{"url":"http://public2.vulnerablecode.io/api/packages/71795?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.8.0-r9","type":"ebuild","namespace":"app-emulation","name":"qemu","version":"2.8.0-r9","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"2.9.0-r2","latest_non_vulnerable_version":"8.0.0","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31110?format=json","vulnerability_id":"VCID-5t1j-7uf3-gyde","summary":"Multiple vulnerabilities have been found in QEMU, the worst of\n    which could the worst of which could lead to arbitrary code execution, or\n    cause a Denial of Service condition.","references":[{"reference_url":"http://git.qemu-project.org/?p=qemu.git%3Ba=commit%3Bh=df8bf7a7fe75eb5d5caffa55f5cd4292b757aea6","reference_id":"","reference_type":"","scores":[],"url":"http://git.qemu-project.org/?p=qemu.git%3Ba=commit%3Bh=df8bf7a7fe75eb5d5caffa55f5cd4292b757aea6"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6058.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6058.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-6058","reference_id":"","reference_type":"","scores":[{"value":"0.03408","scoring_system":"epss","scoring_elements":"0.87379","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03408","scoring_system":"epss","scoring_elements":"0.87469","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03408","scoring_system":"epss","scoring_elements":"0.87446","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03408","scoring_system":"epss","scoring_elements":"0.87462","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03408","scoring_system":"epss","scoring_elements":"0.87389","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03408","scoring_system":"epss","scoring_elements":"0.87404","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03408","scoring_system":"epss","scoring_elements":"0.87403","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03408","scoring_system":"epss","scoring_elements":"0.87422","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03408","scoring_system":"epss","scoring_elements":"0.87429","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03408","scoring_system":"epss","scoring_elements":"0.87441","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03408","scoring_system":"epss","scoring_elements":"0.87436","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03408","scoring_system":"epss","scoring_elements":"0.87432","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03408","scoring_system":"epss","scoring_elements":"0.87447","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03408","scoring_system":"epss","scoring_elements":"0.87449","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-6058"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6058","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6058"},{"reference_url":"https://lists.nongnu.org/archive/html/qemu-devel/2017-02/msg03527.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.nongnu.org/archive/html/qemu-devel/2017-02/msg03527.html"},{"reference_url":"http://www.openwall.com/lists/oss-security/2017/02/17/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2017/02/17/2"},{"reference_url":"http://www.securityfocus.com/bid/96277","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/96277"},{"reference_url":"http://www.securitytracker.com/id/1037856","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1037856"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1423358","reference_id":"1423358","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1423358"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=855616","reference_id":"855616","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=855616"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-6058","reference_id":"CVE-2017-6058","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-6058"},{"reference_url":"https://security.gentoo.org/glsa/201704-01","reference_id":"GLSA-201704-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201704-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71795?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.8.0-r9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.8.0-r9"}],"aliases":["CVE-2017-6058"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5t1j-7uf3-gyde"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4092?format=json","vulnerability_id":"VCID-aeh3-vzax-jqfh","summary":"cirrus_bitblt_cputovideo does not check if memory region is safe","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2620.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2620.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2620","reference_id":"","reference_type":"","scores":[{"value":"0.0241","scoring_system":"epss","scoring_elements":"0.85019","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0241","scoring_system":"epss","scoring_elements":"0.85031","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0241","scoring_system":"epss","scoring_elements":"0.85048","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0241","scoring_system":"epss","scoring_elements":"0.85053","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0241","scoring_system":"epss","scoring_elements":"0.85075","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0241","scoring_system":"epss","scoring_elements":"0.85082","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0241","scoring_system":"epss","scoring_elements":"0.85099","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0241","scoring_system":"epss","scoring_elements":"0.85097","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0241","scoring_system":"epss","scoring_elements":"0.85093","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0241","scoring_system":"epss","scoring_elements":"0.85115","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0241","scoring_system":"epss","scoring_elements":"0.85117","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0241","scoring_system":"epss","scoring_elements":"0.85138","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0241","scoring_system":"epss","scoring_elements":"0.85147","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0241","scoring_system":"epss","scoring_elements":"0.85144","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2620"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:M/Au:S/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1420484","reference_id":"1420484","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1420484"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=855791","reference_id":"855791","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=855791"},{"reference_url":"https://security.gentoo.org/glsa/201703-07","reference_id":"GLSA-201703-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201703-07"},{"reference_url":"https://security.gentoo.org/glsa/201704-01","reference_id":"GLSA-201704-