Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/app-emulation/qemu@2.5.0-r1
Typeebuild
Namespaceapp-emulation
Nameqemu
Version2.5.0-r1
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.5.0-r2
Latest_non_vulnerable_version8.0.0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-33jn-mjmh-7fc2
vulnerability_id VCID-33jn-mjmh-7fc2
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which may allow a remote attacker to cause a Denial of Service or gain
    elevated privileges from a guest VM.
references
0
reference_url http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=8b98a2f07175d46c3f7217639bd5e03f
reference_id
reference_type
scores
url http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=8b98a2f07175d46c3f7217639bd5e03f
1
reference_url http://rhn.redhat.com/errata/RHSA-2015-2694.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2694.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2015-2695.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2695.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2015-2696.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2696.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7512.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7512.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7512
reference_id
reference_type
scores
0
value 0.2106
scoring_system epss
scoring_elements 0.95656
published_at 2026-04-16T12:55:00Z
1
value 0.2106
scoring_system epss
scoring_elements 0.95647
published_at 2026-04-13T12:55:00Z
2
value 0.2106
scoring_system epss
scoring_elements 0.95612
published_at 2026-04-01T12:55:00Z
3
value 0.2106
scoring_system epss
scoring_elements 0.95621
published_at 2026-04-02T12:55:00Z
4
value 0.2106
scoring_system epss
scoring_elements 0.95626
published_at 2026-04-04T12:55:00Z
5
value 0.2106
scoring_system epss
scoring_elements 0.95629
published_at 2026-04-07T12:55:00Z
6
value 0.2106
scoring_system epss
scoring_elements 0.95638
published_at 2026-04-08T12:55:00Z
7
value 0.2106
scoring_system epss
scoring_elements 0.95641
published_at 2026-04-09T12:55:00Z
8
value 0.2106
scoring_system epss
scoring_elements 0.95646
published_at 2026-04-11T12:55:00Z
9
value 0.2106
scoring_system epss
scoring_elements 0.95645
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7512
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
25
reference_url http://www.debian.org/security/2016/dsa-3469
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3469
26
reference_url http://www.debian.org/security/2016/dsa-3470
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3470
27
reference_url http://www.debian.org/security/2016/dsa-3471
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3471
28
reference_url http://www.openwall.com/lists/oss-security/2015/11/30/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/11/30/3
29
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
30
reference_url http://www.securityfocus.com/bid/78230
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/78230
31
reference_url http://www.securitytracker.com/id/1034527
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034527
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1285061
reference_id 1285061
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1285061
33
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806741
reference_id 806741
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806741
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:2.5.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc1:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:2.5.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc2:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7512
reference_id CVE-2015-7512
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 9.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-7512
48
reference_url https://security.gentoo.org/glsa/201602-01
reference_id GLSA-201602-01
reference_type
scores
url https://security.gentoo.org/glsa/201602-01
49
reference_url https://access.redhat.com/errata/RHSA-2015:2694
reference_id RHSA-2015:2694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2694
50
reference_url https://access.redhat.com/errata/RHSA-2015:2695
reference_id RHSA-2015:2695
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2695
51
reference_url https://access.redhat.com/errata/RHSA-2015:2696
reference_id RHSA-2015:2696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2696
52
reference_url https://usn.ubuntu.com/2828-1/
reference_id USN-2828-1
reference_type
scores
url https://usn.ubuntu.com/2828-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.5.0-r1
purl pkg:ebuild/app-emulation/qemu@2.5.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1
aliases CVE-2015-7512
risk_score 4.0
exploitability 0.5
weighted_severity 8.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-33jn-mjmh-7fc2
1
url VCID-3yb2-bx65-1yaa
vulnerability_id VCID-3yb2-bx65-1yaa
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which may allow a remote attacker to cause a Denial of Service or gain
    elevated privileges from a guest VM.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6815.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6815.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-6815
reference_id
reference_type
scores
0
value 0.01574
scoring_system epss
scoring_elements 0.81476
published_at 2026-04-01T12:55:00Z
1
value 0.01574
scoring_system epss
scoring_elements 0.81488
published_at 2026-04-02T12:55:00Z
2
value 0.01574
scoring_system epss
scoring_elements 0.81509
published_at 2026-04-04T12:55:00Z
3
value 0.01574
scoring_system epss
scoring_elements 0.81506
published_at 2026-04-07T12:55:00Z
4
value 0.01574
scoring_system epss
scoring_elements 0.81534
published_at 2026-04-08T12:55:00Z
5
value 0.01574
scoring_system epss
scoring_elements 0.81539
published_at 2026-04-09T12:55:00Z
6
value 0.01574
scoring_system epss
scoring_elements 0.81559
published_at 2026-04-11T12:55:00Z
7
value 0.01574
scoring_system epss
scoring_elements 0.81546
published_at 2026-04-12T12:55:00Z
8
value 0.01574
scoring_system epss
scoring_elements 0.8154
published_at 2026-04-13T12:55:00Z
9
value 0.01574
scoring_system epss
scoring_elements 0.81577
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-6815
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5278
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5278
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5279
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5279
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6815
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6855
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1260076
reference_id 1260076
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1260076
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798101
reference_id 798101
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798101
8
reference_url https://security.gentoo.org/glsa/201602-01
reference_id GLSA-201602-01
reference_type
scores
url https://security.gentoo.org/glsa/201602-01
9
reference_url https://usn.ubuntu.com/2745-1/
reference_id USN-2745-1
reference_type
scores
url https://usn.ubuntu.com/2745-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.5.0-r1
purl pkg:ebuild/app-emulation/qemu@2.5.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1
aliases CVE-2015-6815
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3yb2-bx65-1yaa
2
url VCID-6dnf-5681-5yau
vulnerability_id VCID-6dnf-5681-5yau
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which may allow a remote attacker to cause a Denial of Service or gain
    elevated privileges from a guest VM.
