{"url":"http://public2.vulnerablecode.io/api/packages/85568?format=json","purl":"pkg:ebuild/kde-base/kdelibs@4.12.5-r1","type":"ebuild","namespace":"kde-base","name":"kdelibs","version":"4.12.5-r1","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61384?format=json","vulnerability_id":"VCID-94nq-6rud-23ep","summary":"Multiple vulnerabilities have been discovered in KDE Libraries, the\n    worst of which could lead to man-in-the-middle attacks.","references":[{"reference_url":"http://openwall.com/lists/oss-security/2011/03/08/13","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/08/13"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/08/20","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/08/20"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1094.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1094.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1094","reference_id":"","reference_type":"","scores":[{"value":"0.00813","scoring_system":"epss","scoring_elements":"0.74436","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00813","scoring_system":"epss","scoring_elements":"0.74216","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00813","scoring_system":"epss","scoring_elements":"0.74221","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00813","scoring_system":"epss","scoring_elements":"0.74248","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00813","scoring_system":"epss","scoring_elements":"0.74254","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00813","scoring_system":"epss","scoring_elements":"0.74269","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00813","scoring_system":"epss","scoring_elements":"0.7429","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00813","scoring_system":"epss","scoring_elements":"0.74271","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00813","scoring_system":"epss","scoring_elements":"0.74264","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00813","scoring_system":"epss","scoring_elements":"0.74301","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00813","scoring_system":"epss","scoring_elements":"0.7431","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00813","scoring_system":"epss","scoring_elements":"0.74302","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00813","scoring_system":"epss","scoring_elements":"0.74334","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00813","scoring_system":"epss","scoring_elements":"0.74343","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00813","scoring_system":"epss","scoring_elements":"0.74342","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00813","scoring_system":"epss","scoring_elements":"0.74339","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00813","scoring_system":"epss","scoring_elements":"0.74368","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00813","scoring_system":"epss","scoring_elements":"0.74392","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00813","scoring_system":"epss","scoring_elements":"0.74358","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00813","scoring_system":"epss","scoring_elements":"0.7438","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1094"},{"reference_url":"http://secunia.com/advisories/44108","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/44108"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/65986","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/65986"},{"reference_url":"https://projects.kde.org/projects/kde/kdelibs/repository/revisions/76f935197599a335a5fe09b78751ddb455248cf7","reference_id":"","reference_type":"","scores":[],"url":"https://projects.kde.org/projects/kde/kdelibs/repository/revisions/76f935197599a335a5fe09b78751ddb455248cf7"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:071","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:071"},{"reference_url":"http://www.securityfocus.com/bid/46789","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/46789"},{"reference_url":"http://www.ubuntu.com/usn/USN-1110-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1110-1"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0913","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0913"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0990","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0990"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=632114","reference_id":"632114","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=632114"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:kdelibs:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:kdelibs:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:kdelibs:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:kdelibs:3.5.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:kdelibs:3.5.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:kdelibs:3.5.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:kdelibs:3.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:kdelibs:3.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:kdelibs:3.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:kdelibs:3.5.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:kdelibs:3.5.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:kdelibs:3.5.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1094","reference_id":"CVE-2011-1094","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1094"},{"reference_url":"https://security.gentoo.org/glsa/201406-34","reference_id":"GLSA-201406-34","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-34"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0464","reference_id":"RHSA-2011:0464","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0464"},{"reference_url":"https://usn.ubuntu.com/1110-1/","reference_id":"USN-1110-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1110-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85568?format=json","purl":"pkg:ebuild/kde-base/kdelibs@4.12.5-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kdelibs@4.12.5-r1"}],"aliases":["CVE-2011-1094"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-94nq-6rud-23ep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61386?format=json","vulnerability_id":"VCID-9wp9-5zud-9ba9","summary":"Multiple vulnerabilities have been discovered in KDE Libraries, the\n    worst of which could lead to man-in-the-middle attacks.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-03/msg00068.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-03/msg00068.html"},{"reference_url":"http://quickgit.kde.org/?p=kdelibs.git&a=commitdiff&h=bbae87dc1be3ae063796a582774bd5642cacdd5d&hp=1ccdb43ed3b32a7798eec6d39bb3c83a6e40228f","reference_id":"","reference_type":"","scores":[],"url":"http://quickgit.kde.org/?p=kdelibs.git&a=commitdiff&h=bbae87dc1be3ae063796a582774bd5642cacdd5d&hp=1ccdb43ed3b32a7798eec6d39bb3c83a6e40228f"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3494.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3494.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3494","reference_id":"","reference_type":"","scores":[{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39215","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39478","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39628","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.3965","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39567","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39621","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39636","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39646","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39609","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39593","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39644","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39615","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39532","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39351","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39336","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39254","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39129","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39196","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39211","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39119","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39143","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3494"},{"reference_url":"http://www.kde.org/info/security/advisory-20140618-1.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.kde.org/info/security/advisory-20140618-1.txt"},{"reference_url":"http://www.securityfocus.com/bid/68113","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/68113"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1111022","reference_id":"1111022","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1111022"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.10.97:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:kdelibs:4.10.97:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.10.97:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.11.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:kdelibs:4.11.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.11.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:kdelibs:4.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:kdelibs:4.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:kdelibs:4.11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.11.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:kdelibs:4.11.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.11.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.11.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:kdelibs:4.11.