Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/qemu-kvm-rhev@2:0.12.1.2-2.448.el6_6?arch=3
Typerpm
Namespaceredhat
Nameqemu-kvm-rhev
Version2:0.12.1.2-2.448.el6_6
Qualifiers
arch 3
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-8q9q-fs5n-gyfj
vulnerability_id VCID-8q9q-fs5n-gyfj
summary Privilege escalation via emulated floppy disk drive
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3456.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3456.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3456
reference_id
reference_type
scores
0
value 0.32263
scoring_system epss
scoring_elements 0.96809
published_at 2026-04-01T12:55:00Z
1
value 0.32263
scoring_system epss
scoring_elements 0.96816
published_at 2026-04-02T12:55:00Z
2
value 0.32263
scoring_system epss
scoring_elements 0.96841
published_at 2026-04-16T12:55:00Z
3
value 0.36084
scoring_system epss
scoring_elements 0.97088
published_at 2026-04-08T12:55:00Z
4
value 0.36084
scoring_system epss
scoring_elements 0.97089
published_at 2026-04-09T12:55:00Z
5
value 0.36084
scoring_system epss
scoring_elements 0.97092
published_at 2026-04-11T12:55:00Z
6
value 0.36084
scoring_system epss
scoring_elements 0.97093
published_at 2026-04-12T12:55:00Z
7
value 0.36084
scoring_system epss
scoring_elements 0.97094
published_at 2026-04-13T12:55:00Z
8
value 0.36084
scoring_system epss
scoring_elements 0.97079
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3456
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9718
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9718
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1218611
reference_id 1218611
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1218611
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=785424
reference_id 785424
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=785424
8
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37053.c
reference_id CVE-2015-3456;OSVDB-122072
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37053.c
9
reference_url https://marc.info/?l=oss-security&m=143155206320935&w=2
reference_id CVE-2015-3456;OSVDB-122072
reference_type exploit
scores
url https://marc.info/?l=oss-security&m=143155206320935&w=2
10
reference_url https://security.gentoo.org/glsa/201602-01
reference_id GLSA-201602-01
reference_type
scores
url https://security.gentoo.org/glsa/201602-01
11
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
12
reference_url https://security.gentoo.org/glsa/201612-27
reference_id GLSA-201612-27
reference_type
scores
url https://security.gentoo.org/glsa/201612-27
13
reference_url https://access.redhat.com/errata/RHSA-2015:0998
reference_id RHSA-2015:0998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0998
14
reference_url https://access.redhat.com/errata/RHSA-2015:0999
reference_id RHSA-2015:0999
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0999
15
reference_url https://access.redhat.com/errata/RHSA-2015:1000
reference_id RHSA-2015:1000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1000
16
reference_url https://access.redhat.com/errata/RHSA-2015:1001
reference_id RHSA-2015:1001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1001
17
reference_url https://access.redhat.com/errata/RHSA-2015:1002
reference_id RHSA-2015:1002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1002
18
reference_url https://access.redhat.com/errata/RHSA-2015:1003
reference_id RHSA-2015:1003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1003
19
reference_url https://access.redhat.com/errata/RHSA-2015:1004
reference_id RHSA-2015:1004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1004
20
reference_url https://access.redhat.com/errata/RHSA-2015:1011
reference_id RHSA-2015:1011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1011
21
reference_url https://access.redhat.com/errata/RHSA-2015:1031
reference_id RHSA-2015:1031
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1031
22
reference_url https://usn.ubuntu.com/2608-1/
reference_id USN-2608-1
reference_type
scores
url https://usn.ubuntu.com/2608-1/
23
reference_url https://xenbits.xen.org/xsa/advisory-133.html
reference_id XSA-133
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-133.html
fixed_packages
aliases CVE-2015-3456
risk_score 0.6
exploitability 2.0
weighted_severity 0.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8q9q-fs5n-gyfj
Fixing_vulnerabilities
Risk_score0.6
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/qemu-kvm-rhev@2:0.12.1.2-2.448.el6_6%3Farch=3