Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/qemu@5.1.0-r1?arch=loongarch64&distroversion=v3.21&reponame=community
Typeapk
Namespacealpine
Nameqemu
Version5.1.0-r1
Qualifiers
arch loongarch64
distroversion v3.21
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version5.2.0-r0
Latest_non_vulnerable_version8.0.2-r1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-6ef4-c38a-j7ca
vulnerability_id VCID-6ef4-c38a-j7ca
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13362.json
reference_id
reference_type
scores
0
value 3.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13362.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-13362
reference_id
reference_type
scores
0
value 0.00098
scoring_system epss
scoring_elements 0.26973
published_at 2026-04-01T12:55:00Z
1
value 0.00098
scoring_system epss
scoring_elements 0.27014
published_at 2026-04-02T12:55:00Z
2
value 0.00098
scoring_system epss
scoring_elements 0.2705
published_at 2026-04-04T12:55:00Z
3
value 0.00098
scoring_system epss
scoring_elements 0.26841
published_at 2026-04-07T12:55:00Z
4
value 0.00098
scoring_system epss
scoring_elements 0.26909
published_at 2026-04-08T12:55:00Z
5
value 0.00098
scoring_system epss
scoring_elements 0.26956
published_at 2026-04-09T12:55:00Z
6
value 0.00098
scoring_system epss
scoring_elements 0.2696
published_at 2026-04-11T12:55:00Z
7
value 0.00098
scoring_system epss
scoring_elements 0.26916
published_at 2026-04-12T12:55:00Z
8
value 0.00098
scoring_system epss
scoring_elements 0.26859
published_at 2026-04-13T12:55:00Z
9
value 0.00098
scoring_system epss
scoring_elements 0.26871
published_at 2026-04-16T12:55:00Z
10
value 0.00098
scoring_system epss
scoring_elements 0.26842
published_at 2026-04-18T12:55:00Z
11
value 0.00098
scoring_system epss
scoring_elements 0.26803
published_at 2026-04-21T12:55:00Z
12
value 0.00098
scoring_system epss
scoring_elements 0.26745
published_at 2026-04-24T12:55:00Z
13
value 0.00098
scoring_system epss
scoring_elements 0.26737
published_at 2026-04-26T12:55:00Z
14
value 0.00098
scoring_system epss
scoring_elements 0.26667
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-13362
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10756
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13361
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13362
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13659
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13754
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13765
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1840999
reference_id 1840999
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1840999
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961887
reference_id 961887
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961887
11
reference_url https://security.gentoo.org/glsa/202011-09
reference_id GLSA-202011-09
reference_type
scores
url https://security.gentoo.org/glsa/202011-09
12
reference_url https://usn.ubuntu.com/4467-1/
reference_id USN-4467-1
reference_type
scores
url https://usn.ubuntu.com/4467-1/
13
reference_url https://usn.ubuntu.com/4467-2/
reference_id USN-4467-2
reference_type
scores
url https://usn.ubuntu.com/4467-2/
fixed_packages
0
url pkg:apk/alpine/qemu@5.1.0-r1?arch=loongarch64&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/qemu@5.1.0-r1?arch=loongarch64&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qemu@5.1.0-r1%3Farch=loongarch64&distroversion=v3.21&reponame=community
aliases CVE-2020-13362
risk_score 1.4
exploitability 0.5
weighted_severity 2.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6ef4-c38a-j7ca
1
url VCID-6hqu-ecs5-zqeb
vulnerability_id VCID-6hqu-ecs5-zqeb
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13361.json
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13361.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-13361
reference_id
reference_type
scores
0
value 0.00098
scoring_system epss
scoring_elements 0.26973
published_at 2026-04-01T12:55:00Z
1
value 0.00098
scoring_system epss
scoring_elements 0.27014
published_at 2026-04-02T12:55:00Z
2
value 0.00098
scoring_system epss
scoring_elements 0.2705
published_at 2026-04-04T12:55:00Z
3
value 0.00098
scoring_system epss
scoring_elements 0.26841
published_at 2026-04-07T12:55:00Z
4
value 0.00098
scoring_system epss
scoring_elements 0.26909
published_at 2026-04-08T12:55:00Z
5
value 0.00098
scoring_system epss
scoring_elements 0.26956
published_at 2026-04-09T12:55:00Z
6
value 0.00098
scoring_system epss
scoring_elements 0.2696
published_at 2026-04-11T12:55:00Z
7
value 0.00098
scoring_system epss
scoring_elements 0.26916
published_at 2026-04-12T12:55:00Z
8
value 0.00098
scoring_system epss
scoring_elements 0.26859
published_at 2026-04-13T12:55:00Z
9
value 0.00098
scoring_system epss
scoring_elements 0.26871
published_at 2026-04-16T12:55:00Z
10
value 0.00098
scoring_system epss