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.11.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.11.80:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:kdelibs:4.11.80:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.11.80:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.11.90:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:kdelibs:4.11.90:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.11.90:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.11.95:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:kdelibs:4.11.95:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.11.95:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.11.97:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:kdelibs:4.11.97:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.11.97:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:kdelibs:4.12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:kdelibs:4.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:kdelibs:4.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:kdelibs:4.12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.12.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:kdelibs:4.12.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.12.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.12.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:kdelibs:4.12.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.12.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.12.80:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:kdelibs:4.12.80:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.12.80:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.12.90:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:kdelibs:4.12.90:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.12.90:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.12.95:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:kdelibs:4.12.95:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.12.95:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.12.97:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:kdelibs:4.12.97:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.12.97:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.13.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:kdelibs:4.13.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.13.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:kdelibs:4.13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdelibs:4.13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3494","reference_id":"CVE-2014-3494","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3494"},{"reference_url":"https://security.gentoo.org/glsa/201406-34","reference_id":"GLSA-201406-34","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-34"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85568?format=json","purl":"pkg:ebuild/kde-base/kdelibs@4.12.5-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kdelibs@4.12.5-r1"}],"aliases":["CVE-2014-3494"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9wp9-5zud-9ba9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33545?format=json","vulnerability_id":"VCID-jt7k-z71a-rude","summary":"This GLSA contains notification of vulnerabilities found in several\n    Gentoo packages which have been fixed prior to January 1, 2012. The worst\n    of these vulnerabilities could lead to local privilege escalation and\n    remote code execution. Please see the package list and CVE identifiers\n    below for more information.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3365.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3365.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3365","reference_id":"","reference_type":"","scores":[{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46177","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46219","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46238","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46186","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46242","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46244","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46267","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46239","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46249","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46306","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46302","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46246","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46228","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46184","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.4609","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46155","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46175","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46115","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46145","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46217","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3365"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=743054","reference_id":"743054","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=743054"},{"reference_url":"https://security.gentoo.org/glsa/201406-34","reference_id":"GLSA-201406-34","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-34"},{"reference_url":"https://security.gentoo.org/glsa/201412-09","reference_id":"GLSA-201412-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1364","reference_id":"RHSA-2011:1364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1385","reference_id":"RHSA-2011:1385","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1385"},{"reference_url":"https://usn.ubuntu.com/1248-1/","reference_id":"USN-1248-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1248-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85568?format=json","purl":"pkg:ebuild/kde-base/kdelibs@4.12.5-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kdelibs@4.12.5-r1"}],"aliases":["CVE-2011-3365"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jt7k-z71a-rude"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61385?format=json","vulnerability_id":"VCID-x5hm-u78m-v7g2","summary":"Multiple vulnerabilities have been discovered in KDE Libraries, the\n    worst of which could lead to man-in-the-middle attacks.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2074.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2074.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2074","reference_id":"","reference_type":"","scores":[{"value":"0.01467","scoring_system":"epss","scoring_elements":"0.81094","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01467","scoring_system":"epss","scoring_elements":"0.81052","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01467","scoring_system":"epss","scoring_elements":"0.80843","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01467","scoring_system":"epss","scoring_elements":"0.80851","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01467","scoring_system":"epss","scoring_elements":"0.80874","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01467","scoring_system":"epss","scoring_elements":"0.80871","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01467","scoring_system":"epss","scoring_elements":"0.80899","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01467","scoring_system":"epss","scoring_elements":"0.80907","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01467","scoring_system":"epss","scoring_elements":"0.80924","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01467","scoring_system":"epss","scoring_elements":"0.80909","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01467","scoring_system":"epss","scoring_elements":"0.80901","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01467","scoring_system":"epss","scoring_elements":"0.80937","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01467","scoring_system":"epss","scoring_elements":"0.80939","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01467","scoring_system":"epss","scoring_elements":"0.8096","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01467","scoring_system":"epss","scoring_elements":"0.80967","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01467","scoring_system":"epss","scoring_elements":"0.80978","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01467","scoring_system":"epss","scoring_elements":"0.80995","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01467","scoring_system":"epss","scoring_elements":"0.81017","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01467","scoring_system":"epss","scoring_elements":"0.81039","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01467","scoring_system":"epss","scoring_elements":"0.81034","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2074"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:N/A:N"},{"value":"2.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=961981","reference_id":"961981","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=961981"},{"reference_url":"https://security.gentoo.org/glsa/201406-34","reference_id":"GLSA-201406-34","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-34"},{"reference_url":"https://usn.ubuntu.com/1842-1/","reference_id":"USN-1842-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1842-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85568?format=json","purl":"pkg:ebuild/kde-base/kdelibs@4.12.5-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kdelibs@4.12.5-r1"}],"aliases":["CVE-2013-2074"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x5hm-u78m-v7g2"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kdelibs@4.12.5-r1"}