Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/83166?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/83166?format=api", "purl": "pkg:ebuild/app-emulation/qemu@2.11.1-r1", "type": "ebuild", "namespace": "app-emulation", "name": "qemu", "version": "2.11.1-r1", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "3.1.0-r4", "latest_non_vulnerable_version": "8.0.0", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56776?format=api", "vulnerability_id": "VCID-1erd-fd8p-hqch", "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n which may allow an attacker to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13672.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13672.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-13672", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00668", "scoring_system": "epss", "scoring_elements": "0.71226", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73714", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73671", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73704", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73586", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73609", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73582", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73618", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73631", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73653", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73635", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73626", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.7367", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73679", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-13672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12809", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12809" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13711", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13711" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14167", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14167" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9375", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9375" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.3", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:M/Au:S/C:N/I:N/A:P" }, { "value": "3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1486560", "reference_id": "1486560", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1486560" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873851", "reference_id": "873851", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873851" }, { "reference_url": "https://security.gentoo.org/glsa/201804-08", "reference_id": "GLSA-201804-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201804-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0816", "reference_id": "RHSA-2018:0816", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0816" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1104", "reference_id": "RHSA-2018:1104", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1104" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1113", "reference_id": "RHSA-2018:1113", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1113" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2162", "reference_id": "RHSA-2018:2162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2162" }, { "reference_url": "https://usn.ubuntu.com/3575-1/", "reference_id": "USN-3575-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3575-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83166?format=api", "purl": "pkg:ebuild/app-emulation/qemu@2.11.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.11.1-r1" } ], "aliases": [ "CVE-2017-13672" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1erd-fd8p-hqch" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56778?format=api", "vulnerability_id": "VCID-d8cd-qgg7-fyed", "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n which may allow an attacker to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16845.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16845.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16845", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02074", "scoring_system": "epss", "scoring_elements": "0.83891", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02074", "scoring_system": "epss", "scoring_elements": "0.84025", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02074", "scoring_system": "epss", "scoring_elements": "0.83984", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02074", "scoring_system": "epss", "scoring_elements": "0.83985", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02074", "scoring_system": "epss", "scoring_elements": "0.84012", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02074", "scoring_system": "epss", "scoring_elements": "0.84019", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02074", "scoring_system": "epss", "scoring_elements": "0.83905", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02074", "scoring_system": "epss", "scoring_elements": "0.83921", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02074", "scoring_system": "epss", "scoring_elements": "0.83924", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02074", "scoring_system": "epss", "scoring_elements": "0.83948", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02074", "scoring_system": "epss", "scoring_elements": "0.83954", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02074", "scoring_system": "epss", "scoring_elements": "0.8397", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02074", "scoring_system": "epss", "scoring_elements": "0.83964", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02074", "scoring_system": "epss", "scoring_elements": "0.8396", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:S/C:P/I:N/A:N" }, { "value": "3.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html" }, { "reference_url": "https://lists.gnu.org/archive/html/qemu-devel/2017-11/msg02982.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.gnu.org/archive/html/qemu-devel/2017-11/msg02982.html" }, { "reference_url": "https://www.debian.org/security/2018/dsa-4213", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2018/dsa-4213" }, { "reference_url": "http://www.securityfocus.com/bid/101923", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101923" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1514148", "reference_id": "1514148", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1514148" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882136", "reference_id": "882136", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882136" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16845", "reference_id": "CVE-2017-16845", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:P" }, { "value": "10.0", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16845" }, { "reference_url": "https://security.gentoo.org/glsa/201804-08", "reference_id": "GLSA-201804-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201804-08" }, { "reference_url": "https://usn.ubuntu.com/3575-1/", "reference_id": "USN-3575-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3575-1/" }, { "reference_url": "https://usn.ubuntu.com/3649-1/", "reference_id": "USN-3649-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3649-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83166?format=api", "purl": "pkg:ebuild/app-emulation/qemu@2.11.