-security&m=143155206320935&w=2","reference_id":"CVE-2015-3456;OSVDB-122072","reference_type":"exploit","scores":[],"url":"https://marc.info/?l=oss-security&m=143155206320935&w=2"},{"reference_url":"https://security.gentoo.org/glsa/201602-01","reference_id":"GLSA-201602-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-01"},{"reference_url":"https://security.gentoo.org/glsa/201604-03","reference_id":"GLSA-201604-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201604-03"},{"reference_url":"https://security.gentoo.org/glsa/201612-27","reference_id":"GLSA-201612-27","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0998","reference_id":"RHSA-2015:0998","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0998"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0999","reference_id":"RHSA-2015:0999","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0999"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1000","reference_id":"RHSA-2015:1000","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1000"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1001","reference_id":"RHSA-2015:1001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1002","reference_id":"RHSA-2015:1002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1003","reference_id":"RHSA-2015:1003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1004","reference_id":"RHSA-2015:1004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1011","reference_id":"RHSA-2015:1011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1031","reference_id":"RHSA-2015:1031","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1031"},{"reference_url":"https://usn.ubuntu.com/2608-1/","reference_id":"USN-2608-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2608-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-133.html","reference_id":"XSA-133","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-133.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84669?format=json","purl":"pkg:ebuild/app-emulation/virtualbox@4.3.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox@4.3.28"}],"aliases":["CVE-2015-3456"],"risk_score":0.6,"exploitability":"2.0","weighted_severity":"0.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8q9q-fs5n-gyfj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59756?format=json","vulnerability_id":"VCID-bbt5-dq5n-ebcb","summary":"Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which allows local users to escalate privileges.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5610","reference_id":"","reference_type":"","scores":[{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19259","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19157","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.1912","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19156","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19335","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19469","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19517","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19234","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19312","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19363","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19367","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19317","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19263","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19225","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19247","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19146","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19093","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.18979","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.1906","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5610"},{"reference_url":"http://www.securityfocus.com/bid/93711","reference_id":"93711","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:50Z/"}],"url":"http://www.securityfocus.com/bid/93711"},{"reference_url":"https://security.gentoo.org/glsa/201612-27","reference_id":"GLSA-201612-27","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:50Z/"}],"url":"https://security.gentoo.org/glsa/201612-27"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84669?format=json","purl":"pkg:ebuild/app-emulation/virtualbox@4.3.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox@4.3.28"}],"aliases":["CVE-2016-5610"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bbt5-dq5n-ebcb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59751?format=json","vulnerability_id":"VCID-dcc4-hs9f-j7dd","summary":"Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which allows local users to escalate privileges.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6589","reference_id":"","reference_type":"","scores":[{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29925","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29967","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.30015","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29828","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29891","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29926","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29931","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29886","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29836","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29853","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29833","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29787","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29711","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29597","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29535","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.2939","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29453","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29465","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29388","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29408","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29488","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6589"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775888","reference_id":"775888","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775888"},{"reference_url":"https://security.gentoo.org/glsa/201612-27","reference_id":"GLSA-201612-27","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-27"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84669?format=json","purl":"pkg:ebuild/app-emulation/virtualbox@4.3.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox@4.3.28"}],"aliases":["CVE-2014-6589"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dcc4-hs9f-j7dd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59752?format=json","vulnerability_id":"VCID-dwcj-32w6-8fb3","summary":"Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which allows local users to escalate privileges.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6590","reference_id":"","reference_type":"","scores":[{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29925","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29967","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.30015","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29828","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29891","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29926","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29931","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29886","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29836","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29853","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29833","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29787","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29711","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29597","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29535","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.2939","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29453","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29465","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29388","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29408","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29488","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6590"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775888","reference_id":"775888","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775888"},{"reference_url":"https://security.gentoo.org/glsa/201612-27","reference_id":"GLSA-201612-27","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-27"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84669?format=json","purl":"pkg:ebuild/app-emulation/virtualbox@4.3.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox@4.3.28"}],"aliases":["CVE-2014-6590"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dwcj-32w6-8fb3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59755?format=json","vulnerability_id":"VCID-fv7j-1ank-mffg","summary":"Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which allows local users to escalate privileges.