Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/85778?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/85778?format=api", "purl": "pkg:ebuild/app-emulation/qemu@2.7.0-r6", "type": "ebuild", "namespace": "app-emulation", "name": "qemu", "version": "2.7.0-r6", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "2.8.0", "latest_non_vulnerable_version": "8.0.0", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61921?format=api", "vulnerability_id": "VCID-1c93-u2ze-jyg9", "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n which could cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7994.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7994.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7994", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35499", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.357", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35727", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35607", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35653", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35677", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35686", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35642", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.3562", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35659", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35649", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35598", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7994" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7994", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7994" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382666", "reference_id": "1382666", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382666" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840228", "reference_id": "840228", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840228" }, { "reference_url": "https://security.gentoo.org/glsa/201611-11", "reference_id": "GLSA-201611-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201611-11" }, { "reference_url": "https://usn.ubuntu.com/3125-1/", "reference_id": "USN-3125-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3125-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85778?format=api", "purl": "pkg:ebuild/app-emulation/qemu@2.7.0-r6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r6" } ], "aliases": [ "CVE-2016-7994" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1c93-u2ze-jyg9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61922?format=api", "vulnerability_id": "VCID-33hx-334p-myag", "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n which could cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8576.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8576.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8576", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29957", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29999", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.30047", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29861", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29923", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29959", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29964", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29917", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29868", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29886", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29866", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2982", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8576" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8576", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8576" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:S/C:N/I:N/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1333425", "reference_id": "1333425", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1333425" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840343", "reference_id": "840343", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840343" }, { "reference_url": "https://security.gentoo.org/glsa/201611-11", "reference_id": "GLSA-201611-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201611-11" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2392", "reference_id": "RHSA-2017:2392", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2392" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2408", "reference_id": "RHSA-2017:2408", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2408" }, { "reference_url": "https://usn.ubuntu.com/3125-1/", "reference_id": "USN-3125-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3125-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85778?format=api", "purl": "pkg:ebuild/app-emulation/qemu@2.7.0-r6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r6" } ], "aliases": [ "CVE-2016-8576" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-33hx-334p-myag" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61919?format=api", "vulnerability_id": "VCID-5fu6-gkdc-sfhq", "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n which could cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7908.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7908.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7908", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32309", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.3246", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32496", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32318", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32367", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32395", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32397", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32359", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32332", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32369", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32346", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7908" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7908", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7908" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:S/C:N/I:N/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1327465", "reference_id": "1327465", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1327465" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839835", "reference_id": "839835", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839835" }, { "reference_url": "https://security.gentoo.org/glsa/201611-11", "reference_id": "GLSA-201611-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201611-11" }, { "reference_url": "https://usn.ubuntu.com/3125-1/", "reference_id": "USN-3125-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3125-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85778?format=api", "purl": "pkg:ebuild/app-emulation/qemu@2.7.0-r6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r6" } ], "aliases": [ "CVE-2016-7908" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5fu6-gkdc-sfhq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61927?format=api", "vulnerability_id": "VCID-8822-6d2n-x7a6", "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n which could cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8909.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8909.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8909", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11073", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11216", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11279", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11092", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11172", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11228", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11237", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11205", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11179", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11044", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11053", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11185", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8909" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8909", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8909" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:S/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388052", "reference_id": "1388052", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388052" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=841950", "reference_id": "841950", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=841950" }, { "reference_url": "https://security.gentoo.org/glsa/201611-11", "reference_id": "GLSA-201611-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201611-11" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2392", "reference_id": "RHSA-2017:2392", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2392" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2408", "reference_id": "RHSA-2017:2408", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2408" }, { "reference_url": "https://usn.ubuntu.com/3125-1/", "reference_id": "USN-3125-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3125-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85778?format=api", "purl": "pkg:ebuild/app-emulation/qemu@2.7.0-r6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r6" } ], "aliases": [ "CVE-2016-8909" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8822-6d2n-x7a6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61917?format=api", "vulnerability_id": "VCID-91jh-3mv7-yuga", "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n which could cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7466.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7466.