{"url":"http://public2.vulnerablecode.io/api/packages/125603?format=json","purl":"pkg:rpm/redhat/qemu-kvm-rhev@2:0.12.1.2-2.355.el6_4?arch=2","type":"rpm","namespace":"redhat","name":"qemu-kvm-rhev","version":"2:0.12.1.2-2.355.el6_4","qualifiers":{"arch":"2"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3918?format=json","vulnerability_id":"VCID-zmns-hhw6-wkar","summary":"qemu (e1000 device driver): Buffer overflow when processing large packets","references":[{"reference_url":"http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=b0d9ffcd0251161c7c92f94804dcf599dfa3edeb","reference_id":"","reference_type":"","scores":[],"url":"http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=b0d9ffcd0251161c7c92f94804dcf599dfa3edeb"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097541.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097541.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097575.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097575.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097705.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097705.html"},{"reference_url":"http://lists.nongnu.org/archive/html/qemu-devel/2012-12/msg00533.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.nongnu.org/archive/html/qemu-devel/2012-12/msg00533.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-0599.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-0599.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-0608.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-0608.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-0609.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-0609.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-0610.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-0610.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-0639.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-0639.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6075.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6075.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-6075","reference_id":"","reference_type":"","scores":[{"value":"0.07525","scoring_system":"epss","scoring_elements":"0.91868","published_at":"2026-05-12T12:55:00Z"},{"value":"0.07525","scoring_system":"epss","scoring_elements":"0.91769","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07525","scoring_system":"epss","scoring_elements":"0.91778","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07525","scoring_system":"epss","scoring_elements":"0.91784","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07525","scoring_system":"epss","scoring_elements":"0.91792","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07525","scoring_system":"epss","scoring_elements":"0.91804","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07525","scoring_system":"epss","scoring_elements":"0.91811","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07525","scoring_system":"epss","scoring_elements":"0.91814","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07525","scoring_system":"epss","scoring_elements":"0.91816","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07525","scoring_system":"epss","scoring_elements":"0.91812","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07525","scoring_system":"epss","scoring_elements":"0.91832","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07525","scoring_system":"epss","scoring_elements":"0.91826","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07525","scoring_system":"epss","scoring_elements":"0.91831","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07525","scoring_system":"epss","scoring_elements":"0.91827","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07525","scoring_system":"epss","scoring_elements":"0.91841","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07525","scoring_system":"epss","scoring_elements":"0.91852","published_at":"2026-05-07T12:55:00Z"},{"value":"0.07525","scoring_system":"epss","scoring_elements":"0.91862","published_at":"2026-05-09T12:55:00Z"},{"value":"0.07525","scoring_system":"epss","scoring_elements":"0.91861","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-6075"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6075","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6075"},{"reference_url":"http://secunia.com/advisories/55082","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/55082"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201309-24.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201309-24.xml"},{"reference_url":"http://www.debian.org/security/2013/dsa-2607","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2607"},{"reference_url":"http://www.debian.org/security/2013/dsa-2608","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2608"},{"reference_url":"http://www.debian.org/security/2013/dsa-2619","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2619"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/12/30/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/12/30/1"},{"reference_url":"http://www.securityfocus.com/bid/57420","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/57420"},{"reference_url":"http://www.ubuntu.com/usn/USN-1692-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1692-1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696051","reference_id":"696051","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696051"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=889301","reference_id":"889301","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=889301"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-6075","reference_id":"CVE-2012-6075","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-6075"},{"reference_url":"https://security.gentoo.org/glsa/201309-24","reference_id":"GLSA-201309-24","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201309-24"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0599","reference_id":"RHSA-2013:0599","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0599"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0608","reference_id":"RHSA-2013:0608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0609","reference_id":"RHSA-2013:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0610","reference_id":"RHSA-2013:0610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0636","reference_id":"RHSA-2013:0636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0639","reference_id":"RHSA-2013:0639","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0639"},{"reference_url":"https://usn.ubuntu.com/1692-1/","reference_id":"USN-1692-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1692-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-41.html","reference_id":"XSA-41","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-41.html"}],"fixed_packages":[],"aliases":["CVE-2012-6075"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zmns-hhw6-wkar"}],"fixing_vulnerabilities":[],"risk_score":"4.2","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/qemu-kvm-rhev@2:0.12.1.2-2.355.el6_4%3Farch=2"}