Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/405486?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/405486?format=api", "purl": "pkg:apk/alpine/qemu@5.1.0-r1?arch=armv7&distroversion=v3.22&reponame=community", "type": "apk", "namespace": "alpine", "name": "qemu", "version": "5.1.0-r1", "qualifiers": { "arch": "armv7", "distroversion": "v3.22", "reponame": "community" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "5.2.0-r0", "latest_non_vulnerable_version": "8.0.2-r1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61635?format=api", "vulnerability_id": "VCID-6ef4-c38a-j7ca", "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13362.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13362.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-13362", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26973", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27014", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.2705", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26841", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26909", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26956", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.2696", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26916", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26859", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26871", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-13362" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10756", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10756" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13361", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13361" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13362", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13362" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13659", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13659" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13754", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13754" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13765", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13765" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1840999", "reference_id": "1840999", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1840999" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961887", "reference_id": "961887", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961887" }, { "reference_url": "https://security.gentoo.org/glsa/202011-09", "reference_id": "GLSA-202011-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202011-09" }, { "reference_url": "https://usn.ubuntu.com/4467-1/", "reference_id": "USN-4467-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4467-1/" }, { "reference_url": "https://usn.ubuntu.com/4467-2/", "reference_id": "USN-4467-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4467-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/405486?format=api", "purl": "pkg:apk/alpine/qemu@5.1.0-r1?arch=armv7&distroversion=v3.22&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qemu@5.1.0-r1%3Farch=armv7&distroversion=v3.22&reponame=community" } ], "aliases": [ "CVE-2020-13362" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6ef4-c38a-j7ca" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61634?format=api", "vulnerability_id": "VCID-6hqu-ecs5-zqeb", "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13361.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13361.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-13361", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26973", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27014", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.2705", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26841", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26909", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26956", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.2696", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26916", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26859", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26871", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-13361" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10756", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10756" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13361", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13361" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13362", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13362" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13659", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13659" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13754", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13754" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13765", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13765" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1840980", "reference_id": "1840980", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1840980" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961888", "reference_id": "961888", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961888" }, { "reference_url": "https://security.gentoo.org/glsa/202011-09", "reference_id": "GLSA-202011-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202011-09" }, { "reference_url": "https://usn.ubuntu.com/4467-1/", "reference_id": "USN-4467-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4467-1/" }, { "reference_url": "https://usn.ubuntu.com/4467-2/", "reference_id": "USN-4467-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4467-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/405486?format=api", "purl": "pkg:apk/alpine/qemu@5.1.0-r1?arch=armv7&distroversion=v3.22&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qemu@5.1.0-r1%3Farch=armv7&distroversion=v3.22&reponame=community" } ], "aliases": [ "CVE-2020-13361" ], "risk_score": 1.8, "exploitability": "0.5", "weighted_severity": "3.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6hqu-ecs5-zqeb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81125?format=api", "vulnerability_id": "VCID-93gr-c812-uud8", "summary": "QEMU: sdhci: out-of-bounds access issue while doing multi block SDMA", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25085.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25085.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25085", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.3636", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.36534", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.36567", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.36405", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.36457", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.36477", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.36484", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.36449", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.36427", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.36468", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25085" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25085", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25085" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879671", "reference_id": "1879671", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879671" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970540", "reference_id": "970540", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970540" }, { "reference_url": "https://usn.ubuntu.com/4650-1/", "reference_id": "USN-4650-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4650-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/405486?format=api", "purl": "pkg:apk/alpine/qemu@5.1.0-r1?arch=armv7&distroversion=v3.22&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qemu@5.1.0-r1%3Farch=armv7&distroversion=v3.22&reponame=community" } ], "aliases": [ "CVE-2020-25085" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-93gr-c812-uud8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81126?format=api", "vulnerability_id": "VCID-a169-mquf-9kep", "summary": "QEMU: fdc: null pointer dereference during r/w data transfer", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25741.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25741.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25741", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36809", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39778", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39926", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39954", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39876", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39932", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39945", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39955", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.3992", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.399", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25741" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881401", "reference_id": "1881401", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881401" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970939", "reference_id": "970939", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970939" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/405486?format=api", "purl": "pkg:apk/alpine/qemu@5.1.0-r1?arch=armv7&distroversion=v3.22&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qemu@5.1.0-r1%3Farch=armv7&distroversion=v3.22&reponame=community" } ], "aliases": [ "CVE-2020-25741" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a169-mquf-9kep" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80797?format=api", "vulnerability_id": "VCID-juek-f6et-x7eb", "summary": "QEMU: e1000e: infinite loop scenario in case of null packet descriptor", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28916.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28916.