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.11.1-r1" } ], "aliases": [ "CVE-2017-16845" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d8cd-qgg7-fyed" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56780?format=api", "vulnerability_id": "VCID-e3xt-vft1-kbbe", "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n which may allow an attacker to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18030.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18030.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18030", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28947", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.29023", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.29072", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28881", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28949", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28991", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28995", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28951", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28901", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28925", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28855", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28737", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28625", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28555", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18030" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18030", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18030" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1530360", "reference_id": "1530360", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1530360" }, { "reference_url": "https://security.gentoo.org/glsa/201804-08", "reference_id": "GLSA-201804-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201804-08" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83166?format=api", "purl": "pkg:ebuild/app-emulation/qemu@2.11.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.11.1-r1" } ], "aliases": [ "CVE-2017-18030" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e3xt-vft1-kbbe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56779?format=api", "vulnerability_id": "VCID-gmvy-m5mq-yycx", "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n which may allow an attacker to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17381.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17381.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17381", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40072", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.39859", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40235", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40127", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.39954", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.39939", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.4022", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40245", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40167", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40231", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40243", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40205", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40187", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17381" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "1.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.gnu.org/archive/html/qemu-devel/2017-12/msg00166.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.gnu.org/archive/html/qemu-devel/2017-12/msg00166.html" }, { "reference_url": "https://www.debian.org/security/2018/dsa-4213", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2018/dsa-4213" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2017/12/05/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2017/12/05/2" }, { "reference_url": "http://www.securityfocus.com/bid/102059", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/102059" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1520782", "reference_id": "1520782", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1520782" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883625", "reference_id": "883625", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883625" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.11.0:rc0:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:qemu:qemu:2.11.0:rc0:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.11.0:rc0:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.11.0:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:qemu:qemu:2.11.0:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.11.0:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.11.0:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:qemu:qemu:2.11.0:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.11.0:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.11.0:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:qemu:qemu:2.11.0:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.11.0:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17381", "reference_id": "CVE-2017-17381", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17381" }, { "reference_url": "https://security.gentoo.org/glsa/201804-08", "reference_id": "GLSA-201804-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201804-08" }, { "reference_url": "https://usn.ubuntu.com/3575-1/", "reference_id": "USN-3575-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3575-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83166?format=api", "purl": "pkg:ebuild/app-emulation/qemu@2.11.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.11.1-r1" } ], "aliases": [ "CVE-2017-17381" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gmvy-m5mq-yycx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56782?format=api", "vulnerability_id": "VCID-jnxy-g6wu-8ubu", "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n which may allow an attacker to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5683.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5683.