{"url":"http://public2.vulnerablecode.io/api/packages/73448?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.3.0-r4","type":"ebuild","namespace":"app-emulation","name":"qemu","version":"2.3.0-r4","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"2.5.0-r1","latest_non_vulnerable_version":"8.0.0","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33682?format=json","vulnerability_id":"VCID-25bh-a224-2kb9","summary":"A heap-based buffer overflow in QEMU could result in execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5158.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5158.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5158","reference_id":"","reference_type":"","scores":[{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23751","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23656","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.2387","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.2399","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.24029","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23815","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23881","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23928","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23944","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.239","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23846","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23858","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23847","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23827","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23709","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23698","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23662","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.2354","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23623","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23691","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23636","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5158"},{"reference_url":"https://lists.nongnu.org/archive/html/qemu-devel/2015-07/msg04558.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.nongnu.org/archive/html/qemu-devel/2015-07/msg04558.html"},{"reference_url":"http://www.securityfocus.com/bid/76016","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/76016"},{"reference_url":"http://www.securitytracker.com/id/1033095","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1033095"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244332","reference_id":"1244332","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244332"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=793388","reference_id":"793388","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=793388"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.4.0:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:2.4.0:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.4.0:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.4.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:2.4.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.4.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.4.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:2.4.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.4.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5158","reference_id":"CVE-2015-5158","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5158"},{"reference_url":"https://security.gentoo.org/glsa/201510-02","reference_id":"GLSA-201510-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201510-02"},{"reference_url":"https://usn.ubuntu.com/2692-1/","reference_id":"USN-2692-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2692-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73448?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.3.0-r4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.3.0-r4"}],"aliases":["CVE-2015-5158"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-25bh-a224-2kb9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33680?format=json","vulnerability_id":"VCID-7gt7-r3j9-cbb3","summary":"A heap-based buffer overflow in QEMU could result in execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3214.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3214.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3214","reference_id":"","reference_type":"","scores":[{"value":"0.01593","scoring_system":"epss","scoring_elements":"0.81596","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01593","scoring_system":"epss","scoring_elements":"0.81607","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01593","scoring_system":"epss","scoring_elements":"0.81628","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01593","scoring_system":"epss","scoring_elements":"0.81626","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01593","scoring_system":"epss","scoring_elements":"0.81653","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01593","scoring_system":"epss","scoring_elements":"0.81658","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01593","scoring_system":"epss","scoring_elements":"0.81678","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01593","scoring_system":"epss","scoring_elements":"0.81665","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01593","scoring_system":"epss","scoring_elements":"0.81697","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01593","scoring_system":"epss","scoring_elements":"0.81701","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01593","scoring_system":"epss","scoring_elements":"0.81725","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01593","scoring_system":"epss","scoring_elements":"0.81734","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01593","scoring_system":"epss","scoring_elements":"0.8174","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01593","scoring_system":"epss","scoring_elements":"0.81758","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01593","scoring_system":"epss","scoring_elements":"0.81779","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01593","scoring_system":"epss","scoring_elements":"0.81803","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01593","scoring_system":"epss","scoring_elements":"0.81799","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01593","scoring_system":"epss","scoring_elements":"0.81817","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01593","scoring_system":"epss","scoring_elements":"0.81858","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3214"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3214","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3214"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5154","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5154"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5165","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5165"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5225","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5225"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5745"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1229640","reference_id":"1229640","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1229640"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795461","reference_id":"795461","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795461"},{"reference_url":"https://code.google.com/p/google-security-research/issues/detail?id=419#c4","reference_id":"CVE-2015-3214;OSVDB-123468","reference_type":"exploit","scores":[],"url":"https://code.google.com/p/google-security-research/issues/detail?id=419#c4"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37990.txt","reference_id":"CVE-2015-3214;OSVDB-123468","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37990.txt"},{"reference_url":"https://security.gentoo.org/glsa/201510-02","reference_id":"GLSA-201510-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201510-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1507","reference_id":"RHSA-2015:1507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1508","reference_id":"RHSA-2015:1508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1512","reference_id":"RHSA-2015:1512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1512"},{"reference_url":"https://usn.ubuntu.com/2692-1/","reference_id":"USN-2692-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2692-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73448?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.3.0-r4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.3.0-r4"}],"aliases":["CVE-2015-3214"],"risk_score":null,"exploitability":"2.0","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7gt7-r3j9-cbb3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4019?format=json","vulnerability_id":"VCID-tagr-5fpf-4bcj","summary":"Heap overflow in QEMU PCNET controller, allowing guest->host escape","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3209.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3209.