references
0
reference_url http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=4ab0359a8ae182a7ac5c99609667273167703fab
reference_id
reference_type
scores
url http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=4ab0359a8ae182a7ac5c99609667273167703fab
1
reference_url http://rhn.redhat.com/errata/RHSA-2016-0084.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0084.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-0086.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0086.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2016-0087.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0087.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-0088.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0088.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1568.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1568.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1568
reference_id
reference_type
scores
0
value 0.00337
scoring_system epss
scoring_elements 0.56603
published_at 2026-04-16T12:55:00Z
1
value 0.00337
scoring_system epss
scoring_elements 0.56594
published_at 2026-04-12T12:55:00Z
2
value 0.00337
scoring_system epss
scoring_elements 0.56572
published_at 2026-04-13T12:55:00Z
3
value 0.00337
scoring_system epss
scoring_elements 0.56456
published_at 2026-04-01T12:55:00Z
4
value 0.00337
scoring_system epss
scoring_elements 0.56553
published_at 2026-04-02T12:55:00Z
5
value 0.00337
scoring_system epss
scoring_elements 0.56574
published_at 2026-04-04T12:55:00Z
6
value 0.00337
scoring_system epss
scoring_elements 0.56552
published_at 2026-04-07T12:55:00Z
7
value 0.00337
scoring_system epss
scoring_elements 0.56604
published_at 2026-04-08T12:55:00Z
8
value 0.00337
scoring_system epss
scoring_elements 0.56609
published_at 2026-04-09T12:55:00Z
9
value 0.00337
scoring_system epss
scoring_elements 0.56618
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1568
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.debian.org/security/2016/dsa-3469
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3469
28
reference_url http://www.debian.org/security/2016/dsa-3470
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3470
29
reference_url http://www.debian.org/security/2016/dsa-3471
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3471
30
reference_url http://www.openwall.com/lists/oss-security/2016/01/09/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/01/09/1
31
reference_url http://www.openwall.com/lists/oss-security/2016/01/09/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/01/09/2
32
reference_url http://www.securityfocus.com/bid/80191
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/80191
33
reference_url http://www.securitytracker.com/id/1034859
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034859
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1288532
reference_id 1288532
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1288532
35
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=810527
reference_id 810527
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=810527
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1568
reference_id CVE-2016-1568
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1568
45
reference_url https://security.gentoo.org/glsa/201602-01
reference_id GLSA-201602-01
reference_type
scores
url https://security.gentoo.org/glsa/201602-01
46
reference_url https://access.redhat.com/errata/RHSA-2016:0084
reference_id RHSA-2016:0084
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0084
47
reference_url https://access.redhat.com/errata/RHSA-2016:0086
reference_id RHSA-2016:0086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0086
48
reference_url https://access.redhat.com/errata/RHSA-2016:0087
reference_id RHSA-2016:0087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0087
49
reference_url https://access.redhat.com/errata/RHSA-2016:0088
reference_id RHSA-2016:0088
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0088
50
reference_url https://usn.ubuntu.com/2891-1/
reference_id USN-2891-1
reference_type
scores
url https://usn.ubuntu.com/2891-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.5.0-r1
purl pkg:ebuild/app-emulation/qemu@2.5.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1
aliases CVE-2016-1568
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6dnf-5681-5yau
3
url VCID-72b8-m9rg-u7a4
vulnerability_id VCID-72b8-m9rg-u7a4
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which may allow a remote attacker to cause a Denial of Service or gain
    elevated privileges from a guest VM.
references
0
reference_url http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=156a2e4dbffa85997636a7a39ef12da6f1b40254
reference_id
reference_type
scores
url http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=156a2e4dbffa85997636a7a39ef12da6f1b40254
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8558.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8558.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8558
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.1361
published_at 2026-04-16T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.13699
published_at 2026-04-13T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.13732
published_at 2026-04-01T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13826
published_at 2026-04-02T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13882
published_at 2026-04-04T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13683
published_at 2026-04-07T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13766
published_at 2026-04-08T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13816
published_at 2026-04-09T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.13785
published_at 2026-04-11T12:55:00Z
9
value 0.00045
scoring_system epss
scoring_elements 0.13748
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8558
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
22
reference_url https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02124.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02124.html
23
reference_url http://www.debian.org/security/2016/dsa-3469
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3469
24
reference_url http://www.debian.org/security/2016/dsa-3470
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3470
25
reference_url http://www.debian.org/security/2016/dsa-3471
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3471
26
reference_url http://www.openwall.com/lists/oss-security/2015/12/14/16
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/12/14/16
27
reference_url http://www.openwall.com/lists/oss-security/2015/12/14/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/12/14/9
28
reference_url http://www.securityfocus.com/bid/80694
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/80694
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1277983
reference_id 1277983
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1277983
30
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808144
reference_id 808144
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808144
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8558
reference_id CVE-2015-8558
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-8558
35
reference_url https://security.gentoo.org/glsa/201602-01
reference_id GLSA-201602-01
reference_type
scores
url https://security.gentoo.org/glsa/201602-01
36
reference_url https://usn.ubuntu.com/2891-1/
reference_id USN-2891-1
reference_type
scores
url https://usn.ubuntu.com/2891-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.5.0-r1
purl pkg:ebuild/app-emulation/qemu@2.5.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1
aliases CVE-2015-8558
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-72b8-m9rg-u7a4
4
url VCID-8q9q-fs5n-gyfj
vulnerability_id VCID-8q9q-fs5n-gyfj
summary Privilege escalation via emulated floppy disk drive
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3456.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3456.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3456
reference_id
reference_type
scores
0
value 0.32263
scoring_system epss
scoring_elements 0.96809
published_at 2026-04-01T12:55:00Z
1
value 0.32263
scoring_system epss
scoring_elements 0.96816
published_at 2026-04-02T12:55:00Z
2
value 0.32263
scoring_system epss
scoring_elements 0.96841
published_at 2026-04-16T12:55:00Z
3
value 0.36084
scoring_system epss
scoring_elements 0.97088
published_at 2026-04-08T12:55:00Z
4
value 0.36084
scoring_system epss
scoring_elements 0.97089
published_at 2026-04-09T12:55:00Z
5
value 0.36084
scoring_system epss
scoring_elements 0.97092
published_at 2026-04-11T12:55:00Z
6
value 0.36084
scoring_system epss
scoring_elements 0.97093
published_at 2026-04-12T12:55:00Z
7
value 0.36084
scoring_system epss
scoring_elements 0.97094
published_at 2026-04-13T12:55:00Z
8
value 0.36084
scoring_system epss
scoring_elements 0.97079
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3456
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9718
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9718
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1218611
reference_id 1218611
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1218611
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=785424
reference_id 785424
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=785424
8
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37053.c
reference_id CVE-2015-3456;OSVDB-122072
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37053.c
9
reference_url https://marc.info/?l=oss-security&m=143155206320935&w=2
reference_id CVE-2015-3456;OSVDB-122072
reference_type exploit
scores
url https://marc.info/?l=oss-security&m=143155206320935&w=2
10
reference_url https://security.gentoo.org/glsa/201602-01
reference_id GLSA-201602-01
reference_type
scores
url https://security.gentoo.org/glsa/201602-01
11
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
12
reference_url https://security.gentoo.org/glsa/201612-27
reference_id GLSA-201612-27
reference_type
scores
url https://security.gentoo.org/glsa/201612-27
13
reference_url https://access.redhat.com/errata/RHSA-2015:0998
reference_id RHSA-2015:0998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0998
14
reference_url https://access.redhat.com/errata/RHSA-2015:0999
reference_id RHSA-2015:0999
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0999
15
reference_url https://access.redhat.com/errata/RHSA-2015:1000
reference_id RHSA-2015:1000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1000
16
reference_url https://access.redhat.com/errata/RHSA-2015:1001
reference_id RHSA-2015:1001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1001
17
reference_url https://access.redhat.com/errata/RHSA-2015:1002
reference_id RHSA-2015:1002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1002
18
reference_url https://access.redhat.com/errata/RHSA-2015:1003
reference_id RHSA-2015:1003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1003
19
reference_url https://access.redhat.com/errata/RHSA-2015:1004
reference_id RHSA-2015:1004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1004
20
reference_url https://access.redhat.com/errata/RHSA-2015:1011
reference_id RHSA-2015:1011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1011
21
reference_url https://access.redhat.com/errata/RHSA-2015:1031
reference_id RHSA-2015:1031
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1031
22
reference_url https://usn.ubuntu.com/2608-1/
reference_id USN-2608-1
reference_type
scores
url https://usn.ubuntu.com/2608-1/
23
reference_url https://xenbits.xen.org/xsa/advisory-133.html
reference_id XSA-133
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-133.html
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.5.0-r1
purl pkg:ebuild/app-emulation/qemu@2.5.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1
aliases CVE-2015-3456
risk_score 0.6
exploitability 2.0
weighted_severity 0.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8q9q-fs5n-gyfj
5
url VCID-9zjg-8t8b-a3ed
vulnerability_id VCID-9zjg-8t8b-a3ed
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which may allow a remote attacker to cause a Denial of Service or gain
    elevated privileges from a guest VM.