scoring_elements 0.26842
published_at 2026-04-18T12:55:00Z
11
value 0.00098
scoring_system epss
scoring_elements 0.26803
published_at 2026-04-21T12:55:00Z
12
value 0.00098
scoring_system epss
scoring_elements 0.26745
published_at 2026-04-24T12:55:00Z
13
value 0.00098
scoring_system epss
scoring_elements 0.26737
published_at 2026-04-26T12:55:00Z
14
value 0.00098
scoring_system epss
scoring_elements 0.26667
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-13361
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10756
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13361
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13362
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13659
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13754
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13765
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1840980
reference_id 1840980
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1840980
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961888
reference_id 961888
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961888
11
reference_url https://security.gentoo.org/glsa/202011-09
reference_id GLSA-202011-09
reference_type
scores
url https://security.gentoo.org/glsa/202011-09
12
reference_url https://usn.ubuntu.com/4467-1/
reference_id USN-4467-1
reference_type
scores
url https://usn.ubuntu.com/4467-1/
13
reference_url https://usn.ubuntu.com/4467-2/
reference_id USN-4467-2
reference_type
scores
url https://usn.ubuntu.com/4467-2/
fixed_packages
0
url pkg:apk/alpine/qemu@5.1.0-r1?arch=loongarch64&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/qemu@5.1.0-r1?arch=loongarch64&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qemu@5.1.0-r1%3Farch=loongarch64&distroversion=v3.21&reponame=community
aliases CVE-2020-13361
risk_score 1.8
exploitability 0.5
weighted_severity 3.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6hqu-ecs5-zqeb
2
url VCID-93gr-c812-uud8
vulnerability_id VCID-93gr-c812-uud8
summary QEMU: sdhci: out-of-bounds access issue while doing multi block SDMA
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25085.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25085.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25085
reference_id
reference_type
scores
0
value 0.00156
scoring_system epss
scoring_elements 0.3636
published_at 2026-04-01T12:55:00Z
1
value 0.00156
scoring_system epss
scoring_elements 0.36534
published_at 2026-04-02T12:55:00Z
2
value 0.00156
scoring_system epss
scoring_elements 0.36567
published_at 2026-04-04T12:55:00Z
3
value 0.00156
scoring_system epss
scoring_elements 0.36405
published_at 2026-04-07T12:55:00Z
4
value 0.00156
scoring_system epss
scoring_elements 0.36457
published_at 2026-04-08T12:55:00Z
5
value 0.00156
scoring_system epss
scoring_elements 0.36477
published_at 2026-04-09T12:55:00Z
6
value 0.00156
scoring_system epss
scoring_elements 0.36484
published_at 2026-04-11T12:55:00Z
7
value 0.00156
scoring_system epss
scoring_elements 0.36449
published_at 2026-04-12T12:55:00Z
8
value 0.00156
scoring_system epss
scoring_elements 0.36427
published_at 2026-04-13T12:55:00Z
9
value 0.00156
scoring_system epss
scoring_elements 0.36468
published_at 2026-04-16T12:55:00Z
10
value 0.00156
scoring_system epss
scoring_elements 0.36451
published_at 2026-04-18T12:55:00Z
11
value 0.00156
scoring_system epss
scoring_elements 0.36395
published_at 2026-04-21T12:55:00Z
12
value 0.00156
scoring_system epss
scoring_elements 0.36169
published_at 2026-04-24T12:55:00Z
13
value 0.00156
scoring_system epss
scoring_elements 0.36139
published_at 2026-04-26T12:55:00Z
14
value 0.00156
scoring_system epss
scoring_elements 0.36052
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25085
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25085
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25085
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1879671
reference_id 1879671
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1879671
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970540
reference_id 970540
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970540
6
reference_url https://usn.ubuntu.com/4650-1/
reference_id USN-4650-1
reference_type
scores
url https://usn.ubuntu.com/4650-1/
fixed_packages
0
url pkg:apk/alpine/qemu@5.1.0-r1?arch=loongarch64&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/qemu@5.1.0-r1?arch=loongarch64&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qemu@5.1.0-r1%3Farch=loongarch64&distroversion=v3.21&reponame=community
aliases CVE-2020-25085
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-93gr-c812-uud8
3
url VCID-a169-mquf-9kep
vulnerability_id VCID-a169-mquf-9kep
summary QEMU: fdc: null pointer dereference during r/w data transfer
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25741.json
reference_id
reference_type
scores