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7466", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26229", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26312", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26353", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26126", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26193", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26241", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26248", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26203", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26144", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26149", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26124", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26086", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7466" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7466", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7466" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:S/C:N/I:N/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377837", "reference_id": "1377837", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377837" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838687", "reference_id": "838687", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838687" }, { "reference_url": "https://security.gentoo.org/glsa/201611-11", "reference_id": "GLSA-201611-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201611-11" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2392", "reference_id": "RHSA-2017:2392", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2392" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2408", "reference_id": "RHSA-2017:2408", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2408" }, { "reference_url": "https://usn.ubuntu.com/3125-1/", "reference_id": "USN-3125-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3125-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85778?format=api", "purl": "pkg:ebuild/app-emulation/qemu@2.7.0-r6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r6" } ], "aliases": [ "CVE-2016-7466" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-91jh-3mv7-yuga" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61916?format=api", "vulnerability_id": "VCID-9p62-abss-v7c2", "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n which could cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7423.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7423.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7423", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.33993", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34331", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34358", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34223", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34266", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34296", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34255", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34232", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34267", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34254", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.3422", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7423" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7423", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7423" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:S/C:N/I:N/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376776", "reference_id": "1376776", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376776" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838145", "reference_id": "838145", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838145" }, { "reference_url": "https://security.gentoo.org/glsa/201611-11", "reference_id": "GLSA-201611-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201611-11" }, { "reference_url": "https://usn.ubuntu.com/3125-1/", "reference_id": "USN-3125-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3125-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85778?format=api", "purl": "pkg:ebuild/app-emulation/qemu@2.7.0-r6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r6" } ], "aliases": [ "CVE-2016-7423" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9p62-abss-v7c2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61929?format=api", "vulnerability_id": "VCID-bnve-337x-4ya9", "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n which could cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9102.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9102.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9102", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27974", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.28047", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.28089", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27883", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.2795", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27991", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27994", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27951", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27892", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27901", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.2784", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9102" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9102", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9102" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "1.5", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:S/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389550", "reference_id": "1389550", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389550" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842463", "reference_id": "842463", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842463" }, { "reference_url": "https://security.gentoo.org/glsa/201611-11", "reference_id": "GLSA-201611-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201611-11" }, { "reference_url": "https://usn.ubuntu.com/3125-1/", "reference_id": "USN-3125-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3125-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85778?format=api", "purl": "pkg:ebuild/app-emulation/qemu@2.7.0-r6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r6" } ], "aliases": [ "CVE-2016-9102" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bnve-337x-4ya9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61924?format=api", "vulnerability_id": "VCID-e2th-bfpw-jfcz", "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n which could cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8578.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8578.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8578", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29517", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29584", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29633", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29455", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29557", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29559", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29514", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29462", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29481", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29453", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29407", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8578" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8578", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8578" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:S/C:N/I:N/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1383291", "reference_id": "1383291", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1383291" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840340", "reference_id": "840340", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840340" }, { "reference_url": "https://security.gentoo.org/glsa/201611-11", "reference_id": "GLSA-201611-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201611-11" }, { "reference_url": "https://usn.ubuntu.com/3125-1/", "reference_id": "USN-3125-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3125-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85778?format=api", "purl": "pkg:ebuild/app-emulation/qemu@2.7.0-r6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r6" } ], "aliases": [ "CVE-2016-8578" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e2th-bfpw-jfcz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61923?format=api", "vulnerability_id": "VCID-eqw6-1x15-jqb9", "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n which could cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8577.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8577.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8577", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29517", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29584", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29633", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29455", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29557", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29559", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29514", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29462", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29481", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29453", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29407", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8577" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8577", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8577" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:S/C:N/I:N/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1383285", "reference_id": "1383285", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1383285" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840341", "reference_id": "840341", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840341" }, { "reference_url": "https://security.gentoo.org/glsa/201611-11", "reference_id": "GLSA-201611-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201611-11" }, { "reference_url": "https://usn.ubuntu.com/3125-1/", "reference_id": "USN-3125-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3125-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85778?format=api", "purl": "pkg:ebuild/app-emulation/qemu@2.7.0-r6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r6" } ], "aliases": [ "CVE-2016-8577" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eqw6-1x15-jqb9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61920?format=api", "vulnerability_id": "VCID-ezt6-c9hq-m3aq", "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n which could cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7909.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7909.