references
0
reference_url http://packetstormsecurity.com/files/134948/Gentoo-QEMU-Local-Privilege-Escalation.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/134948/Gentoo-QEMU-Local-Privilege-Escalation.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8556.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8556.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8556
reference_id
reference_type
scores
0
value 0.21208
scoring_system epss
scoring_elements 0.95675
published_at 2026-04-16T12:55:00Z
1
value 0.21208
scoring_system epss
scoring_elements 0.95665
published_at 2026-04-12T12:55:00Z
2
value 0.21208
scoring_system epss
scoring_elements 0.95667
published_at 2026-04-13T12:55:00Z
3
value 0.21208
scoring_system epss
scoring_elements 0.95632
published_at 2026-04-01T12:55:00Z
4
value 0.21208
scoring_system epss
scoring_elements 0.95641
published_at 2026-04-02T12:55:00Z
5
value 0.21208
scoring_system epss
scoring_elements 0.95646
published_at 2026-04-04T12:55:00Z
6
value 0.21208
scoring_system epss
scoring_elements 0.95649
published_at 2026-04-07T12:55:00Z
7
value 0.21208
scoring_system epss
scoring_elements 0.95657
published_at 2026-04-08T12:55:00Z
8
value 0.21208
scoring_system epss
scoring_elements 0.95661
published_at 2026-04-09T12:55:00Z
9
value 0.21208
scoring_system epss
scoring_elements 0.95666
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8556
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.exploit-db.com/exploits/39010/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/39010/
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1292211
reference_id 1292211
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1292211
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
7
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/39010.c
reference_id CVE-2015-8556
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/39010.c
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8556
reference_id CVE-2015-8556
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 10.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-8556
9
reference_url https://security.gentoo.org/glsa/201602-01
reference_id GLSA-201602-01
reference_type
scores
url https://security.gentoo.org/glsa/201602-01
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.5.0-r1
purl pkg:ebuild/app-emulation/qemu@2.5.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1
aliases CVE-2015-8556
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9zjg-8t8b-a3ed
6
url VCID-cr8f-zaj3-mkg5
vulnerability_id VCID-cr8f-zaj3-mkg5
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which may allow a remote attacker to cause a Denial of Service or gain
    elevated privileges from a guest VM.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169039.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169039.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165484.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165484.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166798.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166798.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2015-1772.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1772.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2015-1837.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1837.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5225.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5225.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5225
reference_id
reference_type
scores
0
value 0.00167
scoring_system epss
scoring_elements 0.37939
published_at 2026-04-16T12:55:00Z
1
value 0.00167
scoring_system epss
scoring_elements 0.37893
published_at 2026-04-13T12:55:00Z
2
value 0.00167
scoring_system epss
scoring_elements 0.3779
published_at 2026-04-01T12:55:00Z
3
value 0.00167
scoring_system epss
scoring_elements 0.37972
published_at 2026-04-02T12:55:00Z
4
value 0.00167
scoring_system epss
scoring_elements 0.37997
published_at 2026-04-04T12:55:00Z
5
value 0.00167
scoring_system epss
scoring_elements 0.37876
published_at 2026-04-07T12:55:00Z
6
value 0.00167
scoring_system epss
scoring_elements 0.37926
published_at 2026-04-08T12:55:00Z
7
value 0.00167
scoring_system epss
scoring_elements 0.37938
published_at 2026-04-09T12:55:00Z
8
value 0.00167
scoring_system epss
scoring_elements 0.37955
published_at 2026-04-11T12:55:00Z
9
value 0.00167
scoring_system epss
scoring_elements 0.37918
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5225
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3214
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3214
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5154
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5154
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5165
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5165
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5225
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5225
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5745
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:A/AC:H/Au:S/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://lists.gnu.org/archive/html/qemu-devel/2015-08/msg02495.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/qemu-devel/2015-08/msg02495.html
14
reference_url https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg05832.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg05832.html
15
reference_url http://www.debian.org/security/2015/dsa-3348
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3348
16
reference_url http://www.openwall.com/lists/oss-security/2015/08/21/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/08/21/6
17
reference_url http://www.securityfocus.com/bid/76506
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/76506
18
reference_url http://www.securitytracker.com/id/1033547
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033547
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1255896
reference_id 1255896
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1255896
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796465
reference_id 796465
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796465
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-5225
reference_id CVE-2015-5225
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-5225
29
reference_url https://security.gentoo.org/glsa/201602-01
reference_id GLSA-201602-01
reference_type
scores
url https://security.gentoo.org/glsa/201602-01
30
reference_url https://access.redhat.com/errata/RHSA-2015:1772
reference_id RHSA-2015:1772
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1772
31
reference_url https://access.redhat.com/errata/RHSA-2015:1837
reference_id RHSA-2015:1837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1837
32
reference_url https://usn.ubuntu.com/2724-1/
reference_id USN-2724-1
reference_type
scores
url https://usn.ubuntu.com/2724-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.5.0-r1
purl pkg:ebuild/app-emulation/qemu@2.5.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1
aliases CVE-2015-5225
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cr8f-zaj3-mkg5
7
url VCID-dhgj-d3h1-cue7
vulnerability_id VCID-dhgj-d3h1-cue7
summary heap buffer overflow vulnerability in pcnet emulator
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2015-2694.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2694.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2015-2695.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2695.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2015-2696.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2696.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7504.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7504.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7504
reference_id
reference_type
scores
0
value 0.00783
scoring_system epss
scoring_elements 0.73781
published_at 2026-04-16T12:55:00Z
1
value 0.00783
scoring_system epss
scoring_elements 0.73739
published_at 2026-04-13T12:55:00Z
2
value 0.00783
scoring_system epss
scoring_elements 0.73691
published_at 2026-04-01T12:55:00Z
3
value 0.00783
scoring_system epss
scoring_elements 0.73701
published_at 2026-04-02T12:55:00Z
4
value 0.00783
scoring_system epss
scoring_elements 0.73724
published_at 2026-04-04T12:55:00Z
5
value 0.00783
scoring_system epss
scoring_elements 0.73696
published_at 2026-04-07T12:55:00Z
6
value 0.00783
scoring_system epss
scoring_elements 0.73731
published_at 2026-04-08T12:55:00Z
7
value 0.00783
scoring_system epss
scoring_elements 0.73744
published_at 2026-04-09T12:55:00Z
8
value 0.00783
scoring_system epss
scoring_elements 0.73766
published_at 2026-04-11T12:55:00Z
9
value 0.00783
scoring_system epss
scoring_elements 0.73748
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7504
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
24
reference_url https://lists.gnu.org/archive/html/qemu-devel/2015-11/msg06342.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/qemu-devel/2015-11/msg06342.html
25
reference_url http://www.debian.org/security/2016/dsa-3469
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3469
26
reference_url http://www.debian.org/security/2016/dsa-3470
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3470
27
reference_url http://www.debian.org/security/2016/dsa-3471
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3471
28
reference_url http://www.openwall.com/lists/oss-security/2015/11/30/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/11/30/2
29
reference_url http://www.securityfocus.com/bid/78227
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/78227
30
reference_url http://www.securitytracker.com/id/1034268
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034268
31
reference_url http://xenbits.xen.org/xsa/advisory-162.html
reference_id
reference_type
scores
url http://xenbits.xen.org/xsa/advisory-162.html
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1261461
reference_id 1261461
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1261461
33
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806742
reference_id 806742
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806742
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:2.5.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc1:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:2.5.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc2:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7504