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-28916", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14431", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14494", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14564", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14372", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14457", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14511", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.1446", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14423", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14366", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14257", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-28916" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28916", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28916" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903064", "reference_id": "1903064", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903064" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=974687", "reference_id": "974687", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=974687" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1762", "reference_id": "RHSA-2021:1762", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1762" }, { "reference_url": "https://usn.ubuntu.com/4725-1/", "reference_id": "USN-4725-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4725-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/405486?format=api", "purl": "pkg:apk/alpine/qemu@5.1.0-r1?arch=armv7&distroversion=v3.22&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qemu@5.1.0-r1%3Farch=armv7&distroversion=v3.22&reponame=community" } ], "aliases": [ "CVE-2020-28916" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-juek-f6et-x7eb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80905?format=api", "vulnerability_id": "VCID-nuwe-tupt-wfhg", "summary": "QEMU: usb: hcd-ohci: infinite loop issue while processing transfer descriptors", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25625.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25625.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25625", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08724", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.34948", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35147", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35176", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35054", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35098", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35125", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.3513", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35095", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35071", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25625" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25625", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25625" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879808", "reference_id": "1879808", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879808" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970542", "reference_id": "970542", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970542" }, { "reference_url": "https://usn.ubuntu.com/4650-1/", "reference_id": "USN-4650-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4650-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/405486?format=api", "purl": "pkg:apk/alpine/qemu@5.1.0-r1?arch=armv7&distroversion=v3.22&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qemu@5.1.0-r1%3Farch=armv7&distroversion=v3.22&reponame=community" } ], "aliases": [ "CVE-2020-25625" ], "risk_score": 1.1, "exploitability": "0.5", "weighted_severity": "2.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nuwe-tupt-wfhg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81124?format=api", "vulnerability_id": "VCID-p2we-9qfu-17eb", "summary": "QEMU: usb: use-after-free issue while setting up packet", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25084.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25084.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25084", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10273", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10944", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11082", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11145", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10966", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11043", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11097", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.111", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11068", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11045", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25084" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25084", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25084" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879652", "reference_id": "1879652", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879652" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970539", "reference_id": "970539", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970539" }, { "reference_url": "https://usn.ubuntu.com/4650-1/", "reference_id": "USN-4650-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4650-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/405486?format=api", "purl": "pkg:apk/alpine/qemu@5.1.0-r1?arch=armv7&distroversion=v3.22&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qemu@5.1.0-r1%3Farch=armv7&distroversion=v3.22&reponame=community" } ], "aliases": [ "CVE-2020-25084" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p2we-9qfu-17eb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80904?format=api", "vulnerability_id": "VCID-vpp8-a7sw-pqef", "summary": "QEMU: usb: hcd-ohci: out-of-bound access issue while processing transfer descriptors", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25624.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25624.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25624", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09846", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09939", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09986", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09884", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.0996", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10009", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10025", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09984", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09963", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09839", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25624" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879801", "reference_id": "1879801", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879801" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970541", "reference_id": "970541", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970541" }, { "reference_url": "https://usn.ubuntu.com/4650-1/", "reference_id": "USN-4650-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4650-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/405486?format=api", "purl": "pkg:apk/alpine/qemu@5.1.0-r1?arch=armv7&distroversion=v3.22&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qemu@5.1.0-r1%3Farch=armv7&distroversion=v3.22&reponame=community" } ], "aliases": [ "CVE-2020-25624" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vpp8-a7sw-pqef" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35376?format=api", "vulnerability_id": "VCID-wdjx-9f36-abgu", "summary": "Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape).", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15863.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15863.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15863", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13872", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13955", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.14011", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13813", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13896", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13869", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.1382", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13948", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13905", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31177", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12829", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12829" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16092", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16092" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853725", "reference_id": "1853725", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853725" }, { "reference_url": "https://security.gentoo.org/glsa/202208-27", "reference_id": "GLSA-202208-27", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-27" }, { "reference_url": "https://usn.ubuntu.com/4467-1/", "reference_id": "USN-4467-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4467-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/405486?format=api", "purl": "pkg:apk/alpine/qemu@5.1.0-r1?arch=armv7&distroversion=v3.22&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qemu@5.1.0-r1%3Farch=armv7&distroversion=v3.22&reponame=community" } ], "aliases": [ "CVE-2020-15863" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wdjx-9f36-abgu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35381?format=api", "vulnerability_id": "VCID-wjxf-kgdw-2kau", "summary": "Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape).", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16092.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16092.