0
value 3.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25741.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25741
reference_id
reference_type
scores
0
value 0.00159
scoring_system epss
scoring_elements 0.36391
published_at 2026-04-29T12:55:00Z
1
value 0.00159
scoring_system epss
scoring_elements 0.36809
published_at 2026-04-16T12:55:00Z
2
value 0.00159
scoring_system epss
scoring_elements 0.36793
published_at 2026-04-18T12:55:00Z
3
value 0.00159
scoring_system epss
scoring_elements 0.36733
published_at 2026-04-21T12:55:00Z
4
value 0.00159
scoring_system epss
scoring_elements 0.3651
published_at 2026-04-24T12:55:00Z
5
value 0.00159
scoring_system epss
scoring_elements 0.36479
published_at 2026-04-26T12:55:00Z
6
value 0.00182
scoring_system epss
scoring_elements 0.39945
published_at 2026-04-09T12:55:00Z
7
value 0.00182
scoring_system epss
scoring_elements 0.39955
published_at 2026-04-11T12:55:00Z
8
value 0.00182
scoring_system epss
scoring_elements 0.3992
published_at 2026-04-12T12:55:00Z
9
value 0.00182
scoring_system epss
scoring_elements 0.399
published_at 2026-04-13T12:55:00Z
10
value 0.00182
scoring_system epss
scoring_elements 0.39778
published_at 2026-04-01T12:55:00Z
11
value 0.00182
scoring_system epss
scoring_elements 0.39932
published_at 2026-04-08T12:55:00Z
12
value 0.00182
scoring_system epss
scoring_elements 0.39926
published_at 2026-04-02T12:55:00Z
13
value 0.00182
scoring_system epss
scoring_elements 0.39954
published_at 2026-04-04T12:55:00Z
14
value 0.00182
scoring_system epss
scoring_elements 0.39876
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25741
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25741
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1881401
reference_id 1881401
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1881401
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970939
reference_id 970939
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970939
fixed_packages
0
url pkg:apk/alpine/qemu@5.1.0-r1?arch=loongarch64&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/qemu@5.1.0-r1?arch=loongarch64&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qemu@5.1.0-r1%3Farch=loongarch64&distroversion=v3.21&reponame=community
aliases CVE-2020-25741
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a169-mquf-9kep
4
url VCID-juek-f6et-x7eb
vulnerability_id VCID-juek-f6et-x7eb
summary QEMU: e1000e: infinite loop scenario in case of null packet descriptor
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28916.json
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28916.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-28916
reference_id
reference_type
scores
0
value 0.00047
scoring_system epss
scoring_elements 0.14431
published_at 2026-04-01T12:55:00Z
1
value 0.00047
scoring_system epss
scoring_elements 0.14494
published_at 2026-04-02T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.14564
published_at 2026-04-04T12:55:00Z
3
value 0.00047
scoring_system epss
scoring_elements 0.14372
published_at 2026-04-07T12:55:00Z
4
value 0.00047
scoring_system epss
scoring_elements 0.14457
published_at 2026-04-08T12:55:00Z
5
value 0.00047
scoring_system epss
scoring_elements 0.14511
published_at 2026-04-09T12:55:00Z
6
value 0.00047
scoring_system epss
scoring_elements 0.1446
published_at 2026-04-11T12:55:00Z
7
value 0.00047
scoring_system epss
scoring_elements 0.14423
published_at 2026-04-12T12:55:00Z
8
value 0.00047
scoring_system epss
scoring_elements 0.14366
published_at 2026-04-13T12:55:00Z
9
value 0.00047
scoring_system epss
scoring_elements 0.14257
published_at 2026-04-16T12:55:00Z
10
value 0.00047
scoring_system epss
scoring_elements 0.14258
published_at 2026-04-18T12:55:00Z
11
value 0.00047
scoring_system epss
scoring_elements 0.14328
published_at 2026-04-21T12:55:00Z
12
value 0.00047
scoring_system epss
scoring_elements 0.14359
published_at 2026-04-24T12:55:00Z
13
value 0.00047
scoring_system epss
scoring_elements 0.14334
published_at 2026-04-26T12:55:00Z
14
value 0.00047
scoring_system epss
scoring_elements 0.14275
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-28916
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28916
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28916
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1903064
reference_id 1903064
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1903064
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=974687
reference_id 974687
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=974687
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976388
reference_id 976388
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976388
7
reference_url https://access.redhat.com/errata/RHSA-2021:1762
reference_id RHSA-2021:1762
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1762
8
reference_url https://usn.ubuntu.com/4725-1/
reference_id USN-4725-1
