Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/app-emulation/qemu@8.0.0
Typeebuild
Namespaceapp-emulation
Nameqemu
Version8.0.0
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-3ew5-8dfe-u3d8
vulnerability_id VCID-3ew5-8dfe-u3d8
summary Multiple vulnerabilities have been discovered in QEMU, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1544.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1544.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1544
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.19058
published_at 2026-04-21T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.19273
published_at 2026-04-02T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19119
published_at 2026-04-08T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.19172
published_at 2026-04-09T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.19178
published_at 2026-04-11T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.19132
published_at 2026-04-12T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.19079
published_at 2026-04-13T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.19037
published_at 2026-04-16T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.19049
published_at 2026-04-18T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.19324
published_at 2026-04-04T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.19039
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1544
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1544
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1544
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034179
reference_id 1034179
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034179
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2180364
reference_id 2180364
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-19T18:10:20Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2180364
6
reference_url https://access.redhat.com/security/cve/CVE-2023-1544
reference_id CVE-2023-1544
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-19T18:10:20Z/
url https://access.redhat.com/security/cve/CVE-2023-1544
7
reference_url https://security.gentoo.org/glsa/202408-18
reference_id GLSA-202408-18
reference_type
scores
url https://security.gentoo.org/glsa/202408-18
8
reference_url https://lists.nongnu.org/archive/html/qemu-devel/2023-03/msg00206.html
reference_id msg00206.html
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-19T18:10:20Z/
url https://lists.nongnu.org/archive/html/qemu-devel/2023-03/msg00206.html
9
reference_url https://security.netapp.com/advisory/ntap-20230511-0005/
reference_id ntap-20230511-0005
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-19T18:10:20Z/
url https://security.netapp.com/advisory/ntap-20230511-0005/
10
reference_url https://usn.ubuntu.com/6567-1/
reference_id USN-6567-1
reference_type
scores
url https://usn.ubuntu.com/6567-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@8.0.0
purl pkg:ebuild/app-emulation/qemu@8.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@8.0.0
aliases CVE-2023-1544
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3ew5-8dfe-u3d8
1
url VCID-ej5p-r4az-6ud2
vulnerability_id VCID-ej5p-r4az-6ud2
summary Multiple vulnerabilities have been discovered in QEMU, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4144.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4144.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-4144
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05635
published_at 2026-04-21T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.05834
published_at 2026-04-04T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.05798
published_at 2026-04-02T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.05867
published_at 2026-04-08T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.05828
published_at 2026-04-07T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.05832
published_at 2026-04-18T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.05823
published_at 2026-04-16T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.05858
published_at 2026-04-13T12:55:00Z
8
value 0.00022
scoring_system epss
scoring_elements 0.05866
published_at 2026-04-12T12:55:00Z
9
value 0.00022
scoring_system epss
scoring_elements 0.05875
published_at 2026-04-11T12:55:00Z
10
value 0.00022
scoring_system epss
scoring_elements 0.05893
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-4144
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4144
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4144
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2148506
reference_id 2148506
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T16:17:04Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2148506
5
reference_url https://security.gentoo.org/glsa/202408-18
reference_id GLSA-202408-18
reference_type
scores
url https://security.gentoo.org/glsa/202408-18
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTVPHLLXJ65BUMFBUUZ35F3J632SLFRK/
reference_id GTVPHLLXJ65BUMFBUUZ35F3J632SLFRK
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T16:17:04Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTVPHLLXJ65BUMFBUUZ35F3J632SLFRK/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I7J5IRXJYLELW7D43A75LOWRUE5EU54O/
reference_id I7J5IRXJYLELW7D43A75LOWRUE5EU54O
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T16:17:04Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I7J5IRXJYLELW7D43A75LOWRUE5EU54O/
8
reference_url https://lists.nongnu.org/archive/html/qemu-devel/2022-11/msg04143.html
reference_id msg04143.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T16:17:04Z/
url https://lists.nongnu.org/archive/html/qemu-devel/2022-11/msg04143.html
9
reference_url https://security.netapp.com/advisory/ntap-20230127-0012/
reference_id ntap-20230127-0012
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T16:17:04Z/
url https://security.netapp.com/advisory/ntap-20230127-0012/
10
reference_url https://access.redhat.com/errata/RHSA-2023:0099
reference_id RHSA-2023:0099
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0099
11
reference_url https://access.redhat.com/errata/RHSA-2023:0432
reference_id RHSA-2023:0432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0432
12