reference_id CVE-2015-7504
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-7504
42
reference_url https://security.gentoo.org/glsa/201602-01
reference_id GLSA-201602-01
reference_type
scores
url https://security.gentoo.org/glsa/201602-01
43
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
44
reference_url https://access.redhat.com/errata/RHSA-2015:2694
reference_id RHSA-2015:2694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2694
45
reference_url https://access.redhat.com/errata/RHSA-2015:2695
reference_id RHSA-2015:2695
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2695
46
reference_url https://access.redhat.com/errata/RHSA-2015:2696
reference_id RHSA-2015:2696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2696
47
reference_url https://usn.ubuntu.com/2828-1/
reference_id USN-2828-1
reference_type
scores
url https://usn.ubuntu.com/2828-1/
48
reference_url https://xenbits.xen.org/xsa/advisory-162.html
reference_id XSA-162
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-162.html
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.5.0-r1
purl pkg:ebuild/app-emulation/qemu@2.5.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1
aliases CVE-2015-7504
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dhgj-d3h1-cue7
8
url VCID-eu1x-b3tw-dyfh
vulnerability_id VCID-eu1x-b3tw-dyfh
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which may allow a remote attacker to cause a Denial of Service or gain
    elevated privileges from a guest VM.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8345.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8345.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8345
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.21473
published_at 2026-04-16T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21533
published_at 2026-04-12T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.21478
published_at 2026-04-13T12:55:00Z
3
value 0.0007
scoring_system epss
scoring_elements 0.21443
published_at 2026-04-01T12:55:00Z
4
value 0.0007
scoring_system epss
scoring_elements 0.21611
published_at 2026-04-02T12:55:00Z
5
value 0.0007
scoring_system epss
scoring_elements 0.21668
published_at 2026-04-04T12:55:00Z
6
value 0.0007
scoring_system epss
scoring_elements 0.21424
published_at 2026-04-07T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.21501
published_at 2026-04-08T12:55:00Z
8
value 0.0007
scoring_system epss
scoring_elements 0.2156
published_at 2026-04-09T12:55:00Z
9
value 0.0007
scoring_system epss
scoring_elements 0.21571
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8345
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
21
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.2
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
22
reference_url https://lists.gnu.org/archive/html/qemu-devel/2015-10/msg03911.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/qemu-devel/2015-10/msg03911.html
23
reference_url http://www.debian.org/security/2016/dsa-3469
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3469
24
reference_url http://www.debian.org/security/2016/dsa-3470
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3470
25
reference_url http://www.debian.org/security/2016/dsa-3471
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3471
26
reference_url http://www.openwall.com/lists/oss-security/2015/11/25/11
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/11/25/11
27
reference_url http://www.securityfocus.com/bid/77985
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77985
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1285213
reference_id 1285213
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1285213
29
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806373
reference_id 806373
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806373
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:2.5.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc1:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:2.5.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc2:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8345
reference_id CVE-2015-8345
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-8345
37
reference_url https://security.gentoo.org/glsa/201602-01
reference_id GLSA-201602-01
reference_type
scores
url https://security.gentoo.org/glsa/201602-01
38
reference_url https://usn.ubuntu.com/2828-1/
reference_id USN-2828-1
reference_type
scores
url https://usn.ubuntu.com/2828-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.5.0-r1
purl pkg:ebuild/app-emulation/qemu@2.5.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1
aliases CVE-2015-8345
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eu1x-b3tw-dyfh
9
url VCID-g7vj-24gg-uka5
vulnerability_id VCID-g7vj-24gg-uka5
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which may allow a remote attacker to cause a Denial of Service or gain
    elevated privileges from a guest VM.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8744.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8744.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8744
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20764
published_at 2026-04-16T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20795
published_at 2026-04-01T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20941
published_at 2026-04-02T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20999
published_at 2026-04-04T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20715
published_at 2026-04-07T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20792
published_at 2026-04-08T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.20853
published_at 2026-04-09T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20869
published_at 2026-04-11T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20826
published_at 2026-04-12T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20773
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8744
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
21
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1270871
reference_id 1270871
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1270871
23
reference_url https://security.gentoo.org/glsa/201602-01
reference_id GLSA-201602-01
reference_type
scores
url https://security.gentoo.org/glsa/201602-01
24
reference_url https://usn.ubuntu.com/2891-1/
reference_id USN-2891-1
reference_type
scores
url https://usn.ubuntu.com/2891-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.5.0-r1
purl pkg:ebuild/app-emulation/qemu@2.5.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1
aliases CVE-2015-8744
risk_score 0.6
exploitability 0.5
weighted_severity 1.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g7vj-24gg-uka5
10
url VCID-gjq3-asym-bqat
vulnerability_id VCID-gjq3-asym-bqat
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which may allow a remote attacker to cause a Denial of Service or gain
    elevated privileges from a guest VM.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8568.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8568.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8568
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.18894
published_at 2026-04-16T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.18941
published_at 2026-04-13T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.18995
published_at 2026-04-01T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.1913
published_at 2026-04-02T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.19182
published_at 2026-04-04T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.18898
published_at 2026-04-07T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.18977
published_at 2026-04-08T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.19031
published_at 2026-04-09T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.19039
published_at 2026-04-11T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.18992
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8568
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
21
reference_url https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02299.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02299.html
22
reference_url http://www.debian.org/security/2016/dsa-3471
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3471
23
reference_url http://www.openwall.com/lists/oss-security/2015/12/15/10
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/12/15/10
24
reference_url http://www.securityfocus.com/bid/79721
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79721
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1289816
reference_id 1289816
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1289816
26
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808145
reference_id 808145
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808145
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8568
reference_id CVE-2015-8568
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-8568
30
reference_url https://security.gentoo.org/glsa/201602-01
reference_id GLSA-201602-01
reference_type
scores
url https://security.gentoo.org/glsa/201602-01
31
reference_url https://usn.ubuntu.com/2891-1/
reference_id USN-2891-1
reference_type
scores
url https://usn.ubuntu.com/2891-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.5.0-r1
purl pkg:ebuild/app-emulation/qemu@2.5.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1
aliases CVE-2015-8568
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gjq3-asym-bqat
11
url VCID-h2ap-vhnd-gbcb
vulnerability_id VCID-h2ap-vhnd-gbcb
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which may allow a remote attacker to cause a Denial of Service or gain
    elevated privileges from a guest VM.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8743.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8743.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8743
reference_id
reference_type
scores
0
value 0.00064
scoring_system epss
scoring_elements 0.19895
published_at 2026-04-16T12:55:00Z
1
value 0.00064
scoring_system epss
scoring_elements 0.19935
published_at 2026-04-01T12:55:00Z
2
value 0.00064
scoring_system epss
scoring_elements 0.20081