reference_type
scores
url https://usn.ubuntu.com/4725-1/
fixed_packages
0
url pkg:apk/alpine/qemu@5.1.0-r1?arch=loongarch64&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/qemu@5.1.0-r1?arch=loongarch64&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qemu@5.1.0-r1%3Farch=loongarch64&distroversion=v3.21&reponame=community
aliases CVE-2020-28916
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-juek-f6et-x7eb
5
url VCID-nuwe-tupt-wfhg
vulnerability_id VCID-nuwe-tupt-wfhg
summary QEMU: usb: hcd-ohci: infinite loop issue while processing transfer descriptors
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25625.json
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25625.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25625
reference_id
reference_type
scores
0
value 0.00031
scoring_system epss
scoring_elements 0.08833
published_at 2026-04-29T12:55:00Z
1
value 0.00031
scoring_system epss
scoring_elements 0.08724
published_at 2026-04-16T12:55:00Z
2
value 0.00031
scoring_system epss
scoring_elements 0.08699
published_at 2026-04-18T12:55:00Z
3
value 0.00031
scoring_system epss
scoring_elements 0.0885
published_at 2026-04-21T12:55:00Z
4
value 0.00031
scoring_system epss
scoring_elements 0.08868
published_at 2026-04-24T12:55:00Z
5
value 0.00031
scoring_system epss
scoring_elements 0.08821
published_at 2026-04-26T12:55:00Z
6
value 0.00147
scoring_system epss
scoring_elements 0.35125
published_at 2026-04-09T12:55:00Z
7
value 0.00147
scoring_system epss
scoring_elements 0.3513
published_at 2026-04-11T12:55:00Z
8
value 0.00147
scoring_system epss
scoring_elements 0.35095
published_at 2026-04-12T12:55:00Z
9
value 0.00147
scoring_system epss
scoring_elements 0.35071
published_at 2026-04-13T12:55:00Z
10
value 0.00147
scoring_system epss
scoring_elements 0.34948
published_at 2026-04-01T12:55:00Z
11
value 0.00147
scoring_system epss
scoring_elements 0.35098
published_at 2026-04-08T12:55:00Z
12
value 0.00147
scoring_system epss
scoring_elements 0.35147
published_at 2026-04-02T12:55:00Z
13
value 0.00147
scoring_system epss
scoring_elements 0.35176
published_at 2026-04-04T12:55:00Z
14
value 0.00147
scoring_system epss
scoring_elements 0.35054
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25625
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25625
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25625
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1879808
reference_id 1879808
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1879808
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970542
reference_id 970542
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970542
6
reference_url https://usn.ubuntu.com/4650-1/
reference_id USN-4650-1
reference_type
scores
url https://usn.ubuntu.com/4650-1/
fixed_packages
0
url pkg:apk/alpine/qemu@5.1.0-r1?arch=loongarch64&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/qemu@5.1.0-r1?arch=loongarch64&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qemu@5.1.0-r1%3Farch=loongarch64&distroversion=v3.21&reponame=community
aliases CVE-2020-25625
risk_score 1.1
exploitability 0.5
weighted_severity 2.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nuwe-tupt-wfhg
6
url VCID-p2we-9qfu-17eb
vulnerability_id VCID-p2we-9qfu-17eb
summary QEMU: usb: use-after-free issue while setting up packet
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25084.json
reference_id
reference_type
scores
0
value 3.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25084.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25084
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10292
published_at 2026-04-29T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10273
published_at 2026-04-16T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10244
published_at 2026-04-18T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.10378
published_at 2026-04-21T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.10359
published_at 2026-04-24T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10351
published_at 2026-04-26T12:55:00Z
6
value 0.00037
scoring_system epss
scoring_elements 0.11097
published_at 2026-04-09T12:55:00Z
7
value 0.00037
scoring_system epss
scoring_elements 0.111
published_at 2026-04-11T12:55:00Z
8
value 0.00037
scoring_system epss
scoring_elements 0.11068
published_at 2026-04-12T12:55:00Z
9
value 0.00037
scoring_system epss
scoring_elements 0.11045
published_at 2026-04-13T12:55:00Z
10
value 0.00037
scoring_system epss
scoring_elements 0.10944
published_at 2026-04-01T12:55:00Z
11
value 0.00037
scoring_system epss
scoring_elements 0.11043
published_at 2026-04-08T12:55:00Z
12
value 0.00037
scoring_system epss
scoring_elements 0.11082
published_at 2026-04-02T12:55:00Z
13
value 0.00037
scoring_system epss
scoring_elements 0.11145
published_at 2026-04-04T12:55:00Z
14
value 0.00037
scoring_system epss