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201704-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0328","reference_id":"RHSA-2017:0328","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0328"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0329","reference_id":"RHSA-2017:0329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0330","reference_id":"RHSA-2017:0330","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0330"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0331","reference_id":"RHSA-2017:0331","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0331"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0332","reference_id":"RHSA-2017:0332","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0332"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0333","reference_id":"RHSA-2017:0333","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0333"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0334","reference_id":"RHSA-2017:0334","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0334"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0350","reference_id":"RHSA-2017:0350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0351","reference_id":"RHSA-2017:0351","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0352","reference_id":"RHSA-2017:0352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0396","reference_id":"RHSA-2017:0396","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0396"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0454","reference_id":"RHSA-2017:0454","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0454"},{"reference_url":"https://usn.ubuntu.com/3261-1/","reference_id":"USN-3261-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3261-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-209.html","reference_id":"XSA-209","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-209.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71795?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.8.0-r9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.8.0-r9"}],"aliases":["CVE-2017-2620","XSA-209"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-aeh3-vzax-jqfh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31106?format=json","vulnerability_id":"VCID-e1j4-fhej-23hp","summary":"Multiple vulnerabilities have been found in QEMU, the worst of\n    which could the worst of which could lead to arbitrary code execution, or\n    cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2630.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2630.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2630","reference_id":"","reference_type":"","scores":[{"value":"0.01134","scoring_system":"epss","scoring_elements":"0.78294","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01134","scoring_system":"epss","scoring_elements":"0.78301","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01134","scoring_system":"epss","scoring_elements":"0.78332","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01134","scoring_system":"epss","scoring_elements":"0.78314","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01134","scoring_system":"epss","scoring_elements":"0.7834","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01134","scoring_system":"epss","scoring_elements":"0.78346","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01134","scoring_system":"epss","scoring_elements":"0.78373","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01134","scoring_system":"epss","scoring_elements":"0.78355","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01134","scoring_system":"epss","scoring_elements":"0.78348","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01134","scoring_system":"epss","scoring_elements":"0.78377","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01134","scoring_system":"epss","scoring_elements":"0.78376","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01134","scoring_system":"epss","scoring_elements":"0.78407","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01134","scoring_system":"epss","scoring_elements":"0.78415","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01134","scoring_system":"epss","scoring_elements":"0.78431","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2630"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2630","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2630"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1422415","reference_id":"1422415","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1422415"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=855227","reference_id":"855227","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=855227"},{"reference_url":"https://security.gentoo.org/glsa/201704-01","reference_id":"GLSA-201704-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201704-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2392","reference_id":"RHSA-2017:2392","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2392"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71795?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.8.0-r9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.8.0-r9"}],"aliases":["CVE-2017-2630"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e1j4-fhej-23hp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31108?format=json","vulnerability_id":"VCID-ecu9-p9zb-dugs","summary":"Multiple vulnerabilities have been found in QEMU, the worst of\n    which could the worst of which could lead to arbitrary code execution, or\n    cause a Denial of Service condition.","references":[{"reference_url":"http://git.qemu-project.org/?p=qemu.git%3Ba=commit%3Bh=6e86d90352adf6cb08295255220295cf23c4286e","reference_id":"","reference_type":"","scores":[],"url":"http://git.qemu-project.org/?p=qemu.git%3Ba=commit%3Bh=6e86d90352adf6cb08295255220295cf23c4286e"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5987.json","reference_id":"","reference_type":"","scores":[{"value":"3.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5987.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5987","reference_id":"","reference_type":"","scores":[{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20329","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.2015","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20311","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.2019","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20184","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20471","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20531","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20255","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20336","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20394","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20424","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20379","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20323","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20312","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20314","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5987"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5987","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5987"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.5","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html"},{"reference_url":"https://lists.gnu.org/archive/html/qemu-devel/2017-02/msg02776.