reference_url https://usn.ubuntu.com/6167-1/
reference_id USN-6167-1
reference_type
scores
url https://usn.ubuntu.com/6167-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@8.0.0
purl pkg:ebuild/app-emulation/qemu@8.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@8.0.0
aliases CVE-2022-4144
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ej5p-r4az-6ud2
2
url VCID-f2fx-sqtp-8yhe
vulnerability_id VCID-f2fx-sqtp-8yhe
summary Multiple vulnerabilities have been discovered in QEMU, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0216.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0216.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0216
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06028
published_at 2026-04-01T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06061
published_at 2026-04-02T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.0609
published_at 2026-04-04T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06073
published_at 2026-04-07T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06114
published_at 2026-04-08T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06152
published_at 2026-04-09T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06144
published_at 2026-04-11T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.0614
published_at 2026-04-12T12:55:00Z
8
value 0.00023
scoring_system epss
scoring_elements 0.06132
published_at 2026-04-13T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06093
published_at 2026-04-16T12:55:00Z
10
value 0.00023
scoring_system epss
scoring_elements 0.06104
published_at 2026-04-18T12:55:00Z
11
value 0.00023
scoring_system epss
scoring_elements 0.06254
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0216
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0216
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014590
reference_id 1014590
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014590
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2036953
reference_id 2036953
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2036953
6
reference_url https://security.gentoo.org/glsa/202408-18
reference_id GLSA-202408-18
reference_type
scores
url https://security.gentoo.org/glsa/202408-18
7
reference_url https://usn.ubuntu.com/5772-1/
reference_id USN-5772-1
reference_type
scores
url https://usn.ubuntu.com/5772-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@8.0.0
purl pkg:ebuild/app-emulation/qemu@8.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@8.0.0
aliases CVE-2022-0216
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f2fx-sqtp-8yhe
3
url VCID-nzsp-vjgp-hqcq
vulnerability_id VCID-nzsp-vjgp-hqcq
summary Multiple vulnerabilities have been discovered in QEMU, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2962.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2962.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2962
reference_id
reference_type
scores
0
value 0.00031
scoring_system epss
scoring_elements 0.09019
published_at 2026-04-02T12:55:00Z
1
value 0.00031
scoring_system epss
scoring_elements 0.09087
published_at 2026-04-21T12:55:00Z
2
value 0.00031
scoring_system epss
scoring_elements 0.09105
published_at 2026-04-09T12:55:00Z
3
value 0.00031
scoring_system epss
scoring_elements 0.09106
published_at 2026-04-11T12:55:00Z
4
value 0.00031
scoring_system epss
scoring_elements 0.09059
published_at 2026-04-13T12:55:00Z
5
value 0.00031
scoring_system epss
scoring_elements 0.08954
published_at 2026-04-16T12:55:00Z
6
value 0.00031
scoring_system epss
scoring_elements 0.08935
published_at 2026-04-18T12:55:00Z
7
value 0.00031
scoring_system epss
scoring_elements 0.0907
published_at 2026-04-04T12:55:00Z
8
value 0.00031
scoring_system epss
scoring_elements 0.08993
published_at 2026-04-07T12:55:00Z
9
value 0.00031
scoring_system epss
scoring_elements 0.09073
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2962
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1018055
reference_id 1018055
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1018055
4
reference_url https://gitlab.com/qemu-project/qemu/-/issues/1171
reference_id 1171
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:35Z/
url https://gitlab.com/qemu-project/qemu/-/issues/1171
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2120631
reference_id 2120631
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2120631
6
reference_url https://gitlab.com/qemu-project/qemu/-/commit/36a894aeb64a2e02871016da1c37d4a4ca109182
reference_id 36a894aeb64a2e02871016da1c37d4a4ca109182
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:35Z/
url https://gitlab.com/qemu-project/qemu/-/commit/36a894aeb64a2e02871016da1c37d4a4ca109182
7
reference_url https://security.gentoo.org/glsa/202408-18
reference_id GLSA-202408-18
reference_type
scores
url https://security.gentoo.org/glsa/202408-18
8
reference_url https://usn.ubuntu.com/5772-1/
reference_id USN-5772-1
reference_type
scores
url https://usn.ubuntu.com/5772-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@8.0.0
purl pkg:ebuild/app-emulation/qemu@8.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@8.0.0
aliases CVE-2022-2962
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nzsp-vjgp-hqcq
4
url VCID-p2dz-mtns-5bb4
vulnerability_id VCID-p2dz-mtns-5bb4
summary Multiple vulnerabilities have been discovered in QEMU, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2861.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2861.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2861
reference_id
reference_type
scores
0
value 0.00041
scoring_system epss
scoring_elements 0.1235
published_at 2026-04-16T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.12447
published_at 2026-04-13T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12486
published_at 2026-04-12T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12525
published_at 2026-04-11T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.12555
published_at 2026-04-09T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.12505
published_at 2026-04-08T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12615
published_at 2026-04-04T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.12424
published_at 2026-04-07T12:55:00Z
8
value 0.00041