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7909", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33368", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33505", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33538", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33379", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33423", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33458", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33461", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.3342", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33396", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33432", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33407", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33376", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7909" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7909", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7909" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:S/C:N/I:N/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1329538", "reference_id": "1329538", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1329538" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839834", "reference_id": "839834", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839834" }, { "reference_url": "https://security.gentoo.org/glsa/201611-11", "reference_id": "GLSA-201611-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201611-11" }, { "reference_url": "https://usn.ubuntu.com/3125-1/", "reference_id": "USN-3125-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3125-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85778?format=api", "purl": "pkg:ebuild/app-emulation/qemu@2.7.0-r6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r6" } ], "aliases": [ "CVE-2016-7909" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ezt6-c9hq-m3aq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61918?format=api", "vulnerability_id": "VCID-g3p8-5y7v-1ubk", "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n which could cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7907.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7907.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7907", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29737", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29783", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.2983", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29645", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29708", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29744", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29747", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29702", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29651", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29668", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29646", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29601", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7907" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7907", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7907" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1327206", "reference_id": "1327206", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1327206" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839986", "reference_id": "839986", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839986" }, { "reference_url": "https://security.gentoo.org/glsa/201611-11", "reference_id": "GLSA-201611-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201611-11" }, { "reference_url": "https://usn.ubuntu.com/3261-1/", "reference_id": "USN-3261-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3261-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85778?format=api", "purl": "pkg:ebuild/app-emulation/qemu@2.7.0-r6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r6" } ], "aliases": [ "CVE-2016-7907" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g3p8-5y7v-1ubk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61928?format=api", "vulnerability_id": "VCID-hu58-m2w7-qkeu", "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n which could cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8910.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8910.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8910", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27057", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.2689", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26941", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26951", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27097", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27133", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26925", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26993", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27039", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27042", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26998", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8910" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8910", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8910" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:S/C:N/I:N/A:P" }, { "value": "3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388046", "reference_id": "1388046", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388046" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=841955", "reference_id": "841955", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=841955" }, { "reference_url": "https://security.gentoo.org/glsa/201611-11", "reference_id": "GLSA-201611-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201611-11" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2392", "reference_id": "RHSA-2017:2392", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2392" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2408", "reference_id": "RHSA-2017:2408", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2408" }, { "reference_url": "https://usn.ubuntu.com/3125-1/", "reference_id": "USN-3125-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3125-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85778?format=api", "purl": "pkg:ebuild/app-emulation/qemu@2.7.0-r6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r6" } ], "aliases": [ "CVE-2016-8910" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hu58-m2w7-qkeu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61930?format=api", "vulnerability_id": "VCID-hvky-8ja9-rye5", "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n which could cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9103.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9103.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9103", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30467", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30494", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30541", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30351", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30412", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30446", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30448", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30404", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30356", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30373", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30354", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30311", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9103" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9103", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9103" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "1.5", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:S/C:P/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389642", "reference_id": "1389642", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389642" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842463", "reference_id": "842463", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842463" }, { "reference_url": "https://security.gentoo.org/glsa/201611-11", "reference_id": "GLSA-201611-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201611-11" }, { "reference_url": "https://usn.ubuntu.com/3125-1/", "reference_id": "USN-3125-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3125-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85778?format=api", "purl": "pkg:ebuild/app-emulation/qemu@2.7.0-r6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r6" } ], "aliases": [ "CVE-2016-9103" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hvky-8ja9-rye5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61915?format=api", "vulnerability_id": "VCID-j8gw-y7cy-wkdh", "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n which could cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7161.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7161.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7161", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.20198", "scoring_system": "epss", "scoring_elements": "0.95465", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.20198", "scoring_system": "epss", "scoring_elements": "0.95474", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.20198", "scoring_system": "epss", "scoring_elements": "0.95481", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.20198", "scoring_system": "epss", "scoring_elements": "0.95485", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.20198", "scoring_system": "epss", "scoring_elements": "0.95491", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.20198", "scoring_system": "epss", "scoring_elements": "0.95494", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.20198", "scoring_system": "epss", "scoring_elements": "0.955", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.20198", "scoring_system": "epss", "scoring_elements": "0.95501", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.20198", "scoring_system": "epss", "scoring_elements": "0.95502", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.20198", "scoring_system": "epss", "scoring_elements": "0.95511", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.20198", "scoring_system": "epss", "scoring_elements": "0.95516", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.20198", "scoring_system": "epss", "scoring_elements": "0.95518", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7161" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7161", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7161" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379297", "reference_id": "1379297", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379297" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838850", "reference_id": "838850", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838850" }, { "reference_url": "https://security.gentoo.org/glsa/201611-11", "reference_id": "GLSA-201611-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201611-11" }, { "reference_url": "https://usn.ubuntu.com/3125-1/", "reference_id": "USN-3125-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3125-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85778?format=api", "purl": "pkg:ebuild/app-emulation/qemu@2.7.0-r6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r6" } ], "aliases": [ "CVE-2016-7161" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j8gw-y7cy-wkdh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61931?format=api", "vulnerability_id": "VCID-kcqg-23j8-bqaa", "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n which could cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9104.