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.gnu.org/archive/html/qemu-devel/2017-02/msg02776.html"},{"reference_url":"http://www.openwall.com/lists/oss-security/2017/02/14/8","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2017/02/14/8"},{"reference_url":"http://www.securityfocus.com/bid/96263","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/96263"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1421995","reference_id":"1421995","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1421995"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=855159","reference_id":"855159","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=855159"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.9.0:rc0:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:2.9.0:rc0:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.9.0:rc0:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.9.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:2.9.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.9.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.9.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:2.9.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.9.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.9.0:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:2.9.0:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.9.0:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.9.0:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:2.9.0:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.9.0:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5987","reference_id":"CVE-2017-5987","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5987"},{"reference_url":"https://security.gentoo.org/glsa/201704-01","reference_id":"GLSA-201704-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201704-01"},{"reference_url":"https://usn.ubuntu.com/3261-1/","reference_id":"USN-3261-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3261-1/"},{"reference_url":"https://usn.ubuntu.com/3268-1/","reference_id":"USN-3268-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3268-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71795?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.8.0-r9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.8.0-r9"}],"aliases":["CVE-2017-5987"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ecu9-p9zb-dugs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31104?format=json","vulnerability_id":"VCID-eu39-te5g-dyf9","summary":"Multiple vulnerabilities have been found in QEMU, the worst of\n    which could the worst of which could lead to arbitrary code execution, or\n    cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9602.json","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9602.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9602","reference_id":"","reference_type":"","scores":[{"value":"0.01302","scoring_system":"epss","scoring_elements":"0.79692","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01302","scoring_system":"epss","scoring_elements":"0.79824","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01302","scoring_system":"epss","scoring_elements":"0.79769","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01302","scoring_system":"epss","scoring_elements":"0.79773","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01302","scoring_system":"epss","scoring_elements":"0.79802","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01302","scoring_system":"epss","scoring_elements":"0.79809","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01302","scoring_system":"epss","scoring_elements":"0.79699","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01302","scoring_system":"epss","scoring_elements":"0.7972","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01302","scoring_system":"epss","scoring_elements":"0.79705","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01302","scoring_system":"epss","scoring_elements":"0.79734","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01302","scoring_system":"epss","scoring_elements":"0.79741","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01302","scoring_system":"epss","scoring_elements":"0.79762","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01302","scoring_system":"epss","scoring_elements":"0.79747","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01302","scoring_system":"epss","scoring_elements":"0.7974","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01302","scoring_system":"epss","scoring_elements":"0.79768","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9602"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9602","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9602"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html"},{"reference_url":"https://lists.gnu.org/archive/html/qemu-devel/2017-01/msg06225.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.gnu.org/archive/html/qemu-devel/2017-01/msg06225.html"},{"reference_url":"https://lists.gnu.org/archive/html/qemu-devel/2017-02/msg04347.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.gnu.org/archive/html/qemu-devel/2017-02/msg04347.html"},{"reference_url":"http://www.openwall.com/lists/oss-security/2017/01/17/12","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2017/01/17/12"},{"reference_url":"http://www.securityfocus.com/bid/95461","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/95461"},{"reference_url":"http://www.securitytracker.com/id/1037604","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1037604"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413929","reference_id":"1413929","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413929"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=853006","reference_id":"853006","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=853006"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-9602","reference_id":"CVE-2016-9602","reference_type":"","scores":[{"value":"9.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:C/I:C/A:C"},{"value":"7.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-9602"},{"reference_url":"https://security.gentoo.org/glsa/201704-01","reference_id":"GLSA-201704-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201704-01"},{"reference_url":"https://usn.ubuntu.com/3261-1/","reference_id":"USN-3261-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3261-1/"},{"reference_url":"https://usn.ubuntu.com/3268-1/","reference_id":"USN-3268-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3268-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71795?