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-5683", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07573", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07682", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07714", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07681", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.0774", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07759", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07758", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07744", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08059", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08117", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08025", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.0801", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08167", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08123", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08086", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-5683" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1530356", "reference_id": "1530356", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1530356" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887392", "reference_id": "887392", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887392" }, { "reference_url": "https://security.gentoo.org/glsa/201804-08", "reference_id": "GLSA-201804-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201804-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0816", "reference_id": "RHSA-2018:0816", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0816" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1104", "reference_id": "RHSA-2018:1104", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1104" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1113", "reference_id": "RHSA-2018:1113", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1113" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2162", "reference_id": "RHSA-2018:2162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2162" }, { "reference_url": "https://usn.ubuntu.com/3575-1/", "reference_id": "USN-3575-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3575-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83166?format=api", "purl": "pkg:ebuild/app-emulation/qemu@2.11.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.11.1-r1" } ], "aliases": [ "CVE-2018-5683" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jnxy-g6wu-8ubu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34654?format=api", "vulnerability_id": "VCID-re7g-2nvj-j3dp", "summary": "Multiple vulnerabilities have been discovered in libvirt, the worst\n of which may result in the execution of arbitrary commands.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5748.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5748.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-5748", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01494", "scoring_system": "epss", "scoring_elements": "0.81013", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01494", "scoring_system": "epss", "scoring_elements": "0.81022", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01494", "scoring_system": "epss", "scoring_elements": "0.81045", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01494", "scoring_system": "epss", "scoring_elements": "0.81073", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01494", "scoring_system": "epss", "scoring_elements": "0.81079", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01494", "scoring_system": "epss", "scoring_elements": "0.81097", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01494", "scoring_system": "epss", "scoring_elements": "0.81083", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01494", "scoring_system": "epss", "scoring_elements": "0.81076", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01494", "scoring_system": "epss", "scoring_elements": "0.81113", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01494", "scoring_system": "epss", "scoring_elements": "0.81115", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01494", "scoring_system": "epss", "scoring_elements": "0.81112", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01494", "scoring_system": "epss", "scoring_elements": "0.81135", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01494", "scoring_system": "epss", "scoring_elements": "0.81143", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01494", "scoring_system": "epss", "scoring_elements": "0.8115", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-5748" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5748", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5748" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1528396", "reference_id": "1528396", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1528396" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887700", "reference_id": "887700", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887700" }, { "reference_url": "https://security.gentoo.org/glsa/201804-07", "reference_id": "GLSA-201804-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201804-07" }, { "reference_url": "https://security.gentoo.org/glsa/201804-08", "reference_id": "GLSA-201804-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201804-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1396", "reference_id": "RHSA-2018:1396", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1396" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1929", "reference_id": "RHSA-2018:1929", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1929" }, { "reference_url": "https://usn.ubuntu.com/3576-1/", "reference_id": "USN-3576-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3576-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83166?format=api", "purl": "pkg:ebuild/app-emulation/qemu@2.11.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.11.1-r1" } ], "aliases": [ "CVE-2018-5748" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-re7g-2nvj-j3dp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56777?format=api", "vulnerability_id": "VCID-rkxf-jp2j-mqgf", "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n which may allow an attacker to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15124.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15124.