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5608","reference_id":"","reference_type":"","scores":[{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17484","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.174","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17367","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17403","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17541","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17704","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17751","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17473","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17563","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17623","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17641","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17594","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17542","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17487","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17495","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17531","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17441","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17417","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.1735","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17213","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17304","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5608"},{"reference_url":"http://www.securityfocus.com/bid/93718","reference_id":"93718","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:53Z/"}],"url":"http://www.securityfocus.com/bid/93718"},{"reference_url":"https://security.gentoo.org/glsa/201612-27","reference_id":"GLSA-201612-27","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:53Z/"}],"url":"https://security.gentoo.org/glsa/201612-27"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84669?format=json","purl":"pkg:ebuild/app-emulation/virtualbox@4.3.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox@4.3.28"}],"aliases":["CVE-2016-5608"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fv7j-1ank-mffg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59080?format=json","vulnerability_id":"VCID-ge84-ygny-wqe3","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0377","reference_id":"","reference_type":"","scores":[{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.2865","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28734","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28782","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28589","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28654","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28695","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28696","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28652","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28605","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28625","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.286","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28551","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28435","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28323","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28246","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28084","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28146","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28171","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28089","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28108","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28181","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0418"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775888","reference_id":"775888","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775888"},{"reference_url":"https://security.gentoo.org/glsa/201612-27","reference_id":"GLSA-201612-27","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-27"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84669?format=json","purl":"pkg:ebuild/app-emulation/virtualbox@4.3.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox@4.3.28"}],"aliases":["CVE-2015-0377"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ge84-ygny-wqe3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59758?format=json","vulnerability_id":"VCID-kqa9-s6tz-tkf1","summary":"Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which allows local users to escalate privileges.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5613","reference_id":"","reference_type":"","scores":[{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22927","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.2287","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22835","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.2285","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22966","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.2313","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23174","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22965","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23038","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23091","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23111","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23074","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23018","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.2303","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23022","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22983","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22819","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22814","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.2281","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.2271","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22794","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5613"},{"reference_url":"http://www.securityfocus.com/bid/93728","reference_id":"93728","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:46Z/"}],"url":"http://www.securityfocus.com/bid/93728"},{"reference_url":"https://security.gentoo.org/glsa/201612-27","reference_id":"GLSA-201612-27","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:46Z/"}],"url":"https://security.gentoo.org/glsa/201612-27"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84669?format=json","purl":"pkg:ebuild/app-emulation/virtualbox@4.3.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox@4.3.28"}],"aliases":["CVE-2016-5613"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kqa9-s6tz-tkf1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56642?format=json","vulnerability_id":"VCID-nmm4-nj3z-9qdb","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0981","reference_id":"","reference_type":"","scores":[{"value":"0.06475","scoring_system":"epss","scoring_elements":"0.91033","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06475","scoring_system":"epss","scoring_elements":"0.91038","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06475","scoring_system":"epss","scoring_elements":"0.91047","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06475","scoring_system":"epss","scoring_elements":"0.91056","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06475","scoring_system":"epss","scoring_elements":"0.91068","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06475","scoring_system":"epss","scoring_elements":"0.91074","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06475","scoring_system":"epss","scoring_elements":"0.91083","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06475","scoring_system":"epss","scoring_elements":"0.91084","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06475","scoring_system":"epss","scoring_elements":"0.91108","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06475","scoring_system":"epss","scoring_elements":"0.9111","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06475","scoring_system":"epss","scoring_elements":"0.91124","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06475","scoring_system":"epss","scoring_elements":"0.91122","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06475","scoring_system":"epss","scoring_elements":"0.91117","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06475","scoring_system":"epss","scoring_elements":"0.91132","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06475","scoring_system":"epss","scoring_elements":"0.91147","published_at":"2026-05-07T12:55:00Z"},{"value":"0.08925","scoring_system":"epss","scoring_elements":"0.92631","published_at":"2026-05-09T12:55:00Z"},{"value":"0.08925","scoring_system":"epss","scoring_elements":"0.92634","published_at":"2026-05-11T12:55:00Z"},{"value":"0.08925","scoring_system":"epss","scoring_elements":"0.92639","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0898","scoring_system":"epss","scoring_elements":"0.92689","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0983"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741602","reference_id":"741602","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741602"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/32208.txt","reference_id":"CVE-2014-0983;CVE-2014-0982;CVE-2014-0981;OSVDB-104354;OSVDB-104353;OSVDB-104352","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/32208.txt"},{"reference_url":"https://security.gentoo.org/glsa/201612-27","reference_id":"GLSA-201612-27","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-27"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84669?format=json","purl":"pkg:ebuild/app-emulation/virtualbox@4.3.