published_at 2026-04-02T12:55:00Z
3
value 0.00064
scoring_system epss
scoring_elements 0.20138
published_at 2026-04-04T12:55:00Z
4
value 0.00064
scoring_system epss
scoring_elements 0.19866
published_at 2026-04-07T12:55:00Z
5
value 0.00064
scoring_system epss
scoring_elements 0.19946
published_at 2026-04-08T12:55:00Z
6
value 0.00064
scoring_system epss
scoring_elements 0.2
published_at 2026-04-09T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.2002
published_at 2026-04-11T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.19976
published_at 2026-04-12T12:55:00Z
9
value 0.00064
scoring_system epss
scoring_elements 0.19917
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8743
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
21
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1264929
reference_id 1264929
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1264929
23
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=810519
reference_id 810519
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=810519
24
reference_url https://security.gentoo.org/glsa/201602-01
reference_id GLSA-201602-01
reference_type
scores
url https://security.gentoo.org/glsa/201602-01
25
reference_url https://usn.ubuntu.com/2891-1/
reference_id USN-2891-1
reference_type
scores
url https://usn.ubuntu.com/2891-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.5.0-r1
purl pkg:ebuild/app-emulation/qemu@2.5.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1
aliases CVE-2015-8743
risk_score 0.8
exploitability 0.5
weighted_severity 1.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h2ap-vhnd-gbcb
12
url VCID-h526-pk3x-xfb7
vulnerability_id VCID-h526-pk3x-xfb7
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which may allow a remote attacker to cause a Denial of Service or gain
    elevated privileges from a guest VM.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154656.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154656.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155196.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155196.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00042.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2015-1931.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1931.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2015-1943.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1943.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1779.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1779.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-1779
reference_id
reference_type
scores
0
value 0.05573
scoring_system epss
scoring_elements 0.90309
published_at 2026-04-16T12:55:00Z
1
value 0.05573
scoring_system epss
scoring_elements 0.90298
published_at 2026-04-12T12:55:00Z
2
value 0.05573
scoring_system epss
scoring_elements 0.90293
published_at 2026-04-13T12:55:00Z
3
value 0.05573
scoring_system epss
scoring_elements 0.90249
published_at 2026-04-01T12:55:00Z
4
value 0.05573
scoring_system epss
scoring_elements 0.90251
published_at 2026-04-02T12:55:00Z
5
value 0.05573
scoring_system epss
scoring_elements 0.90264
published_at 2026-04-04T12:55:00Z
6
value 0.05573
scoring_system epss
scoring_elements 0.90269
published_at 2026-04-07T12:55:00Z
7
value 0.05573
scoring_system epss
scoring_elements 0.90284
published_at 2026-04-08T12:55:00Z
8
value 0.05573
scoring_system epss
scoring_elements 0.90291
published_at 2026-04-09T12:55:00Z
9
value 0.05573
scoring_system epss
scoring_elements 0.90299
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-1779
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9718
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9718
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://lists.gnu.org/archive/html/qemu-devel/2015-03/msg04894.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/qemu-devel/2015-03/msg04894.html
14
reference_url https://lists.gnu.org/archive/html/qemu-devel/2015-03/msg04895.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/qemu-devel/2015-03/msg04895.html
15
reference_url https://lists.gnu.org/archive/html/qemu-devel/2015-03/msg04896.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/qemu-devel/2015-03/msg04896.html
16
reference_url http://www.debian.org/security/2015/dsa-3259
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3259
17
reference_url http://www.openwall.com/lists/oss-security/2015/03/24/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/03/24/9
18
reference_url http://www.openwall.com/lists/oss-security/2015/04/09/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/04/09/6
19
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
20
reference_url http://www.securityfocus.com/bid/73303
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/73303
21
reference_url http://www.securitytracker.com/id/1033975
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033975
22
reference_url http://www.ubuntu.com/usn/USN-2608-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2608-1
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1199572
reference_id 1199572
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1199572
24
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781250
reference_id 781250
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781250
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.3.0:rc0:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:2.3.0:rc0:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.3.0:rc0:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.3.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:2.3.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.3.0:rc1:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-1779
reference_id CVE-2015-1779
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
1
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-1779
56
reference_url https://security.gentoo.org/glsa/201602-01
reference_id GLSA-201602-01
reference_type
scores
url https://security.gentoo.org/glsa/201602-01
57
reference_url https://access.redhat.com/errata/RHSA-2015:1931
reference_id RHSA-2015:1931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1931
58
reference_url https://access.redhat.com/errata/RHSA-2015:1943
reference_id RHSA-2015:1943
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1943
59
reference_url https://usn.ubuntu.com/2608-1/
reference_id USN-2608-1
reference_type
scores
url https://usn.ubuntu.com/2608-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.5.0-r1
purl pkg:ebuild/app-emulation/qemu@2.5.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1
aliases CVE-2015-1779
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h526-pk3x-xfb7
13
url VCID-hqnb-2gxt-rke6
vulnerability_id VCID-hqnb-2gxt-rke6
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which may allow a remote attacker to cause a Denial of Service or gain
    elevated privileges from a guest VM.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5745.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5745.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5745
reference_id
reference_type
scores
0
value 0.01921
scoring_system epss
scoring_elements 0.83389
published_at 2026-04-16T12:55:00Z
1
value 0.01921
scoring_system epss
scoring_elements 0.83284
published_at 2026-04-01T12:55:00Z
2
value 0.01921
scoring_system epss
scoring_elements 0.833
published_at 2026-04-02T12:55:00Z
3
value 0.01921
scoring_system epss
scoring_elements 0.83315
published_at 2026-04-07T12:55:00Z
4
value 0.01921
scoring_system epss
scoring_elements 0.83339
published_at 2026-04-08T12:55:00Z
5
value 0.01921
scoring_system epss
scoring_elements 0.83348
published_at 2026-04-09T12:55:00Z
6
value 0.01921
scoring_system epss
scoring_elements 0.83363
published_at 2026-04-11T12:55:00Z
7
value 0.01921
scoring_system epss
scoring_elements 0.83357
published_at 2026-04-12T12:55:00Z
8
value 0.01921
scoring_system epss
scoring_elements 0.83353
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3214
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3214
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5154
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5154
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5165
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5165
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5225
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5225
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5745
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.2
scoring_system cvssv2
scoring_elements AV:A/AC:H/Au:N/C:N/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1251157
reference_id 1251157
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1251157
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795087
reference_id 795087
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795087
10
reference_url https://security.gentoo.org/glsa/201602-01
reference_id GLSA-201602-01
reference_type
scores
url https://security.gentoo.org/glsa/201602-01
11
reference_url https://usn.ubuntu.com/2724-1/
reference_id USN-2724-1
reference_type
scores
url https://usn.ubuntu.com/2724-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.5.0-r1
purl pkg:ebuild/app-emulation/qemu@2.5.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1
aliases CVE-2015-5745
risk_score 0.8
exploitability 0.5
weighted_severity 1.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hqnb-2gxt-rke6
14
url VCID-ku9y-24pu-g7gz
vulnerability_id VCID-ku9y-24pu-g7gz
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which may allow a remote attacker to cause a Denial of Service or gain
    elevated privileges from a guest VM.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5279.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5279.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5279
reference_id
reference_type
scores
0
value 0.10195
scoring_system epss
scoring_elements 0.93099
published_at 2026-04-01T12:55:00Z
1
value 0.10195
scoring_system epss
scoring_elements 0.93109
published_at 2026-04-02T12:55:00Z
2
value 0.10195
scoring_system epss
scoring_elements 0.93112
published_at 2026-04-04T12:55:00Z
3
value 0.10195
scoring_system epss
scoring_elements 0.93111
published_at 2026-04-07T12:55:00Z
4
value 0.10195
scoring_system epss
scoring_elements 0.93119
published_at 2026-04-08T12:55:00Z
5
value 0.10195