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15124", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01684", "scoring_system": "epss", "scoring_elements": "0.82133", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01684", "scoring_system": "epss", "scoring_elements": "0.8228", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01684", "scoring_system": "epss", "scoring_elements": "0.8224", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01684", "scoring_system": "epss", "scoring_elements": "0.82242", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01684", "scoring_system": "epss", "scoring_elements": "0.82264", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01684", "scoring_system": "epss", "scoring_elements": "0.82276", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01684", "scoring_system": "epss", "scoring_elements": "0.82146", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01684", "scoring_system": "epss", "scoring_elements": "0.82168", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01684", "scoring_system": "epss", "scoring_elements": "0.82164", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01684", "scoring_system": "epss", "scoring_elements": "0.8219", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01684", "scoring_system": "epss", "scoring_elements": "0.82198", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01684", "scoring_system": "epss", "scoring_elements": "0.82217", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01684", "scoring_system": "epss", "scoring_elements": "0.82209", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01684", "scoring_system": "epss", "scoring_elements": "0.82204", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:S/C:N/I:N/A:C" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.debian.org/security/2018/dsa-4213", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2018/dsa-4213" }, { "reference_url": "http://www.securityfocus.com/bid/102295", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/102295" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525195", "reference_id": "1525195", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525195" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884806", "reference_id": "884806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884806" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15124", "reference_id": "CVE-2017-15124", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:C" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15124" }, { "reference_url": "https://security.gentoo.org/glsa/201804-08", "reference_id": "GLSA-201804-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201804-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0816", "reference_id": "RHSA-2018:0816", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0816" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1104", "reference_id": "RHSA-2018:1104", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1104" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1113", "reference_id": "RHSA-2018:1113", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1113" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3062", "reference_id": "RHSA-2018:3062", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3062" }, { "reference_url": "https://usn.ubuntu.com/3575-1/", "reference_id": "USN-3575-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3575-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83166?format=api", "purl": "pkg:ebuild/app-emulation/qemu@2.11.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.11.1-r1" } ], "aliases": [ "CVE-2017-15124" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rkxf-jp2j-mqgf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56781?format=api", "vulnerability_id": "VCID-rxsw-t1ut-rkau", "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n which may allow an attacker to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18043.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18043.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18043", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32815", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32946", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32981", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32804", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32852", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32881", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32882", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32844", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32818", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.3286", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32837", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32801", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32651", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32536", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32452", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18043" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1536377", "reference_id": "1536377", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1536377" }, { "reference_url": "https://security.gentoo.org/glsa/201804-08", "reference_id": "GLSA-201804-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201804-08" }, { "reference_url": "https://usn.ubuntu.com/3575-1/", "reference_id": "USN-3575-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3575-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83166?format=api", "purl": "pkg:ebuild/app-emulation/qemu@2.11.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.11.1-r1" } ], "aliases": [ "CVE-2017-18043" ], "risk_score": 1.2, "exploitability": "0.5", "weighted_severity": "2.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rxsw-t1ut-rkau" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56783?format=api", "vulnerability_id": "VCID-uryz-5yk9-9fd7", "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n which may allow an attacker to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7550.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7550.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7550", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24463", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24581", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24617", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24395", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24507", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24523", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24479", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24421", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24437", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24429", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24404", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24289", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24275", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24235", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7550" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549798", "reference_id": "1549798", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549798" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892041", "reference_id": "892041", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892041" }, { "reference_url": "https://security.gentoo.org/glsa/201804-08", "reference_id": "GLSA-201804-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201804-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1369", "reference_id": "RHSA-2018:1369", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1369" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1643", "reference_id": "RHSA-2018:1643", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1643" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1644", "reference_id": "RHSA-2018:1644", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1644" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1645", "reference_id": "RHSA-2018:1645", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1645" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1646", "reference_id": "RHSA-2018:1646", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1646" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2462", "reference_id": "RHSA-2018:2462", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2462" }, { "reference_url": "https://usn.ubuntu.com/3649-1/", "reference_id": "USN-3649-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3649-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83166?format=api", "purl": "pkg:ebuild/app-emulation/qemu@2.11.