scoring_system epss
scoring_elements 0.12574
published_at 2026-04-02T12:55:00Z
9
value 0.00041
scoring_system epss
scoring_elements 0.12353
published_at 2026-04-18T12:55:00Z
10
value 0.00042
scoring_system epss
scoring_elements 0.12857
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2861
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2861
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2219266
reference_id 2219266
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-24T16:40:48Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2219266
5
reference_url https://access.redhat.com/security/cve/CVE-2023-2861
reference_id CVE-2023-2861
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-24T16:40:48Z/
url https://access.redhat.com/security/cve/CVE-2023-2861
6
reference_url https://security.gentoo.org/glsa/202408-18
reference_id GLSA-202408-18
reference_type
scores
url https://security.gentoo.org/glsa/202408-18
7
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00012.html
reference_id msg00012.html
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-24T16:40:48Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00012.html
8
reference_url https://security.netapp.com/advisory/ntap-20240125-0005/
reference_id ntap-20240125-0005
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-24T16:40:48Z/
url https://security.netapp.com/advisory/ntap-20240125-0005/
9
reference_url https://security.netapp.com/advisory/ntap-20240229-0002/
reference_id ntap-20240229-0002
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-24T16:40:48Z/
url https://security.netapp.com/advisory/ntap-20240229-0002/
10
reference_url https://usn.ubuntu.com/6567-1/
reference_id USN-6567-1
reference_type
scores
url https://usn.ubuntu.com/6567-1/
11
reference_url https://usn.ubuntu.com/8172-1/
reference_id USN-8172-1
reference_type
scores
url https://usn.ubuntu.com/8172-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@8.0.0
purl pkg:ebuild/app-emulation/qemu@8.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@8.0.0
aliases CVE-2023-2861
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p2dz-mtns-5bb4
5
url VCID-pxjg-chmx-nkdc
vulnerability_id VCID-pxjg-chmx-nkdc
summary Multiple vulnerabilities have been discovered in QEMU, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35414.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35414.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-35414
reference_id
reference_type
scores
0
value 0.00297
scoring_system epss
scoring_elements 0.53082
published_at 2026-04-21T12:55:00Z
1
value 0.00297
scoring_system epss
scoring_elements 0.53002
published_at 2026-04-02T12:55:00Z
2
value 0.00297
scoring_system epss
scoring_elements 0.53026
published_at 2026-04-04T12:55:00Z
3
value 0.00297
scoring_system epss
scoring_elements 0.52993
published_at 2026-04-07T12:55:00Z
4
value 0.00297
scoring_system epss
scoring_elements 0.53044
published_at 2026-04-08T12:55:00Z
5
value 0.00297
scoring_system epss
scoring_elements 0.53037
published_at 2026-04-09T12:55:00Z
6
value 0.00297
scoring_system epss
scoring_elements 0.53086
published_at 2026-04-11T12:55:00Z
7
value 0.00297
scoring_system epss
scoring_elements 0.53071
published_at 2026-04-12T12:55:00Z
8
value 0.00297
scoring_system epss
scoring_elements 0.53055
published_at 2026-04-13T12:55:00Z
9
value 0.00297
scoring_system epss
scoring_elements 0.53092
published_at 2026-04-16T12:55:00Z
10
value 0.00297
scoring_system epss
scoring_elements 0.53099
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-35414
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35414
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014958
reference_id 1014958
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014958
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2124911
reference_id 2124911
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2124911
6
reference_url https://security.gentoo.org/glsa/202408-18
reference_id GLSA-202408-18
reference_type
scores
url https://security.gentoo.org/glsa/202408-18
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@8.0.0
purl pkg:ebuild/app-emulation/qemu@8.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@8.0.0
aliases CVE-2022-35414
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pxjg-chmx-nkdc
6
url VCID-rz5x-q1ne-53he
vulnerability_id VCID-rz5x-q1ne-53he
summary Multiple vulnerabilities have been discovered in QEMU, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14394.json
reference_id
reference_type
scores
0
value 3.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14394.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14394
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.06818
published_at 2026-04-01T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.06901
published_at 2026-04-02T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06951
published_at 2026-04-04T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.06935
published_at 2026-04-07T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.06989
published_at 2026-04-08T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.0702
published_at 2026-04-09T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.07025
published_at 2026-04-11T12:55:00Z
7
value 0.00025
scoring_system epss
scoring_elements 0.07014
published_at 2026-04-12T12:55:00Z
8
value 0.00025
scoring_system epss
scoring_elements 0.07007
published_at 2026-04-13T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.06946
published_at 2026-04-16T12:55:00Z
10
value 0.00025
scoring_system epss
scoring_elements 0.0693
published_at 2026-04-18T12:55:00Z
11
value 0.00025
scoring_system epss
scoring_elements 0.07064
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14394
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14394
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14394
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1908004
reference_id 1908004
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1908004
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=979677
reference_id 979677
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=979677
6
reference_url https://security.gentoo.org/glsa/202408-18
reference_id GLSA-202408-18
reference_type
scores
url https://security.gentoo.org/glsa/202408-18