scoring_elements 0.10966
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25084
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25084
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25084
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1879652
reference_id 1879652
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1879652
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970539
reference_id 970539
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970539
6
reference_url https://usn.ubuntu.com/4650-1/
reference_id USN-4650-1
reference_type
scores
url https://usn.ubuntu.com/4650-1/
fixed_packages
0
url pkg:apk/alpine/qemu@5.1.0-r1?arch=loongarch64&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/qemu@5.1.0-r1?arch=loongarch64&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qemu@5.1.0-r1%3Farch=loongarch64&distroversion=v3.21&reponame=community
aliases CVE-2020-25084
risk_score 1.4
exploitability 0.5
weighted_severity 2.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p2we-9qfu-17eb
7
url VCID-vpp8-a7sw-pqef
vulnerability_id VCID-vpp8-a7sw-pqef
summary QEMU: usb: hcd-ohci: out-of-bound access issue while processing transfer descriptors
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25624.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25624.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25624
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.09846
published_at 2026-04-01T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.09939
published_at 2026-04-02T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.09986
published_at 2026-04-04T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.09884
published_at 2026-04-07T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.0996
published_at 2026-04-08T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.10009
published_at 2026-04-09T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.10025
published_at 2026-04-11T12:55:00Z
7
value 0.00034
scoring_system epss
scoring_elements 0.09984
published_at 2026-04-12T12:55:00Z
8
value 0.00034
scoring_system epss
scoring_elements 0.09963
published_at 2026-04-13T12:55:00Z
9
value 0.00034
scoring_system epss
scoring_elements 0.09839
published_at 2026-04-16T12:55:00Z
10
value 0.00034
scoring_system epss
scoring_elements 0.09808
published_at 2026-04-18T12:55:00Z
11
value 0.00034
scoring_system epss
scoring_elements 0.09957
published_at 2026-04-21T12:55:00Z
12
value 0.00034
scoring_system epss
scoring_elements 0.09987
published_at 2026-04-24T12:55:00Z
13
value 0.00034
scoring_system epss
scoring_elements 0.09953
published_at 2026-04-26T12:55:00Z
14
value 0.00034
scoring_system epss
scoring_elements 0.09898
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25624
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25624
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1879801
reference_id 1879801
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1879801
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970541
reference_id 970541
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970541
6
reference_url https://usn.ubuntu.com/4650-1/
reference_id USN-4650-1
reference_type
scores
url https://usn.ubuntu.com/4650-1/
fixed_packages
0
url pkg:apk/alpine/qemu@5.1.0-r1?arch=loongarch64&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/qemu@5.1.0-r1?arch=loongarch64&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qemu@5.1.0-r1%3Farch=loongarch64&distroversion=v3.21&reponame=community
aliases CVE-2020-25624
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vpp8-a7sw-pqef
8
url VCID-wdjx-9f36-abgu
vulnerability_id VCID-wdjx-9f36-abgu
summary Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15863.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15863.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15863
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.13872
published_at 2026-04-01T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.13955
published_at 2026-04-02T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.14011
published_at 2026-04-04T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13813
published_at 2026-04-07T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13896
published_at 2026-04-08T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13948
published_at 2026-04-09T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13905
published_at 2026-04-11T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13869
published_at 2026-04-12T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.1382
published_at 2026-04-13T12:55:00Z
9
value 0.00121
scoring_system epss
scoring_elements 0.31127
published_at 2026-04-21T12:55:00Z
10
value 0.00121
scoring_system epss
scoring_elements 0.31177
published_at 2026-04-16T12:55:00Z
11
value 0.00121
scoring_system epss
scoring_elements 0.31158
published_at 2026-04-18T12:55:00Z
12