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox@4.3.28"}],"aliases":["CVE-2014-0981"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nmm4-nj3z-9qdb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56643?format=json","vulnerability_id":"VCID-pq4m-djh5-hbb6","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0983","reference_id":"","reference_type":"","scores":[{"value":"0.12015","scoring_system":"epss","scoring_elements":"0.93739","published_at":"2026-04-01T12:55:00Z"},{"value":"0.12015","scoring_system":"epss","scoring_elements":"0.93748","published_at":"2026-04-02T12:55:00Z"},{"value":"0.12015","scoring_system":"epss","scoring_elements":"0.93758","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12015","scoring_system":"epss","scoring_elements":"0.93761","published_at":"2026-04-07T12:55:00Z"},{"value":"0.12015","scoring_system":"epss","scoring_elements":"0.9377","published_at":"2026-04-08T12:55:00Z"},{"value":"0.12015","scoring_system":"epss","scoring_elements":"0.93772","published_at":"2026-04-09T12:55:00Z"},{"value":"0.12015","scoring_system":"epss","scoring_elements":"0.93777","published_at":"2026-04-11T12:55:00Z"},{"value":"0.12015","scoring_system":"epss","scoring_elements":"0.93778","published_at":"2026-04-13T12:55:00Z"},{"value":"0.12015","scoring_system":"epss","scoring_elements":"0.938","published_at":"2026-04-16T12:55:00Z"},{"value":"0.12015","scoring_system":"epss","scoring_elements":"0.93805","published_at":"2026-04-18T12:55:00Z"},{"value":"0.12015","scoring_system":"epss","scoring_elements":"0.93808","published_at":"2026-04-21T12:55:00Z"},{"value":"0.12015","scoring_system":"epss","scoring_elements":"0.93811","published_at":"2026-04-24T12:55:00Z"},{"value":"0.12015","scoring_system":"epss","scoring_elements":"0.93809","published_at":"2026-04-26T12:55:00Z"},{"value":"0.12015","scoring_system":"epss","scoring_elements":"0.93807","published_at":"2026-04-29T12:55:00Z"},{"value":"0.12015","scoring_system":"epss","scoring_elements":"0.93816","published_at":"2026-05-05T12:55:00Z"},{"value":"0.12015","scoring_system":"epss","scoring_elements":"0.93827","published_at":"2026-05-07T12:55:00Z"},{"value":"0.15584","scoring_system":"epss","scoring_elements":"0.94733","published_at":"2026-05-09T12:55:00Z"},{"value":"0.15584","scoring_system":"epss","scoring_elements":"0.94739","published_at":"2026-05-11T12:55:00Z"},{"value":"0.15584","scoring_system":"epss","scoring_elements":"0.94744","published_at":"2026-05-12T12:55:00Z"},{"value":"0.15584","scoring_system":"epss","scoring_elements":"0.94757","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0983"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741602","reference_id":"741602","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741602"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows_x86-64/remote/34334.rb","reference_id":"CVE-2015-4523;OSVDB-104354;CVE-2014-0983","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows_x86-64/remote/34334.rb"},{"reference_url":"http://www.coresecurity.com/advisories/oracle-virtualbox-3d-acceleration-multiple-memory-corruption-vulnerabilities","reference_id":"CVE-2015-4523;OSVDB-104354;CVE-2014-0983","reference_type":"exploit","scores":[],"url":"http://www.coresecurity.com/advisories/oracle-virtualbox-3d-acceleration-multiple-memory-corruption-vulnerabilities"},{"reference_url":"https://security.gentoo.org/glsa/201612-27","reference_id":"GLSA-201612-27","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-27"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84669?format=json","purl":"pkg:ebuild/app-emulation/virtualbox@4.3.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox@4.3.28"}],"aliases":["CVE-2014-0983"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pq4m-djh5-hbb6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59754?format=json","vulnerability_id":"VCID-qerv-8955-dffm","summary":"Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which allows local users to escalate privileges.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0427","reference_id":"","reference_type":"","scores":[{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.265","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26554","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26598","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26381","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.2645","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26507","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.2646","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26403","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26411","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26382","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26344","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26275","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26268","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26218","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26089","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26155","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26211","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26138","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26237","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0427"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775888","reference_id":"775888","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775888"},{"reference_url":"https://security.gentoo.org/glsa/201612-27","reference_id":"GLSA-201612-27","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-27"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84669?format=json","purl":"pkg:ebuild/app-emulation/virtualbox@4.3.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox@4.3.28"}],"aliases":["CVE-2015-0427"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qerv-8955-dffm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59757?format=json","vulnerability_id":"VCID-sn5s-ywa3-u7c1","summary":"Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which allows local users to escalate privileges.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5611","reference_id":"","reference_type":"","scores":[{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14324","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.142","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14189","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.1423","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14237","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14316","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14379","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14186","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14322","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14269","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14231","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14175","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14065","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14064","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14142","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14176","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14152","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14083","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.13956","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14113","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5611"},{"reference_url":"http://www.securityfocus.com/bid/93744","reference_id":"93744","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:49Z/"}],"url":"http://www.securityfocus.com/bid/93744"},{"reference_url":"https://security.gentoo.org/glsa/201612-27","reference_id":"GLSA-201612-27","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:49Z/"}],"url":"https://security.gentoo.org/glsa/201612-27"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84669?format=json","purl":"pkg:ebuild/app-emulation/virtualbox@4.3.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox@4.3.28"}],"aliases":["CVE-2016-5611"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sn5s-ywa3-u7c1"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox@4.3.28"}