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.8.0-r9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.8.0-r9"}],"aliases":["CVE-2016-9602"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eu39-te5g-dyf9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31107?format=json","vulnerability_id":"VCID-gagc-4hh8-hkhb","summary":"Multiple vulnerabilities have been found in QEMU, the worst of\n    which could the worst of which could lead to arbitrary code execution, or\n    cause a Denial of Service condition.","references":[{"reference_url":"http://git.qemu-project.org/?p=qemu.git%3Ba=commit%3Bh=f89b60f6e5fee3923bedf80e82b4e5efc1bb156b","reference_id":"","reference_type":"","scores":[],"url":"http://git.qemu-project.org/?p=qemu.git%3Ba=commit%3Bh=f89b60f6e5fee3923bedf80e82b4e5efc1bb156b"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5973.json","reference_id":"","reference_type":"","scores":[{"value":"3.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5973.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5973","reference_id":"","reference_type":"","scores":[{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26386","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26095","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26224","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26149","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26146","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26437","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26481","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26256","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26323","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26375","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26384","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26338","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26279","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.2626","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5973"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5973","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5973"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.3","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:M/Au:S/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html"},{"reference_url":"https://lists.gnu.org/archive/html/qemu-devel/2017-02/msg01101.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.gnu.org/archive/html/qemu-devel/2017-02/msg01101.html"},{"reference_url":"http://www.openwall.com/lists/oss-security/2017/02/13/11","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2017/02/13/11"},{"reference_url":"http://www.securityfocus.com/bid/96220","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/96220"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1421626","reference_id":"1421626","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1421626"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=855611","reference_id":"855611","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=855611"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:openstack:11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5973","reference_id":"CVE-2017-5973","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5973"},{"reference_url":"https://security.gentoo.org/glsa/201704-01","reference_id":"GLSA-201704-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201704-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2392","reference_id":"RHSA-2017:2392","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2392"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2408","reference_id":"RHSA-2017:2408","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2408"},{"reference_url":"https://usn.ubuntu.com/3261-1/","reference_id":"USN-3261-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3261-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71795?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.8.0-r9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.8.0-r9"}],"aliases":["CVE-2017-5973"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gagc-4hh8-hkhb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31111?format=json","vulnerability_id":"VCID-mvy2-32gt-nbhg","summary":"Multiple vulnerabilities have been found in QEMU, the worst of\n    which could the worst of which could lead to arbitrary code execution, or\n    cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6505.json","reference_id":"","reference_type":"","scores":[{"value":"3.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6505.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-6505","reference_id":"","reference_type":"","scores":[{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29535","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29602","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29651","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29472","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29573","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29575","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.2953","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30445","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30834","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30865","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30845","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3081","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30645","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30529","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-6505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6505"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.5","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1429432","reference_id":"1429432","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1429432"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856969","reference_id":"856969","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856969"},{"reference_url":"https://security.gentoo.org/glsa/201704-01","reference_id":"GLSA-201704-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201704-01"},{"reference_url":"https://usn.ubuntu.com/3261-1/","reference_id":"USN-3261-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3261-1/"},{"reference_url":"https://usn.ubuntu.com/3268-1/","reference_id":"USN-3268-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3268-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71795?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.8.0-r9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.8.0-r9"}],"aliases":["CVE-2017-6505"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mvy2-32gt-nbhg"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.8.0-r9"}