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.11.1-r1" } ], "aliases": [ "CVE-2018-7550" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uryz-5yk9-9fd7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4140?format=api", "vulnerability_id": "VCID-v8fp-rzfq-e3bs", "summary": "Information leak via side effects of speculative execution", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5715.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5715.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5715", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.88597", "scoring_system": "epss", "scoring_elements": "0.995", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.88597", "scoring_system": "epss", "scoring_elements": "0.99501", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.89042", "scoring_system": "epss", "scoring_elements": "0.99534", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.89094", "scoring_system": "epss", "scoring_elements": "0.99534", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.89094", "scoring_system": "epss", "scoring_elements": "0.99533", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.89094", "scoring_system": "epss", "scoring_elements": "0.9953", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.89094", "scoring_system": "epss", "scoring_elements": "0.99529", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.89147", "scoring_system": "epss", "scoring_elements": "0.99538", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.89198", "scoring_system": "epss", "scoring_elements": "0.99542", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.89198", "scoring_system": "epss", "scoring_elements": "0.99533", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.89198", "scoring_system": "epss", "scoring_elements": "0.99534", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.89198", "scoring_system": "epss", "scoring_elements": "0.99539", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5715" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:N/A:N" }, { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securityfocus.com/bid/102376", "reference_id": "102376", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "http://www.securityfocus.com/bid/102376" }, { "reference_url": "http://www.securitytracker.com/id/1040071", "reference_id": "1040071", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "http://www.securitytracker.com/id/1040071" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780", "reference_id": "1519780", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780" }, { "reference_url": "https://www.kb.cert.org/vuls/id/180049", "reference_id": "180049", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://www.kb.cert.org/vuls/id/180049" }, { "reference_url": "https://seclists.org/bugtraq/2019/Jun/36", "reference_id": "36", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://seclists.org/bugtraq/2019/Jun/36" }, { "reference_url": "https://www.exploit-db.com/exploits/43427/", "reference_id": "43427", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://www.exploit-db.com/exploits/43427/" }, { "reference_url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609", "reference_id": "4609", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609" }, { "reference_url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611", "reference_id": "4611", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611" }, { "reference_url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613", "reference_id": "4613", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613" }, { "reference_url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614", "reference_id": "4614", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614" }, { "reference_url": "http://www.kb.cert.org/vuls/id/584653", "reference_id": "584653", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "http://www.kb.cert.org/vuls/id/584653" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886532", "reference_id": "886532", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886532" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852", "reference_id": "886852", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852" }, { "reference_url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002", "reference_id": "ADV180002", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002" }, { "reference_url": "http://xenbits.xen.org/xsa/advisory-254.html", "reference_id": "advisory-254.html", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "http://xenbits.xen.org/xsa/advisory-254.html" }, { "reference_url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr", "reference_id": "advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr" }, { "reference_url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt", "reference_id": "ARUBA-PSA-2018-001.txt", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt" }, { "reference_url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt", "reference_id": "ARUBA-PSA-2019-003.txt", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt" }, { "reference_url": "https://security.archlinux.org/ASA-201801-10", "reference_id": "ASA-201801-10", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201801-10" }, { "reference_url": "https://security.archlinux.org/AVG-557", "reference_id": "AVG-557", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-557" }, { "reference_url": "https://security.archlinux.org/AVG-558", "reference_id": "AVG-558", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-558" }, { "reference_url": "https://security.archlinux.org/AVG-559", "reference_id": "AVG-559", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-559" }, { "reference_url": "https://security.archlinux.org/AVG-582", "reference_id": "AVG-582", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-582" }, { "reference_url": "https://security.archlinux.org/AVG-583", "reference_id": "AVG-583", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-583" }, { "reference_url": "https://security.archlinux.org/AVG-987", "reference_id": "AVG-987", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-987" }, { "reference_url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/", "reference_id": "AWS-2018-013", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/" }, { "reference_url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel", "reference_id": "cisco-sa-20180104-cpusidechannel", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel" }, { "reference_url": "https://support.citrix.com/article/CTX231399", "reference_id": "CTX231399", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://support.citrix.com/article/CTX231399" }, { "reference_url": "https://security.paloaltonetworks.com/CVE-2017-5715", "reference_id": "CVE-2017-5715", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://security.paloaltonetworks.com/CVE-2017-5715" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/43427.c", "reference_id": "CVE-2017-5753;CVE-2017-5715", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/43427.c" }, { "reference_url": "https://spectreattack.com/spectre.pdf", "reference_id": "CVE-2017-5753;CVE-2017-5715", "reference_type": "exploit", "scores": [], "url": "https://spectreattack.com/spectre.pdf" }, { "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us", "reference_id": "display?docId=emr_na-hpesbhf03805en_us", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us" }, { "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us", "reference_id": "display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us" }, { "reference_url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc", "reference_id": "FreeBSD-SA-18:03.speculative_execution.asc", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc" }, { "reference_url": "https://security.gentoo.org/glsa/201804-08", "reference_id": "GLSA-201804-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201804-08" }, { "reference_url": "https://security.gentoo.org/glsa/201810-06", "reference_id": "GLSA-201810-06", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://security.gentoo.org/glsa/201810-06" }, { "reference_url": "https://support.f5.com/csp/article/K91229003", "reference_id": "K91229003", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://support.f5.com/csp/article/K91229003" }, { "reference_url": "https://support.lenovo.com/us/en/solutions/LEN-18282", "reference_id": "LEN-18282", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://support.lenovo.com/us/en/solutions/LEN-18282" }, { "reference_url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001", "reference_id": "mitel-product-security-advisory-18-0001", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001" }, { "reference_url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/", "reference_id": "mitigations-landing-new-class-timing-attack", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html", "reference_id": "msg00002.html", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html", "reference_id": "msg00003.html", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html", "reference_id": "msg00004.html", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html", "reference_id": "msg00005.html", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html", "reference_id": "msg00009.html", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html", "reference_id": "msg00012.html", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html", "reference_id": "msg00013.html", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html", "reference_id": "msg00017.html", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html", "reference_id": "msg00019.html", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html", "reference_id": "msg00025.html", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20180104-0001/", "reference_id": "ntap-20180104-0001", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20180104-0001/" }, { "reference_url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "reference_id": "reading-privileged-memory-with-side.html", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0016", "reference_id": "RHSA-2018:0016", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0016" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0017", "reference_id": "RHSA-2018:0017", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0017" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0018", "reference_id": "RHSA-2018:0018", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0018" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0020", "reference_id": "RHSA-2018:0020", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0020" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0021", "reference_id": "RHSA-2018:0021", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0021" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0022", "reference_id": "RHSA-2018:0022", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0022" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0023", "reference_id": "RHSA-2018:0023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0027", "reference_id": "RHSA-2018:0027", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0027" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0028", "reference_id": "RHSA-2018:0028", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0028" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0292", "reference_id": "RHSA-2018:0292", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:0292" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1062", "reference_id": "RHSA-2018:1062", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1062" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1129", "reference_id": "RHSA-2018:1129", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1129" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1130", "reference_id": "RHSA-2018:1130", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1130" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1196", "reference_id": "RHSA-2018:1196", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1196" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1216", "reference_id": "RHSA-2018:1216", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1216" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1252", "reference_id": "RHSA-2018:1252", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1252" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1319", "reference_id": "RHSA-2018:1319", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1319" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1346", "reference_id": "RHSA-2018:1346", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1346" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1967", "reference_id": "RHSA-2018:1967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1967" }, { "reference_url