value 0.00121
scoring_system epss
scoring_elements 0.30761
published_at 2026-04-29T12:55:00Z
13
value 0.00121
scoring_system epss
scoring_elements 0.30967
published_at 2026-04-24T12:55:00Z
14
value 0.00121
scoring_system epss
scoring_elements 0.30845
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15863
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12829
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12829
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14364
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15863
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16092
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1853725
reference_id 1853725
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1853725
8
reference_url https://security.gentoo.org/glsa/202208-27
reference_id GLSA-202208-27
reference_type
scores
url https://security.gentoo.org/glsa/202208-27
9
reference_url https://usn.ubuntu.com/4467-1/
reference_id USN-4467-1
reference_type
scores
url https://usn.ubuntu.com/4467-1/
fixed_packages
0
url pkg:apk/alpine/qemu@5.1.0-r1?arch=loongarch64&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/qemu@5.1.0-r1?arch=loongarch64&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qemu@5.1.0-r1%3Farch=loongarch64&distroversion=v3.21&reponame=community
aliases CVE-2020-15863
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wdjx-9f36-abgu
9
url VCID-wjxf-kgdw-2kau
vulnerability_id VCID-wjxf-kgdw-2kau
summary Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16092.json
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16092.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-16092
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.11559
published_at 2026-04-01T12:55:00Z
1
value 0.00039
scoring_system epss
scoring_elements 0.11685
published_at 2026-04-02T12:55:00Z
2
value 0.00039
scoring_system epss
scoring_elements 0.11728
published_at 2026-04-04T12:55:00Z
3
value 0.00039
scoring_system epss
scoring_elements 0.11513
published_at 2026-04-07T12:55:00Z
4
value 0.00039
scoring_system epss
scoring_elements 0.116
published_at 2026-04-08T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.1166
published_at 2026-04-09T12:55:00Z
6
value 0.00039
scoring_system epss
scoring_elements 0.11672
published_at 2026-04-11T12:55:00Z
7
value 0.00039
scoring_system epss
scoring_elements 0.11635
published_at 2026-04-12T12:55:00Z
8
value 0.00039
scoring_system epss
scoring_elements 0.11608
published_at 2026-04-13T12:55:00Z
9
value 0.00039
scoring_system epss
scoring_elements 0.1147
published_at 2026-04-16T12:55:00Z
10
value 0.00039
scoring_system epss
scoring_elements 0.11472
published_at 2026-04-18T12:55:00Z
11
value 0.00039
scoring_system epss
scoring_elements 0.11598
published_at 2026-04-21T12:55:00Z
12
value 0.00039
scoring_system epss
scoring_elements 0.11551
published_at 2026-04-24T12:55:00Z
13
value 0.00039
scoring_system epss
scoring_elements 0.11512
published_at 2026-04-26T12:55:00Z
14
value 0.00039
scoring_system epss
scoring_elements 0.1144
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-16092
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12829
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12829
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14364
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15863
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16092
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1860283
reference_id 1860283
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1860283
8
reference_url https://security.gentoo.org/glsa/202208-27
reference_id GLSA-202208-27
reference_type
scores
url https://security.gentoo.org/glsa/202208-27
9
reference_url https://access.redhat.com/errata/RHSA-2020:5111
reference_id RHSA-2020:5111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5111
10
reference_url https://access.redhat.com/errata/RHSA-2021:0346
reference_id RHSA-2021:0346
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0346
11
reference_url https://access.redhat.com/errata/RHSA-2021:0347
reference_id RHSA-2021:0347
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0347
12
reference_url https://access.redhat.com/errata/RHSA-2021:0459
reference_id RHSA-2021:0459
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0459
13
reference_url https://access.redhat.com/errata/RHSA-2021:0934
reference_id RHSA-2021:0934
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0934
14
reference_url https://access.redhat.com/errata/RHSA-2021:1762
reference_id RHSA-2021:1762
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1762
15
reference_url https://usn.ubuntu.com/4467-1/
reference_id USN-4467-1
reference_type
scores
url https://usn.ubuntu.com/4467-1/
fixed_packages
0
url pkg:apk/alpine/qemu@5.1.0-r1?arch=loongarch64&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/qemu@5.1.0-r1?arch=loongarch64&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qemu@5.1.0-r1%3Farch=loongarch64&distroversion=v3.21&reponame=community