scoring_system epss
scoring_elements 0.93124
published_at 2026-04-09T12:55:00Z
6
value 0.10195
scoring_system epss
scoring_elements 0.93129
published_at 2026-04-13T12:55:00Z
7
value 0.10195
scoring_system epss
scoring_elements 0.93127
published_at 2026-04-12T12:55:00Z
8
value 0.10195
scoring_system epss
scoring_elements 0.93146
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5279
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5278
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5278
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5279
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5279
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6815
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6855
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1256672
reference_id 1256672
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1256672
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799074
reference_id 799074
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799074
8
reference_url https://security.gentoo.org/glsa/201602-01
reference_id GLSA-201602-01
reference_type
scores
url https://security.gentoo.org/glsa/201602-01
9
reference_url https://access.redhat.com/errata/RHSA-2015:1896
reference_id RHSA-2015:1896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1896
10
reference_url https://access.redhat.com/errata/RHSA-2015:1923
reference_id RHSA-2015:1923
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1923
11
reference_url https://access.redhat.com/errata/RHSA-2015:1924
reference_id RHSA-2015:1924
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1924
12
reference_url https://access.redhat.com/errata/RHSA-2015:1925
reference_id RHSA-2015:1925
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1925
13
reference_url https://access.redhat.com/errata/RHSA-2015:2065
reference_id RHSA-2015:2065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2065
14
reference_url https://usn.ubuntu.com/2745-1/
reference_id USN-2745-1
reference_type
scores
url https://usn.ubuntu.com/2745-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.5.0-r1
purl pkg:ebuild/app-emulation/qemu@2.5.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1
aliases CVE-2015-5279
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ku9y-24pu-g7gz
15
url VCID-njfq-vdgj-wfc8
vulnerability_id VCID-njfq-vdgj-wfc8
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which may allow a remote attacker to cause a Denial of Service or gain
    elevated privileges from a guest VM.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168602.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168602.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169036.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169036.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169039.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169039.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169327.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169327.html
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169341.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169341.html
5
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167369.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167369.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00019.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00019.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6855.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6855.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-6855
reference_id
reference_type
scores
0
value 0.05769
scoring_system epss
scoring_elements 0.90492
published_at 2026-04-16T12:55:00Z
1
value 0.05769
scoring_system epss
scoring_elements 0.90475
published_at 2026-04-13T12:55:00Z
2
value 0.05769
scoring_system epss
scoring_elements 0.90434
published_at 2026-04-01T12:55:00Z
3
value 0.05769
scoring_system epss
scoring_elements 0.90439
published_at 2026-04-02T12:55:00Z
4
value 0.05769
scoring_system epss
scoring_elements 0.90451
published_at 2026-04-04T12:55:00Z
5
value 0.05769
scoring_system epss
scoring_elements 0.90456
published_at 2026-04-07T12:55:00Z
6
value 0.05769
scoring_system epss
scoring_elements 0.90468
published_at 2026-04-08T12:55:00Z
7
value 0.05769
scoring_system epss
scoring_elements 0.90474
published_at 2026-04-09T12:55:00Z
8
value 0.05769
scoring_system epss
scoring_elements 0.90482
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-6855
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5278
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5278
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5279
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5279
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6815
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6855
13
reference_url https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg02479.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg02479.html
14
reference_url https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14
reference_id
reference_type
scores
url https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14
15
reference_url http://www.debian.org/security/2015/dsa-3361
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3361
16
reference_url http://www.debian.org/security/2015/dsa-3362
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3362
17
reference_url http://www.openwall.com/lists/oss-security/2015/09/10/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/09/10/1
18
reference_url http://www.openwall.com/lists/oss-security/2015/09/10/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/09/10/2
19
reference_url http://www.securityfocus.com/bid/76691
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/76691
20
reference_url http://www.ubuntu.com/usn/USN-2745-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2745-1
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1260080
reference_id 1260080
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1260080
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:arista:eos:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:arista:eos:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:arista:eos:-:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-6855
reference_id CVE-2015-6855
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-6855
36
reference_url https://security.gentoo.org/glsa/201602-01
reference_id GLSA-201602-01
reference_type
scores
url https://security.gentoo.org/glsa/201602-01
37
reference_url https://usn.ubuntu.com/2745-1/
reference_id USN-2745-1
reference_type
scores
url https://usn.ubuntu.com/2745-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.5.0-r1
purl pkg:ebuild/app-emulation/qemu@2.5.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1
aliases CVE-2015-6855
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-njfq-vdgj-wfc8
16
url VCID-p5qs-eaj5-4bax
vulnerability_id VCID-p5qs-eaj5-4bax
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which may allow a remote attacker to cause a Denial of Service or gain
    elevated privileges from a guest VM.
references
0
reference_url http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=43b11a91dd861a946b231b89b754285
reference_id
reference_type
scores
url http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=43b11a91dd861a946b231b89b754285
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175380.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175380.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7549.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7549.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7549
reference_id
reference_type
scores
0
value 0.00118
scoring_system epss
scoring_elements 0.30724
published_at 2026-04-16T12:55:00Z
1
value 0.00118
scoring_system epss
scoring_elements 0.3079
published_at 2026-04-11T12:55:00Z
2
value 0.00118
scoring_system epss
scoring_elements 0.30746
published_at 2026-04-12T12:55:00Z
3
value 0.00118
scoring_system epss
scoring_elements 0.307
published_at 2026-04-13T12:55:00Z
4
value 0.00118
scoring_system epss
scoring_elements 0.30832
published_at 2026-04-02T12:55:00Z
5
value 0.00118
scoring_system epss
scoring_elements 0.30879
published_at 2026-04-04T12:55:00Z
6
value 0.00118
scoring_system epss
scoring_elements 0.30698
published_at 2026-04-07T12:55:00Z
7
value 0.00118
scoring_system epss
scoring_elements 0.30755
published_at 2026-04-08T12:55:00Z
8
value 0.00118
scoring_system epss
scoring_elements 0.30787
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7549
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url http://www.debian.org/security/2016/dsa-3471
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3471
25
reference_url http://www.openwall.com/lists/oss-security/2015/12/14/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/12/14/2
26
reference_url http://www.securityfocus.com/bid/80761
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/80761
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1291137
reference_id 1291137
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1291137
28
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808131
reference_id 808131
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808131
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:r1:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:*:r1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:r1:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7549
reference_id CVE-2015-7549
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
1
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-7549
31
reference_url https://security.gentoo.org/glsa/201602-01
reference_id GLSA-201602-01
reference_type
scores
url https://security.gentoo.org/glsa/201602-01
32
reference_url https://usn.ubuntu.com/2891-1/
reference_id USN-2891-1
reference_type
scores
url https://usn.ubuntu.com/2891-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.5.0-r1
purl pkg:ebuild/app-emulation/qemu@2.5.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1
aliases CVE-2015-7549
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p5qs-eaj5-4bax
17
url VCID-prnz-8kk8-fkhj
vulnerability_id VCID-prnz-8kk8-fkhj
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which may allow a remote attacker to cause a Denial of Service or gain
    elevated privileges from a guest VM.