": "https://spectreattack.com/", "reference_id": "spectreattack.com", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://spectreattack.com/" }, { "reference_url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html", "reference_id": "Spectre-Information-Disclosure-Proof-Of-Concept.html", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html" }, { "reference_url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution", "reference_id": "speculativeexecution", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "reference_url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability", "reference_id": "speculative-processor-vulnerability", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" }, { "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf", "reference_id": "ssa-608355.pdf", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "reference_url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/", "reference_id": "suse-addresses-meltdown-spectre-vulnerabilities", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/" }, { "reference_url": "https://www.synology.com/support/security/Synology_SA_18_01", "reference_id": "Synology_SA_18_01", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://www.synology.com/support/security/Synology_SA_18_01" }, { "reference_url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html", "reference_id": "todays-cpu-vulnerability-what-you-need.html", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html" }, { "reference_url": "https://usn.ubuntu.com/usn/usn-3516-1/", "reference_id": "usn-3516-1", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://usn.ubuntu.com/usn/usn-3516-1/" }, { "reference_url": "https://usn.ubuntu.com/3516-1/", "reference_id": "USN-3516-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3516-1/" }, { "reference_url": "https://usn.ubuntu.com/3530-1/", "reference_id": "USN-3530-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3530-1/" }, { "reference_url": "https://usn.ubuntu.com/3531-1/", "reference_id": "USN-3531-1", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://usn.ubuntu.com/3531-1/" }, { "reference_url": "https://usn.ubuntu.com/3531-3/", "reference_id": "USN-3531-3", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://usn.ubuntu.com/3531-3/" }, { "reference_url": "https://usn.ubuntu.com/3540-1/", "reference_id": "USN-3540-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3540-1/" }, { "reference_url": "https://usn.ubuntu.com/3540-2/", "reference_id": "USN-3540-2", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://usn.ubuntu.com/3540-2/" }, { "reference_url": "https://usn.ubuntu.com/3541-1/", "reference_id": "USN-3541-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3541-1/" }, { "reference_url": "https://usn.ubuntu.com/3541-2/", "reference_id": "USN-3541-2", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://usn.ubuntu.com/3541-2/" }, { "reference_url": "https://usn.ubuntu.com/3542-1/", "reference_id": "USN-3542-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3542-1/" }, { "reference_url": "https://usn.ubuntu.com/3542-2/", "reference_id": "USN-3542-2", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://usn.ubuntu.com/3542-2/" }, { "reference_url": "https://usn.ubuntu.com/3549-1/", "reference_id": "USN-3549-1", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://usn.ubuntu.com/3549-1/" }, { "reference_url": "https://usn.ubuntu.com/3560-1/", "reference_id": "USN-3560-1", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://usn.ubuntu.com/3560-1/" }, { "reference_url": "https://usn.ubuntu.com/3561-1/", "reference_id": "USN-3561-1", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://usn.ubuntu.com/3561-1/" }, { "reference_url": "https://usn.ubuntu.com/3580-1/", "reference_id": "USN-3580-1", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://usn.ubuntu.com/3580-1/" }, { "reference_url": "https://usn.ubuntu.com/3581-1/", "reference_id": "USN-3581-1", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://usn.ubuntu.com/3581-1/" }, { "reference_url": "https://usn.ubuntu.com/3581-2/", "reference_id": "USN-3581-2", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://usn.ubuntu.com/3581-2/" }, { "reference_url": "https://usn.ubuntu.com/3582-1/", "reference_id": "USN-3582-1", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://usn.ubuntu.com/3582-1/" }, { "reference_url": "https://usn.ubuntu.com/3582-2/", "reference_id": "USN-3582-2", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://usn.ubuntu.com/3582-2/" }, { "reference_url": "https://usn.ubuntu.com/3594-1/", "reference_id": "USN-3594-1", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://usn.ubuntu.com/3594-1/" }, { "reference_url": "https://usn.ubuntu.com/3597-1/", "reference_id": "USN-3597-1", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://usn.ubuntu.com/3597-1/" }, { "reference_url": "https://usn.ubuntu.com/3597-2/", "reference_id": "USN-3597-2", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://usn.ubuntu.com/3597-2/" }, { "reference_url": "https://usn.ubuntu.com/3620-2/", "reference_id": "USN-3620-2", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://usn.ubuntu.com/3620-2/" }, { "reference_url": "https://usn.ubuntu.com/3690-1/", "reference_id": "USN-3690-1", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://usn.ubuntu.com/3690-1/" }, { "reference_url": "https://usn.ubuntu.com/3777-3/", "reference_id": "USN-3777-3", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://usn.ubuntu.com/3777-3/" }, { "reference_url": "https://cert.vde.com/en-us/advisories/vde-2018-002", "reference_id": "vde-2018-002", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://cert.vde.com/en-us/advisories/vde-2018-002" }, { "reference_url": "https://cert.vde.com/en-us/advisories/vde-2018-003", "reference_id": "vde-2018-003", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://cert.vde.com/en-us/advisories/vde-2018-003" }, { "reference_url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html", "reference_id": "VMSA-2018-0002.html", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html" }, { "reference_url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html", "reference_id": "VMSA-2018-0004.html", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html" }, { "reference_url": "https://www.vmware.com/security/advisories/VMSA-2018-0007.html", "reference_id": "VMSA-2018-0007.html", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0007.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-254.html", "reference_id": "XSA-254", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-254.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83166?format=api", "purl": "pkg:ebuild/app-emulation/qemu@2.11.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.11.1-r1" } ], "aliases": [ "CVE-2017-5715" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v8fp-rzfq-e3bs" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.11.1-r1" }