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9104.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9104", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30323", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30354", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30401", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30216", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30276", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30311", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30315", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.3027", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30224", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30238", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.3022", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30175", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9104" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9104", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9104" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:S/C:N/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389686", "reference_id": "1389686", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389686" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842463", "reference_id": "842463", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842463" }, { "reference_url": "https://security.gentoo.org/glsa/201611-11", "reference_id": "GLSA-201611-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201611-11" }, { "reference_url": "https://usn.ubuntu.com/3125-1/", "reference_id": "USN-3125-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3125-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85778?format=api", "purl": "pkg:ebuild/app-emulation/qemu@2.7.0-r6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r6" } ], "aliases": [ "CVE-2016-9104" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kcqg-23j8-bqaa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61926?format=api", "vulnerability_id": "VCID-ujfw-wu9c-2ff3", "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n which could cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8669.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8669.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8669", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26229", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26312", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26353", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26126", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26193", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26241", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26248", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26203", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26144", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26149", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26124", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26086", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8669" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:S/C:N/I:N/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384909", "reference_id": "1384909", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384909" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840945", "reference_id": "840945", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840945" }, { "reference_url": "https://security.gentoo.org/glsa/201611-11", "reference_id": "GLSA-201611-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201611-11" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2392", "reference_id": "RHSA-2017:2392", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2392" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2408", "reference_id": "RHSA-2017:2408", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2408" }, { "reference_url": "https://usn.ubuntu.com/3261-1/", "reference_id": "USN-3261-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3261-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85778?format=api", "purl": "pkg:ebuild/app-emulation/qemu@2.7.0-r6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r6" } ], "aliases": [ "CVE-2016-8669" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ujfw-wu9c-2ff3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61925?format=api", "vulnerability_id": "VCID-whgj-3n1x-yyes", "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n which could cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8668.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8668.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8668", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35499", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.357", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35727", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35607", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35653", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35677", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35686", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35642", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.3562", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35659", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35649", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35598", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8668" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8668", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8668" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384896", "reference_id": "1384896", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384896" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840948", "reference_id": "840948", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840948" }, { "reference_url": "https://security.gentoo.org/glsa/201611-11", "reference_id": "GLSA-201611-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201611-11" }, { "reference_url": "https://usn.ubuntu.com/3125-1/", "reference_id": "USN-3125-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3125-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85778?format=api", "purl": "pkg:ebuild/app-emulation/qemu@2.7.0-r6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r6" } ], "aliases": [ "CVE-2016-8668" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "4.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-whgj-3n1x-yyes" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61932?format=api", "vulnerability_id": "VCID-z4u5-1yy5-ruhb", "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n which could cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9105.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9105.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9105", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28297", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28369", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28411", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28202", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28269", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28312", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28317", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28273", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28216", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28228", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28211", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28165", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9105" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9105", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9105" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "1.5", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:S/C:P/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389702", "reference_id": "1389702", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389702" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842463", "reference_id": "842463", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842463" }, { "reference_url": "https://security.gentoo.org/glsa/201611-11", "reference_id": "GLSA-201611-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201611-11" }, { "reference_url": "https://usn.ubuntu.com/3125-1/", "reference_id": "USN-3125-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3125-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85778?format=api", "purl": "pkg:ebuild/app-emulation/qemu@2.7.0-r6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r6" } ], "aliases": [ "CVE-2016-9105" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z4u5-1yy5-ruhb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61914?format=api", "vulnerability_id": "VCID-zyd2-vtc3-k7d3", "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n which could cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10029.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10029.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10029", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21443", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21611", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21668", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21424", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21501", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.2156", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21571", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21533", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21478", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21473", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21479", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21447", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10029" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10029", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10029" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406390", "reference_id": "1406390", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406390" }, { "reference_url": "https://security.gentoo.org/glsa/201611-11", "reference_id": "GLSA-201611-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201611-11" }, { "reference_url": "https://usn.ubuntu.com/3261-1/", "reference_id": "USN-3261-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3261-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85778?format=api", "purl": "pkg:ebuild/app-emulation/qemu@2.7.0-r6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r6" } ], "aliases": [ "CVE-2016-10029" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "4.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zyd2-vtc3-k7d3" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r6" }