references
0
reference_url http://git.qemu-project.org/?p=qemu.git%3Ba=commit%3Bh=d9a3b33d2c9f996537b7f1d0246dee2d0120cefb
reference_id
reference_type
scores
url http://git.qemu-project.org/?p=qemu.git%3Ba=commit%3Bh=d9a3b33d2c9f996537b7f1d0246dee2d0120cefb
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8666.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8666.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8666
reference_id
reference_type
scores
0
value 0.00079
scoring_system epss
scoring_elements 0.23463
published_at 2026-04-16T12:55:00Z
1
value 0.00079
scoring_system epss
scoring_elements 0.23446
published_at 2026-04-13T12:55:00Z
2
value 0.00079
scoring_system epss
scoring_elements 0.23427
published_at 2026-04-01T12:55:00Z
3
value 0.00079
scoring_system epss
scoring_elements 0.23589
published_at 2026-04-02T12:55:00Z
4
value 0.00079
scoring_system epss
scoring_elements 0.23626
published_at 2026-04-04T12:55:00Z
5
value 0.00079
scoring_system epss
scoring_elements 0.23404
published_at 2026-04-07T12:55:00Z
6
value 0.00079
scoring_system epss
scoring_elements 0.23475
published_at 2026-04-08T12:55:00Z
7
value 0.00079
scoring_system epss
scoring_elements 0.23524
published_at 2026-04-09T12:55:00Z
8
value 0.00079
scoring_system epss
scoring_elements 0.23542
published_at 2026-04-11T12:55:00Z
9
value 0.00079
scoring_system epss
scoring_elements 0.23501
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8666
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8666
4
reference_url https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
5
reference_url http://www.openwall.com/lists/oss-security/2015/12/24/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/12/24/1
6
reference_url http://www.securityfocus.com/bid/79670
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79670
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1283722
reference_id 1283722
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1283722
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8666
reference_id CVE-2015-8666
reference_type
scores
0
value 3.3
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:P/A:P
1
value 7.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-8666
12
reference_url https://security.gentoo.org/glsa/201602-01
reference_id GLSA-201602-01
reference_type
scores
url https://security.gentoo.org/glsa/201602-01
13
reference_url https://usn.ubuntu.com/2891-1/
reference_id USN-2891-1
reference_type
scores
url https://usn.ubuntu.com/2891-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.5.0-r1
purl pkg:ebuild/app-emulation/qemu@2.5.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1
aliases CVE-2015-8666
risk_score 3.5
exploitability 0.5
weighted_severity 7.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-prnz-8kk8-fkhj
18
url VCID-rwea-a658-bfbm
vulnerability_id VCID-rwea-a658-bfbm
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which may allow a remote attacker to cause a Denial of Service or gain
    elevated privileges from a guest VM.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176503.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176503.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176558.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176558.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175967.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175967.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176300.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176300.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html
11
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html
12
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8567.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8567.json
13
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8567
reference_id
reference_type
scores
0
value 0.03508
scoring_system epss
scoring_elements 0.87638
published_at 2026-04-16T12:55:00Z
1
value 0.03508
scoring_system epss
scoring_elements 0.87626
published_at 2026-04-12T12:55:00Z
2
value 0.03508
scoring_system epss
scoring_elements 0.87623
published_at 2026-04-13T12:55:00Z
3
value 0.03508
scoring_system epss
scoring_elements 0.87568
published_at 2026-04-01T12:55:00Z
4
value 0.03508
scoring_system epss
scoring_elements 0.87578
published_at 2026-04-02T12:55:00Z
5
value 0.03508
scoring_system epss
scoring_elements 0.87591
published_at 2026-04-04T12:55:00Z
6
value 0.03508
scoring_system epss
scoring_elements 0.87594
published_at 2026-04-07T12:55:00Z
7
value 0.03508
scoring_system epss
scoring_elements 0.87613
published_at 2026-04-08T12:55:00Z
8
value 0.03508
scoring_system epss
scoring_elements 0.87619
published_at 2026-04-09T12:55:00Z
9
value 0.03508
scoring_system epss
scoring_elements 0.87631
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8567
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
33
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
34
reference_url https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02299.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02299.html
35
reference_url http://www.debian.org/security/2016/dsa-3471
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3471
36
reference_url http://www.openwall.com/lists/oss-security/2015/12/15/10
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/12/15/10
37
reference_url http://www.securityfocus.com/bid/79721
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79721
38
reference_url http://www.ubuntu.com/usn/USN-2891-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2891-1
39
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1289816
reference_id 1289816
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1289816
40
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808145
reference_id 808145
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808145
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8567
reference_id CVE-2015-8567
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
1
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-8567
61
reference_url https://security.gentoo.org/glsa/201602-01
reference_id GLSA-201602-01
reference_type
scores
url https://security.gentoo.org/glsa/201602-01
62
reference_url https://usn.ubuntu.com/2891-1/
reference_id USN-2891-1
reference_type
scores
url https://usn.ubuntu.com/2891-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.5.0-r1
purl pkg:ebuild/app-emulation/qemu@2.5.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1
aliases CVE-2015-8567
risk_score 3.5
exploitability 0.5
weighted_severity 6.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rwea-a658-bfbm
19
url VCID-ucq7-rbw9-efc2
vulnerability_id VCID-ucq7-rbw9-efc2
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which may allow a remote attacker to cause a Denial of Service or gain
    elevated privileges from a guest VM.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5278.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5278.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5278
reference_id
reference_type
scores
0
value 0.01853
scoring_system epss
scoring_elements 0.82946
published_at 2026-04-01T12:55:00Z
1
value 0.01853
scoring_system epss
scoring_elements 0.82962
published_at 2026-04-02T12:55:00Z
2
value 0.01853
scoring_system epss
scoring_elements 0.82975
published_at 2026-04-04T12:55:00Z
3
value 0.01853
scoring_system epss
scoring_elements 0.82972
published_at 2026-04-07T12:55:00Z
4
value 0.01853
scoring_system epss
scoring_elements 0.82997
published_at 2026-04-08T12:55:00Z
5
value 0.01853
scoring_system epss
scoring_elements 0.83004
published_at 2026-04-09T12:55:00Z
6
value 0.01853
scoring_system epss
scoring_elements 0.8302
published_at 2026-04-11T12:55:00Z
7
value 0.01853
scoring_system epss
scoring_elements 0.83014
published_at 2026-04-12T12:55:00Z
8
value 0.01853
scoring_system epss
scoring_elements 0.8301
published_at 2026-04-13T12:55:00Z
9
value 0.01853
scoring_system epss
scoring_elements 0.83048
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5278
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5278
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5278
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5279
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5279
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6815
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6855
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1256661
reference_id 1256661
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1256661
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799073
reference_id 799073
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799073
8
reference_url https://security.gentoo.org/glsa/201602-01
reference_id GLSA-201602-01
reference_type
scores
url https://security.gentoo.org/glsa/201602-01
9
reference_url https://usn.ubuntu.com/2745-1/
reference_id USN-2745-1
reference_type
scores
url https://usn.ubuntu.com/2745-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.5.0-r1
purl pkg:ebuild/app-emulation/qemu@2.5.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1
aliases CVE-2015-5278
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ucq7-rbw9-efc2
20
url VCID-vgar-q6tq-ufc5
vulnerability_id VCID-vgar-q6tq-ufc5
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which may allow a remote attacker to cause a Denial of Service or gain
    elevated privileges from a guest VM.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169624.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169624.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169767.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169767.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169802.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169802.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7295.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7295.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7295
reference_id
reference_type
scores
0
value 0.03583
scoring_system epss
scoring_elements 0.87759
published_at 2026-04-16T12:55:00Z
1
value 0.03583
scoring_system epss
scoring_elements 0.8769
published_at 2026-04-01T12:55:00Z
2
value 0.03583
scoring_system epss
scoring_elements 0.87701
published_at 2026-04-02T12:55:00Z
3
value 0.03583
scoring_system epss
scoring_elements 0.87713
published_at 2026-04-04T12:55:00Z
4
value 0.03583
scoring_system epss
scoring_elements 0.87715
published_at 2026-04-07T12:55:00Z
5
value 0.03583
scoring_system epss
scoring_elements 0.87736
published_at 2026-04-08T12:55:00Z
6
value 0.03583
scoring_system epss
scoring_elements 0.87742
published_at 2026-04-09T12:55:00Z
7
value 0.03583
scoring_system epss
scoring_elements 0.87753
published_at 2026-04-11T12:55:00Z
8
value 0.03583
scoring_system epss
scoring_elements 0.87747
published_at 2026-04-12T12:55:00Z
9
value 0.03583
scoring_system epss
scoring_elements 0.87745
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7295
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
24
reference_url http://www.debian.org/security/2016/dsa-3469
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3469
25
reference_url http://www.debian.org/security/2016/dsa-3470
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3470
26
reference_url http://www.debian.org/security/2016/dsa-3471
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3471
27
reference_url http://www.openwall.com/lists/oss-security/2015/09/18/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/09/18/5
28
reference_url http://www.openwall.com/lists/oss-security/2015/09/18/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/09/18/9
29
reference_url http://www.securityfocus.com/bid/82672
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/82672
30
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1264381
reference_id 1264381
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1264381
31
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799452
reference_id 799452
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799452
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7295
reference_id CVE-2015-7295
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-7295
38
reference_url https://security.gentoo.org/glsa/201602-01
reference_id GLSA-201602-01
reference_type
scores
url https://security.gentoo.org/glsa/201602-01
39
reference_url https://usn.ubuntu.com/2828-1/
reference_id USN-2828-1
reference_type
scores
url https://usn.ubuntu.com/2828-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.5.0-r1
purl pkg:ebuild/app-emulation/qemu@2.5.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1
aliases CVE-2015-7295
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vgar-q6tq-ufc5
21
url VCID-wj3c-7a67-ffd1
vulnerability_id VCID-wj3c-7a67-ffd1
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which may allow a remote attacker to cause a Denial of Service or gain
    elevated privileges from a guest VM.