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3209","reference_id":"","reference_type":"","scores":[{"value":"0.18024","scoring_system":"epss","scoring_elements":"0.95233","published_at":"2026-05-14T12:55:00Z"},{"value":"0.20573","scoring_system":"epss","scoring_elements":"0.95549","published_at":"2026-04-02T12:55:00Z"},{"value":"0.20573","scoring_system":"epss","scoring_elements":"0.95554","published_at":"2026-04-04T12:55:00Z"},{"value":"0.20573","scoring_system":"epss","scoring_elements":"0.95558","published_at":"2026-04-07T12:55:00Z"},{"value":"0.20573","scoring_system":"epss","scoring_elements":"0.95565","published_at":"2026-04-08T12:55:00Z"},{"value":"0.20573","scoring_system":"epss","scoring_elements":"0.95568","published_at":"2026-04-09T12:55:00Z"},{"value":"0.20573","scoring_system":"epss","scoring_elements":"0.95572","published_at":"2026-04-11T12:55:00Z"},{"value":"0.20573","scoring_system":"epss","scoring_elements":"0.95573","published_at":"2026-04-12T12:55:00Z"},{"value":"0.20573","scoring_system":"epss","scoring_elements":"0.95574","published_at":"2026-04-13T12:55:00Z"},{"value":"0.20573","scoring_system":"epss","scoring_elements":"0.95583","published_at":"2026-04-16T12:55:00Z"},{"value":"0.20573","scoring_system":"epss","scoring_elements":"0.9554","published_at":"2026-04-01T12:55:00Z"},{"value":"0.20573","scoring_system":"epss","scoring_elements":"0.95589","published_at":"2026-04-24T12:55:00Z"},{"value":"0.20573","scoring_system":"epss","scoring_elements":"0.95591","published_at":"2026-04-26T12:55:00Z"},{"value":"0.20573","scoring_system":"epss","scoring_elements":"0.9559","published_at":"2026-04-29T12:55:00Z"},{"value":"0.20573","scoring_system":"epss","scoring_elements":"0.95606","published_at":"2026-05-05T12:55:00Z"},{"value":"0.20573","scoring_system":"epss","scoring_elements":"0.9561","published_at":"2026-05-07T12:55:00Z"},{"value":"0.20573","scoring_system":"epss","scoring_elements":"0.95616","published_at":"2026-05-09T12:55:00Z"},{"value":"0.20573","scoring_system":"epss","scoring_elements":"0.95622","published_at":"2026-05-11T12:55:00Z"},{"value":"0.20573","scoring_system":"epss","scoring_elements":"0.95627","published_at":"2026-05-12T12:55:00Z"},{"value":"0.20573","scoring_system":"epss","scoring_elements":"0.95588","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3209"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4037","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4037"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4163","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4163"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1225882","reference_id":"1225882","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1225882"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=788460","reference_id":"788460","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=788460"},{"reference_url":"https://security.gentoo.org/glsa/201510-02","reference_id":"GLSA-201510-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201510-02"},{"reference_url":"https://security.gentoo.org/glsa/201604-03","reference_id":"GLSA-201604-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201604-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1087","reference_id":"RHSA-2015:1087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1087"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1088","reference_id":"RHSA-2015:1088","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1088"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1089","reference_id":"RHSA-2015:1089","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1089"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1189","reference_id":"RHSA-2015:1189","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1189"},{"reference_url":"https://usn.ubuntu.com/2630-1/","reference_id":"USN-2630-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2630-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-135.html","reference_id":"XSA-135","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-135.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73448?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.3.0-r4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.3.0-r4"}],"aliases":["CVE-2015-3209"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tagr-5fpf-4bcj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4022?format=json","vulnerability_id":"VCID-uyct-zk7n-sbcz","summary":"QEMU heap overflow flaw while processing certain ATAPI commands.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5154.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5154.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5154","reference_id":"","reference_type":"","scores":[{"value":"0.00388","scoring_system":"epss","scoring_elements":"0.59753","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00388","scoring_system":"epss","scoring_elements":"0.59827","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00388","scoring_system":"epss","scoring_elements":"0.59851","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00388","scoring_system":"epss","scoring_elements":"0.59821","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00388","scoring_system":"epss","scoring_elements":"0.59872","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00388","scoring_system":"epss","scoring_elements":"0.59885","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00388","scoring_system":"epss","scoring_elements":"0.59906","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00388","scoring_system":"epss","scoring_elements":"0.59891","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00388","scoring_system":"epss","scoring_elements":"0.5991","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00388","scoring_system":"epss","scoring_elements":"0.59917","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00388","scoring_system":"epss","scoring_elements":"0.59903","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00388","scoring_system":"epss","scoring_elements":"0.59874","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00388","scoring_system":"epss","scoring_elements":"0.59892","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00388","scoring_system":"epss","scoring_elements":"0.5988","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00388","scoring_system":"epss","scoring_elements":"0.59841","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00388","scoring_system":"epss","scoring_elements":"0.59888","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00388","scoring_system":"epss","scoring_elements":"0.59945","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00388","scoring_system":"epss","scoring_elements":"0.59902","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00388","scoring_system":"epss","scoring_elements":"0.59928","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00388","scoring_system":"epss","scoring_elements":"0.59992","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5154"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3214","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3214"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5154","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5154"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5165","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5165"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5225","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5225"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5745"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1243563","reference_id":"1243563","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1243563"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=793811","reference_id":"793811","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=793811"},{"reference_url":"https://security.gentoo.org/glsa/201510-02","reference_id":"GLSA-201510-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201510-02"},{"reference_url":"https://security.gentoo.org/glsa/201604-03","reference_id":"GLSA-201604-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201604-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1507","reference_id":"RHSA-2015:1507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1508","reference_id":"RHSA-2015:1508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1512","reference_id":"RHSA-2015:1512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1512"},{"reference_url":"https://usn.ubuntu.com/2692-1/","reference_id":"USN-2692-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2692-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-138.html","reference_id":"XSA-138","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-138.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73448?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.3.0-r4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.3.0-r4"}],"aliases":["CVE-2015-5154"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uyct-zk7n-sbcz"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.3.0-r4"}