{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56643?format=json","vulnerability_id":"VCID-pq4m-djh5-hbb6","summary":"security update","aliases":[{"alias":"CVE-2014-0983"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/942193?format=json","purl":"pkg:deb/debian/virtualbox@4.3.10-dfsg-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@4.3.10-dfsg-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/942186?format=json","purl":"pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1059665?format=json","purl":"pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/84669?format=json","purl":"pkg:ebuild/app-emulation/virtualbox@4.3.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox@4.3.28"},{"url":"http://public2.vulnerablecode.io/api/packages/84670?format=json","purl":"pkg:ebuild/app-emulation/virtualbox-bin@4.3.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox-bin@4.3.28"}],"affected_packages":[],"references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0983","reference_id":"","reference_type":"","scores":[{"value":"0.12015","scoring_system":"epss","scoring_elements":"0.93739","published_at":"2026-04-01T12:55:00Z"},{"value":"0.12015","scoring_system":"epss","scoring_elements":"0.93748","published_at":"2026-04-02T12:55:00Z"},{"value":"0.12015","scoring_system":"epss","scoring_elements":"0.93758","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12015","scoring_system":"epss","scoring_elements":"0.93761","published_at":"2026-04-07T12:55:00Z"},{"value":"0.12015","scoring_system":"epss","scoring_elements":"0.9377","published_at":"2026-04-08T12:55:00Z"},{"value":"0.12015","scoring_system":"epss","scoring_elements":"0.93772","published_at":"2026-04-09T12:55:00Z"},{"value":"0.12015","scoring_system":"epss","scoring_elements":"0.93777","published_at":"2026-04-11T12:55:00Z"},{"value":"0.12015","scoring_system":"epss","scoring_elements":"0.93778","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0983"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741602","reference_id":"741602","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741602"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows_x86-64/remote/34334.rb","reference_id":"CVE-2015-4523;OSVDB-104354;CVE-2014-0983","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows_x86-64/remote/34334.rb"},{"reference_url":"http://www.coresecurity.com/advisories/oracle-virtualbox-3d-acceleration-multiple-memory-corruption-vulnerabilities","reference_id":"CVE-2015-4523;OSVDB-104354;CVE-2014-0983","reference_type":"exploit","scores":[],"url":"http://www.coresecurity.com/advisories/oracle-virtualbox-3d-acceleration-multiple-memory-corruption-vulnerabilities"},{"reference_url":"https://security.gentoo.org/glsa/201612-27","reference_id":"GLSA-201612-27","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-27"}],"weaknesses":[],"exploits":[{"date_added":"2014-08-14","description":"Oracle VM VirtualBox 4.3.6 - 3D Acceleration Virtual Machine Escape (Metasploit)","required_action":null,"due_date":null,"notes":null,"known_ransomware_campaign_use":true,"source_date_published":"2014-08-14","exploit_type":"remote","platform":"windows_x86-64","source_date_updated":"2016-10-27","data_source":"Exploit-DB","source_url":"http://www.coresecurity.com/advisories/oracle-virtualbox-3d-acceleration-multiple-memory-corruption-vulnerabilities"},{"date_added":null,"description":"This module exploits a vulnerability in the 3D Acceleration support for VirtualBox. The\n            vulnerability exists in the remote rendering of OpenGL-based 3D graphics. By sending a\n            sequence of specially crafted rendering messages, a virtual machine can exploit an out\n            of bounds array access to corrupt memory and escape to the host. This module has been\n            tested successfully on Windows 7 SP1 (64 bits) as Host running Virtual Box 4.3.6.","required_action":null,"due_date":null,"notes":"Reliability:\n  - unknown-reliability\nStability:\n  - unknown-stability\nSideEffects:\n  - unknown-side-effects\n","known_ransomware_campaign_use":false,"source_date_published":"2014-03-11","exploit_type":null,"platform":"Windows","source_date_updated":null,"data_source":"Metasploit","source_url":"https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/windows/local/virtual_box_opengl_escape.rb"}],"severity_range_score":null,"exploitability":null,"weighted_severity":null,"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pq4m-djh5-hbb6"}