references
0
reference_url http://git.qemu-project.org/?p=qemu.git%3Ba=commitdiff%3Bh=4c65fed8bdf96780735dbdb92a8
reference_id
reference_type
scores
url http://git.qemu-project.org/?p=qemu.git%3Ba=commitdiff%3Bh=4c65fed8bdf96780735dbdb92a8
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8504.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8504.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8504
reference_id
reference_type
scores
0
value 0.02814
scoring_system epss
scoring_elements 0.86156
published_at 2026-04-16T12:55:00Z
1
value 0.02814
scoring_system epss
scoring_elements 0.86139
published_at 2026-04-13T12:55:00Z
2
value 0.02814
scoring_system epss
scoring_elements 0.86073
published_at 2026-04-01T12:55:00Z
3
value 0.02814
scoring_system epss
scoring_elements 0.86084
published_at 2026-04-02T12:55:00Z
4
value 0.02814
scoring_system epss
scoring_elements 0.861
published_at 2026-04-04T12:55:00Z
5
value 0.02814
scoring_system epss
scoring_elements 0.86099
published_at 2026-04-07T12:55:00Z
6
value 0.02814
scoring_system epss
scoring_elements 0.86118
published_at 2026-04-08T12:55:00Z
7
value 0.02814
scoring_system epss
scoring_elements 0.8613
published_at 2026-04-09T12:55:00Z
8
value 0.02814
scoring_system epss
scoring_elements 0.86144
published_at 2026-04-11T12:55:00Z
9
value 0.02814
scoring_system epss
scoring_elements 0.86143
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8504
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
22
reference_url http://www.debian.org/security/2016/dsa-3469
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3469
23
reference_url http://www.debian.org/security/2016/dsa-3470
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3470
24
reference_url http://www.debian.org/security/2016/dsa-3471
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3471
25
reference_url http://www.openwall.com/lists/oss-security/2015/12/08/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/12/08/7
26
reference_url http://www.securityfocus.com/bid/78708
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/78708
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1289541
reference_id 1289541
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1289541
28
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808130
reference_id 808130
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808130
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:2.5.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc1:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:2.5.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc2:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8504
reference_id CVE-2015-8504
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-8504
36
reference_url https://security.gentoo.org/glsa/201602-01
reference_id GLSA-201602-01
reference_type
scores
url https://security.gentoo.org/glsa/201602-01
37
reference_url https://usn.ubuntu.com/2891-1/
reference_id USN-2891-1
reference_type
scores
url https://usn.ubuntu.com/2891-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.5.0-r1
purl pkg:ebuild/app-emulation/qemu@2.5.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1
aliases CVE-2015-8504
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wj3c-7a67-ffd1
22
url VCID-x6sp-admm-2bb4
vulnerability_id VCID-x6sp-admm-2bb4
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which may allow a remote attacker to cause a Denial of Service or gain
    elevated privileges from a guest VM.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8701.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8701.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8701
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.21404
published_at 2026-04-01T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21572
published_at 2026-04-02T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.2163
published_at 2026-04-04T12:55:00Z
3
value 0.0007
scoring_system epss
scoring_elements 0.21385
published_at 2026-04-07T12:55:00Z
4
value 0.0007
scoring_system epss
scoring_elements 0.21462
published_at 2026-04-08T12:55:00Z
5
value 0.0007
scoring_system epss
scoring_elements 0.21522
published_at 2026-04-09T12:55:00Z
6
value 0.0007
scoring_system epss
scoring_elements 0.21534
published_at 2026-04-11T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.21495
published_at 2026-04-12T12:55:00Z
8
value 0.0007
scoring_system epss
scoring_elements 0.2144
published_at 2026-04-13T12:55:00Z
9
value 0.0007
scoring_system epss
scoring_elements 0.21434
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8701
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8701
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8701
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1286971
reference_id 1286971
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1286971
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809313
reference_id 809313
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809313
5
reference_url https://security.gentoo.org/glsa/201602-01
reference_id GLSA-201602-01
reference_type
scores
url https://security.gentoo.org/glsa/201602-01
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.5.0-r1
purl pkg:ebuild/app-emulation/qemu@2.5.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1
aliases CVE-2015-8701
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x6sp-admm-2bb4
23
url VCID-zdcz-c2h2-dfde
vulnerability_id VCID-zdcz-c2h2-dfde
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which may allow a remote attacker to cause a Denial of Service or gain
    elevated privileges from a guest VM.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8745.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8745.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8745
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.20996
published_at 2026-04-16T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.21021
published_at 2026-04-01T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.21176
published_at 2026-04-02T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.21231
published_at 2026-04-04T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.20944
published_at 2026-04-07T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.21025
published_at 2026-04-08T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.21084
published_at 2026-04-09T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.21102
published_at 2026-04-11T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.21058
published_at 2026-04-12T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.21006
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
21
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.5
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1270876
reference_id 1270876
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1270876
23
reference_url https://security.gentoo.org/glsa/201602-01
reference_id GLSA-201602-01
reference_type
scores
url https://security.gentoo.org/glsa/201602-01
24
reference_url https://usn.ubuntu.com/2891-1/
reference_id USN-2891-1
reference_type
scores
url https://usn.ubuntu.com/2891-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.5.0-r1
purl pkg:ebuild/app-emulation/qemu@2.5.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1
aliases CVE-2015-8745
risk_score 0.4
exploitability 0.5
weighted_severity 0.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zdcz-c2h2-dfde
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1