aliases CVE-2020-16092
risk_score 1.7
exploitability 0.5
weighted_severity 3.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wjxf-kgdw-2kau
10
url VCID-wm9d-ymbb-sfdc
vulnerability_id VCID-wm9d-ymbb-sfdc
summary QEMU: usb: out-of-bounds r/w access issue
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14364.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14364.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14364
reference_id
reference_type
scores
0
value 0.13903
scoring_system epss
scoring_elements 0.94268
published_at 2026-04-01T12:55:00Z
1
value 0.13903
scoring_system epss
scoring_elements 0.94277
published_at 2026-04-02T12:55:00Z
2
value 0.13903
scoring_system epss
scoring_elements 0.94289
published_at 2026-04-04T12:55:00Z
3
value 0.13903
scoring_system epss
scoring_elements 0.9429
published_at 2026-04-07T12:55:00Z
4
value 0.13903
scoring_system epss
scoring_elements 0.94299
published_at 2026-04-08T12:55:00Z
5
value 0.13903
scoring_system epss
scoring_elements 0.94304
published_at 2026-04-09T12:55:00Z
6
value 0.13903
scoring_system epss
scoring_elements 0.94308
published_at 2026-04-12T12:55:00Z
7
value 0.13903
scoring_system epss
scoring_elements 0.94333
published_at 2026-04-24T12:55:00Z
8
value 0.13903
scoring_system epss
scoring_elements 0.94332
published_at 2026-04-26T12:55:00Z
9
value 0.13903
scoring_system epss
scoring_elements 0.94309
published_at 2026-04-13T12:55:00Z
10
value 0.13903
scoring_system epss
scoring_elements 0.94324
published_at 2026-04-16T12:55:00Z
11
value 0.13903
scoring_system epss
scoring_elements 0.9433
published_at 2026-04-18T12:55:00Z
12
value 0.13903
scoring_system epss
scoring_elements 0.94329
published_at 2026-04-21T12:55:00Z
13
value 0.14223
scoring_system epss
scoring_elements 0.94409
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14364
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12829
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12829
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14364
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15863
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16092
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1869201
reference_id 1869201
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1869201
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968947
reference_id 968947
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968947
9
reference_url https://security.gentoo.org/glsa/202009-14
reference_id GLSA-202009-14
reference_type
scores
url https://security.gentoo.org/glsa/202009-14
10
reference_url https://security.gentoo.org/glsa/202011-09
reference_id GLSA-202011-09
reference_type
scores
url https://security.gentoo.org/glsa/202011-09
11
reference_url https://access.redhat.com/errata/RHSA-2020:4047
reference_id RHSA-2020:4047
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4047
12
reference_url https://access.redhat.com/errata/RHSA-2020:4048
reference_id RHSA-2020:4048
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4048
13
reference_url https://access.redhat.com/errata/RHSA-2020:4049
reference_id RHSA-2020:4049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4049
14
reference_url https://access.redhat.com/errata/RHSA-2020:4050
reference_id RHSA-2020:4050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4050
15
reference_url https://access.redhat.com/errata/RHSA-2020:4051
reference_id RHSA-2020:4051
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4051
16
reference_url https://access.redhat.com/errata/RHSA-2020:4052
reference_id RHSA-2020:4052
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4052
17
reference_url https://access.redhat.com/errata/RHSA-2020:4053
reference_id RHSA-2020:4053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4053
18
reference_url https://access.redhat.com/errata/RHSA-2020:4054
reference_id RHSA-2020:4054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4054
19
reference_url https://access.redhat.com/errata/RHSA-2020:4055
reference_id RHSA-2020:4055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4055
20
reference_url https://access.redhat.com/errata/RHSA-2020:4056
reference_id RHSA-2020:4056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4056
21
reference_url https://access.redhat.com/errata/RHSA-2020:4058
reference_id RHSA-2020:4058
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4058
22
reference_url https://access.redhat.com/errata/RHSA-2020:4059
reference_id RHSA-2020:4059
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4059
23
reference_url https://access.redhat.com/errata/RHSA-2020:4078
reference_id RHSA-2020:4078
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4078
24
reference_url https://access.redhat.com/errata/RHSA-2020:4079
