{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/149401?format=json","vulnerability_id":"VCID-6xr7-4aq5-rye5","summary":"Integer overflow in the Drive Execution Environment (DXE) phase in the Capsule Update feature in the UEFI implementation in EDK2 allows physically proximate attackers to bypass intended access restrictions via crafted data.","aliases":[{"alias":"CVE-2014-4859"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585972?format=json","purl":"pkg:deb/debian/edk2@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/edk2@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/583001?format=json","purl":"pkg:deb/debian/edk2@2020.11-2%2Bdeb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-b7a9-w2fs-dbh7"},{"vulnerability":"VCID-k7zd-s9nc-r3hb"},{"vulnerability":"VCID-mg21-k76s-sqfp"},{"vulnerability":"VCID-quq1-8rke-c3gf"},{"vulnerability":"VCID-r48c-b4df-ffhx"},{"vulnerability":"VCID-sd4b-3g4z-mubq"},{"vulnerability":"VCID-z1gk-5f8t-tqau"},{"vulnerability":"VCID-zd64-tjtu-sua3"},{"vulnerability":"VCID-zwx2-8yhh-7yef"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/edk2@2020.11-2%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/583002?format=json","purl":"pkg:deb/debian/edk2@2022.11-6%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-b7a9-w2fs-dbh7"},{"vulnerability":"VCID-k7zd-s9nc-r3hb"},{"vulnerability":"VCID-mg21-k76s-sqfp"},{"vulnerability":"VCID-quq1-8rke-c3gf"},{"vulnerability":"VCID-r48c-b4df-ffhx"},{"vulnerability":"VCID-sd4b-3g4z-mubq"},{"vulnerability":"VCID-z1gk-5f8t-tqau"},{"vulnerability":"VCID-zd64-tjtu-sua3"},{"vulnerability":"VCID-zwx2-8yhh-7yef"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/edk2@2022.11-6%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/583003?format=json","purl":"pkg:deb/debian/edk2@2025.02-8%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-zd64-tjtu-sua3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/edk2@2025.02-8%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/583004?format=json","purl":"pkg:deb/debian/edk2@2025.02-9?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-zd64-tjtu-sua3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/edk2@2025.02-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/583005?format=json","purl":"pkg:deb/debian/edk2@2025.11-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/edk2@2025.11-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1000432?format=json","purl":"pkg:deb/debian/edk2@2025.11-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/edk2@2025.11-5%3Fdistro=trixie"}],"affected_packages":[],"references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4859","reference_id":"","reference_type":"","scores":[{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11803","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11919","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11966","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11755","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11838","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11889","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.119","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11862","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11834","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11698","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11697","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11814","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17358","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17336","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17271","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17131","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.1722","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17313","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17282","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17322","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17404","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17397","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17409","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4859"}],"weaknesses":[],"exploits":[],"severity_range_score":null,"exploitability":null,"weighted_severity":null,"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6xr7-4aq5-rye5"}