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-16092", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11559", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11685", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11728", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11513", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.116", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.1166", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11672", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11635", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11608", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.1147", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-16092" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12829", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12829" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16092", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16092" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860283", "reference_id": "1860283", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860283" }, { "reference_url": "https://security.gentoo.org/glsa/202208-27", "reference_id": "GLSA-202208-27", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-27" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5111", "reference_id": "RHSA-2020:5111", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5111" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0346", "reference_id": "RHSA-2021:0346", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0346" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0347", "reference_id": "RHSA-2021:0347", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0347" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0459", "reference_id": "RHSA-2021:0459", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0459" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0934", "reference_id": "RHSA-2021:0934", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0934" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1762", "reference_id": "RHSA-2021:1762", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1762" }, { "reference_url": "https://usn.ubuntu.com/4467-1/", "reference_id": "USN-4467-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4467-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/405486?format=api", "purl": "pkg:apk/alpine/qemu@5.1.0-r1?arch=armv7&distroversion=v3.22&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qemu@5.1.0-r1%3Farch=armv7&distroversion=v3.22&reponame=community" } ], "aliases": [ "CVE-2020-16092" ], "risk_score": 1.7, "exploitability": "0.5", "weighted_severity": "3.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wjxf-kgdw-2kau" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4232?format=api", "vulnerability_id": "VCID-wm9d-ymbb-sfdc", "summary": "QEMU: usb: out-of-bounds r/w access issue", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14364.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14364.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14364", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.13903", "scoring_system": "epss", "scoring_elements": "0.94268", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.13903", "scoring_system": "epss", "scoring_elements": "0.94277", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.13903", "scoring_system": "epss", "scoring_elements": "0.94289", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.13903", "scoring_system": "epss", "scoring_elements": "0.9429", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.13903", "scoring_system": "epss", "scoring_elements": "0.94299", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.13903", "scoring_system": "epss", "scoring_elements": "0.94304", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.13903", "scoring_system": "epss", "scoring_elements": "0.94308", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.13903", "scoring_system": "epss", "scoring_elements": "0.94309", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.13903", "scoring_system": "epss", "scoring_elements": "0.94324", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12829", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12829" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16092", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16092" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869201", "reference_id": "1869201", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869201" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968947", "reference_id": "968947", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968947" }, { "reference_url": "https://security.gentoo.org/glsa/202009-14", "reference_id": "GLSA-202009-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202009-14" }, { "reference_url": "https://security.gentoo.org/glsa/202011-09", "reference_id": "GLSA-202011-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202011-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4047", "reference_id": "RHSA-2020:4047", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4047" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4048", "reference_id": "RHSA-2020:4048", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4048" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4049", "reference_id": "RHSA-2020:4049", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4049" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4050", "reference_id": "RHSA-2020:4050", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4050" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4051", "reference_id": "RHSA-2020:4051", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4051" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4052", "reference_id": "RHSA-2020:4052", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4052" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4053", "reference_id": "RHSA-2020:4053", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4053" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4054", "reference_id": "RHSA-2020:4054", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4054" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4055", "reference_id": "RHSA-2020:4055", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4055" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4056", "reference_id": "RHSA-2020:4056", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4056" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4058", "reference_id": "RHSA-2020:4058", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4058" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4059", "reference_id": "RHSA-2020:4059", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4059" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4078", "reference_id": "RHSA-2020:4078", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4078" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4079", "reference_id": "RHSA-2020:4079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4079" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4111", "reference_id": "RHSA-2020:4111", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4111" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4115", "reference_id": "RHSA-2020:4115", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4115" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4162", "reference_id": "RHSA-2020:4162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4162" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4167", "reference_id": "RHSA-2020:4167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4172", "reference_id": "RHSA-2020:4172", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4172" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4176", "reference_id": "RHSA-2020:4176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4176" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4290", "reference_id": "RHSA-2020:4290", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4290" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4291", "reference_id": "RHSA-2020:4291", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4291" }, { "reference_url": "https://usn.ubuntu.com/4467-2/", "reference_id": "USN-4467-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4467-2/" }, { "reference_url": "https://usn.ubuntu.com/4511-1/", "reference_id": "USN-4511-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4511-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-335.html", "reference_id": "XSA-335", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-335.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/405486?format=api", "purl": "pkg:apk/alpine/qemu@5.1.0-r1?arch=armv7&distroversion=v3.22&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qemu@5.1.0-r1%3Farch=armv7&distroversion=v3.22&reponame=community" } ], "aliases": [ "CVE-2020-14364", "XSA-335" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wm9d-ymbb-sfdc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80977?format=api", "vulnerability_id": "VCID-x8ue-gf65-uket", "summary": "QEMU: heap buffer overflow in sdhci_sdma_transfer_multi_blocks() in hw/sd/sdhci.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-17380.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-17380.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-17380", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53607", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53606", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53588", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53571", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53541", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53509", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.5356", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53556", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55504", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55393", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-17380" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17380", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17380" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1862167", "reference_id": "1862167", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1862167" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970937", "reference_id": "970937", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970937" }, { "reference_url": "https://usn.ubuntu.com/4650-1/", "reference_id": "USN-4650-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4650-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/405486?format=api", "purl": "pkg:apk/alpine/qemu@5.1.0-r1?arch=armv7&distroversion=v3.22&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qemu@5.1.0-r1%3Farch=armv7&distroversion=v3.22&reponame=community" } ], "aliases": [ "CVE-2020-17380" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x8ue-gf65-uket" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qemu@5.1.0-r1%3Farch=armv7&distroversion=v3.22&reponame=community" }