reference_id RHSA-2020:4079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4079
25
reference_url https://access.redhat.com/errata/RHSA-2020:4111
reference_id RHSA-2020:4111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4111
26
reference_url https://access.redhat.com/errata/RHSA-2020:4115
reference_id RHSA-2020:4115
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4115
27
reference_url https://access.redhat.com/errata/RHSA-2020:4162
reference_id RHSA-2020:4162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4162
28
reference_url https://access.redhat.com/errata/RHSA-2020:4167
reference_id RHSA-2020:4167
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4167
29
reference_url https://access.redhat.com/errata/RHSA-2020:4172
reference_id RHSA-2020:4172
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4172
30
reference_url https://access.redhat.com/errata/RHSA-2020:4176
reference_id RHSA-2020:4176
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4176
31
reference_url https://access.redhat.com/errata/RHSA-2020:4290
reference_id RHSA-2020:4290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4290
32
reference_url https://access.redhat.com/errata/RHSA-2020:4291
reference_id RHSA-2020:4291
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4291
33
reference_url https://usn.ubuntu.com/4467-2/
reference_id USN-4467-2
reference_type
scores
url https://usn.ubuntu.com/4467-2/
34
reference_url https://usn.ubuntu.com/4511-1/
reference_id USN-4511-1
reference_type
scores
url https://usn.ubuntu.com/4511-1/
35
reference_url https://xenbits.xen.org/xsa/advisory-335.html
reference_id XSA-335
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-335.html
fixed_packages
0
url pkg:apk/alpine/qemu@5.1.0-r1?arch=loongarch64&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/qemu@5.1.0-r1?arch=loongarch64&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qemu@5.1.0-r1%3Farch=loongarch64&distroversion=v3.21&reponame=community
aliases CVE-2020-14364, XSA-335
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wm9d-ymbb-sfdc
11
url VCID-x8ue-gf65-uket
vulnerability_id VCID-x8ue-gf65-uket
summary QEMU: heap buffer overflow in sdhci_sdma_transfer_multi_blocks() in hw/sd/sdhci.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-17380.json
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-17380.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-17380
reference_id
reference_type
scores
0
value 0.00302
scoring_system epss
scoring_elements 0.53606
published_at 2026-04-11T12:55:00Z
1
value 0.00302
scoring_system epss
scoring_elements 0.53556
published_at 2026-04-09T12:55:00Z
2
value 0.00302
scoring_system epss
scoring_elements 0.53588
published_at 2026-04-12T12:55:00Z
3
value 0.00302
scoring_system epss
scoring_elements 0.53571
published_at 2026-04-13T12:55:00Z
4
value 0.00302
scoring_system epss
scoring_elements 0.53607
published_at 2026-04-16T12:55:00Z
5
value 0.00302
scoring_system epss
scoring_elements 0.53612
published_at 2026-04-18T12:55:00Z
6
value 0.00302
scoring_system epss
scoring_elements 0.53595
published_at 2026-04-21T12:55:00Z
7
value 0.00302
scoring_system epss
scoring_elements 0.53541
published_at 2026-04-04T12:55:00Z
8
value 0.00302
scoring_system epss
scoring_elements 0.53509
published_at 2026-04-07T12:55:00Z
9
value 0.00302
scoring_system epss
scoring_elements 0.5356
published_at 2026-04-08T12:55:00Z
10
value 0.00325
scoring_system epss
scoring_elements 0.55504
published_at 2026-04-02T12:55:00Z
11
value 0.00325
scoring_system epss
scoring_elements 0.55393
published_at 2026-04-01T12:55:00Z
12
value 0.00326
scoring_system epss
scoring_elements 0.5556
published_at 2026-04-26T12:55:00Z
13
value 0.00326
scoring_system epss
scoring_elements 0.55534
published_at 2026-04-29T12:55:00Z
14
value 0.00326
scoring_system epss
scoring_elements 0.55543
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-17380
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17380
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1862167
reference_id 1862167
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1862167
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970937
reference_id 970937
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970937
6
reference_url https://usn.ubuntu.com/4650-1/
reference_id USN-4650-1
reference_type
scores
url https://usn.ubuntu.com/4650-1/
fixed_packages
0
url pkg:apk/alpine/qemu@5.1.0-r1?arch=loongarch64&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/qemu@5.1.0-r1?arch=loongarch64&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qemu@5.1.0-r1%3Farch=loongarch64&distroversion=v3.21&reponame=community
aliases CVE-2020-17380
risk_score 2.5
exploitability 0.5
weighted_severity 5.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x8ue-gf65-uket
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/qemu@5.1.0-r1%3Farch=loongarch64&distroversion=v3.21&reponame=community