7
reference_url https://usn.ubuntu.com/6567-1/
reference_id USN-6567-1
reference_type
scores
url https://usn.ubuntu.com/6567-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@8.0.0
purl pkg:ebuild/app-emulation/qemu@8.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@8.0.0
aliases CVE-2020-14394
risk_score 1.4
exploitability 0.5
weighted_severity 2.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rz5x-q1ne-53he
7
url VCID-takm-jn93-eqgb
vulnerability_id VCID-takm-jn93-eqgb
summary Multiple vulnerabilities have been discovered in QEMU, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1050.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1050.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1050
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08132
published_at 2026-04-01T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08192
published_at 2026-04-07T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.08244
published_at 2026-04-04T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.08255
published_at 2026-04-08T12:55:00Z
4
value 0.00029
scoring_system epss
scoring_elements 0.08275
published_at 2026-04-09T12:55:00Z
5
value 0.00029
scoring_system epss
scoring_elements 0.08266
published_at 2026-04-11T12:55:00Z
6
value 0.00029
scoring_system epss
scoring_elements 0.08246
published_at 2026-04-12T12:55:00Z
7
value 0.00029
scoring_system epss
scoring_elements 0.08228
published_at 2026-04-13T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08123
published_at 2026-04-16T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.08109
published_at 2026-04-18T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08273
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1050
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1050
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1050
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014589
reference_id 1014589
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014589
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2069625
reference_id 2069625
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2069625
6
reference_url https://security.gentoo.org/glsa/202408-18
reference_id GLSA-202408-18
reference_type
scores
url https://security.gentoo.org/glsa/202408-18
7
reference_url https://usn.ubuntu.com/6167-1/
reference_id USN-6167-1
reference_type
scores
url https://usn.ubuntu.com/6167-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@8.0.0
purl pkg:ebuild/app-emulation/qemu@8.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@8.0.0
aliases CVE-2022-1050
risk_score 3.7
exploitability 0.5
weighted_severity 7.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-takm-jn93-eqgb
8
url VCID-z19w-mr4e-9fh4
vulnerability_id VCID-z19w-mr4e-9fh4
summary Multiple vulnerabilities have been discovered in QEMU, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4172.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4172.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-4172
reference_id
reference_type
scores
0
value 0.0003
scoring_system epss
scoring_elements 0.0868
published_at 2026-04-21T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.0929
published_at 2026-04-04T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09242
published_at 2026-04-02T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09186
published_at 2026-04-18T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09187
published_at 2026-04-16T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09295
published_at 2026-04-13T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09309
published_at 2026-04-12T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09336
published_at 2026-04-11T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.09327
published_at 2026-04-09T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.09283
published_at 2026-04-08T12:55:00Z
10
value 0.00032
scoring_system epss
scoring_elements 0.09208
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-4172
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1025123
reference_id 1025123
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1025123
4
reference_url https://gitlab.com/qemu-project/qemu/-/issues/1268
reference_id 1268
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T16:05:37Z/
url https://gitlab.com/qemu-project/qemu/-/issues/1268
5
reference_url https://lore.kernel.org/qemu-devel/20221024154233.1043347-1-lk%40c--e.de/
reference_id 20221024154233.1043347-1-lk%40c--e.de
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T16:05:37Z/
url https://lore.kernel.org/qemu-devel/20221024154233.1043347-1-lk%40c--e.de/
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2149105
reference_id 2149105
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2149105
7
reference_url https://gitlab.com/qemu-project/qemu/-/commit/defb7098
reference_id defb7098
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T16:05:37Z/
url https://gitlab.com/qemu-project/qemu/-/commit/defb7098
8
reference_url https://security.gentoo.org/glsa/202408-18
reference_id GLSA-202408-18
reference_type
scores
url https://security.gentoo.org/glsa/202408-18
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I7J5IRXJYLELW7D43A75LOWRUE5EU54O/
reference_id I7J5IRXJYLELW7D43A75LOWRUE5EU54O
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T16:05:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I7J5IRXJYLELW7D43A75LOWRUE5EU54O/
10
reference_url https://security.netapp.com/advisory/ntap-20230127-0013/
reference_id ntap-20230127-0013
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T16:05:37Z/
url https://security.netapp.com/advisory/ntap-20230127-0013/
11
reference_url https://access.redhat.com/errata/RHSA-2023:2162
reference_id RHSA-2023:2162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2162
12
reference_url https://usn.ubuntu.com/6167-1/
reference_id USN-6167-1
reference_type
scores
url https://usn.ubuntu.com/6167-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@8.0.0
purl pkg:ebuild/app-emulation/qemu@8.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@8.0.0
aliases CVE-2022-4172
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z19w-mr4e-9fh4
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@8.0.0