Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/app-emulation/qemu@2.7.0-r3
Typeebuild
Namespaceapp-emulation
Nameqemu
Version2.7.0-r3
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.7.0-r6
Latest_non_vulnerable_version8.0.0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-2zu7-zb7a-bqfq
vulnerability_id VCID-2zu7-zb7a-bqfq
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4439.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4439.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4439
reference_id
reference_type
scores
0
value 0.00228
scoring_system epss
scoring_elements 0.45359
published_at 2026-05-07T12:55:00Z
1
value 0.00228
scoring_system epss
scoring_elements 0.45535
published_at 2026-04-12T12:55:00Z
2
value 0.00228
scoring_system epss
scoring_elements 0.45541
published_at 2026-04-13T12:55:00Z
3
value 0.00228
scoring_system epss
scoring_elements 0.45589
published_at 2026-04-16T12:55:00Z
4
value 0.00228
scoring_system epss
scoring_elements 0.45586
published_at 2026-04-18T12:55:00Z
5
value 0.00228
scoring_system epss
scoring_elements 0.45537
published_at 2026-04-21T12:55:00Z
6
value 0.00228
scoring_system epss
scoring_elements 0.4545
published_at 2026-04-24T12:55:00Z
7
value 0.00228
scoring_system epss
scoring_elements 0.45459
published_at 2026-04-26T12:55:00Z
8
value 0.00228
scoring_system epss
scoring_elements 0.45398
published_at 2026-04-29T12:55:00Z
9
value 0.00228
scoring_system epss
scoring_elements 0.45294
published_at 2026-05-05T12:55:00Z
10
value 0.00228
scoring_system epss
scoring_elements 0.45566
published_at 2026-04-11T12:55:00Z
11
value 0.00309
scoring_system epss
scoring_elements 0.54014
published_at 2026-04-01T12:55:00Z
12
value 0.00309
scoring_system epss
scoring_elements 0.54035
published_at 2026-04-07T12:55:00Z
13
value 0.00309
scoring_system epss
scoring_elements 0.54086
published_at 2026-04-08T12:55:00Z
14
value 0.00309
scoring_system epss
scoring_elements 0.54084
published_at 2026-04-09T12:55:00Z
15
value 0.00309
scoring_system epss
scoring_elements 0.54032
published_at 2026-04-02T12:55:00Z
16
value 0.00309
scoring_system epss
scoring_elements 0.54058
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4439
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4439
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4439
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
5
reference_url https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03273.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03273.html
6
reference_url http://www.openwall.com/lists/oss-security/2016/05/19/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/05/19/3
7
reference_url http://www.securityfocus.com/bid/90760
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/90760
8
reference_url http://www.ubuntu.com/usn/USN-3047-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3047-1
9
reference_url http://www.ubuntu.com/usn/USN-3047-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3047-2
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1337502
reference_id 1337502
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1337502
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=824856
reference_id 824856
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=824856
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-4439
reference_id CVE-2016-4439
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-4439
18
reference_url https://security.gentoo.org/glsa/201609-01
reference_id GLSA-201609-01
reference_type
scores
url https://security.gentoo.org/glsa/201609-01
19
reference_url https://usn.ubuntu.com/3047-1/
reference_id USN-3047-1
reference_type
scores
url https://usn.ubuntu.com/3047-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.7.0-r3
purl pkg:ebuild/app-emulation/qemu@2.7.0-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r3
aliases CVE-2016-4439
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2zu7-zb7a-bqfq
1
url VCID-6gwe-z5t5-7ff3
vulnerability_id VCID-6gwe-z5t5-7ff3
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5106.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5106.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5106
reference_id
reference_type
scores
0
value 0.00064
scoring_system epss
scoring_elements 0.19828
published_at 2026-05-07T12:55:00Z
1
value 0.00064
scoring_system epss
scoring_elements 0.20026
published_at 2026-04-01T12:55:00Z
2
value 0.00064
scoring_system epss
scoring_elements 0.20172
published_at 2026-04-02T12:55:00Z
3
value 0.00064
scoring_system epss
scoring_elements 0.2023
published_at 2026-04-04T12:55:00Z
4
value 0.00064
scoring_system epss
scoring_elements 0.19956
published_at 2026-04-07T12:55:00Z
5
value 0.00064
scoring_system epss
scoring_elements 0.20036
published_at 2026-04-08T12:55:00Z
6
value 0.00064
scoring_system epss
scoring_elements 0.20095
published_at 2026-04-09T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.20113
published_at 2026-04-11T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.20068
published_at 2026-04-12T12:55:00Z
9
value 0.00064
scoring_system epss
scoring_elements 0.2001
published_at 2026-04-13T12:55:00Z
10
value 0.00064
scoring_system epss
scoring_elements 0.19992
published_at 2026-04-16T12:55:00Z
11
value 0.00064
scoring_system epss
scoring_elements 0.19995
published_at 2026-04-18T12:55:00Z
12
value 0.00064
scoring_system epss
scoring_elements 0.1999
published_at 2026-04-21T12:55:00Z
13
value 0.00064
scoring_system epss
scoring_elements 0.1988
published_at 2026-04-24T12:55:00Z
14
value 0.00064
scoring_system epss
scoring_elements 0.19875
published_at 2026-04-26T12:55:00Z
15
value 0.00064
scoring_system epss
scoring_elements 0.19845
published_at 2026-04-29T12:55:00Z
16
value 0.00064
scoring_system epss
scoring_elements 0.19748
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5106
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5106
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5106
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:N/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1339578
reference_id 1339578
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1339578
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=825615
reference_id 825615
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=825615
6
reference_url https://security.gentoo.org/glsa/201609-01
reference_id GLSA-201609-01
reference_type
scores
url https://security.gentoo.org/glsa/201609-01
7
reference_url https://usn.ubuntu.com/3047-1/
reference_id USN-3047-1
reference_type
scores
url https://usn.ubuntu.com/3047-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.7.0-r3
purl pkg:ebuild/app-emulation/qemu@2.7.0-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r3
aliases CVE-2016-5106
risk_score 0.8
exploitability 0.5
weighted_severity 1.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6gwe-z5t5-7ff3
2
url VCID-6me7-srq7-6bfd
vulnerability_id VCID-6me7-srq7-6bfd
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7116.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7116.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7116
reference_id
reference_type
scores
0
value 0.00861
scoring_system epss
scoring_elements 0.74999
published_at 2026-04-01T12:55:00Z
1
value 0.00861
scoring_system epss
scoring_elements 0.75002
published_at 2026-04-02T12:55:00Z
2
value 0.00861
scoring_system epss
scoring_elements 0.75031
published_at 2026-04-04T12:55:00Z
3
value 0.00861
scoring_system epss
scoring_elements 0.75007
published_at 2026-04-07T12:55:00Z
4
value 0.00861
scoring_system epss
scoring_elements 0.75041
published_at 2026-04-08T12:55:00Z
5
value 0.00861
scoring_system epss
scoring_elements 0.75053
published_at 2026-04-09T12:55:00Z
6
value 0.00861
scoring_system epss
scoring_elements 0.75075
published_at 2026-04-11T12:55:00Z
7
value 0.00861
scoring_system epss
scoring_elements 0.75054
published_at 2026-04-12T12:55:00Z
8
value 0.00861
scoring_system epss
scoring_elements 0.75043
published_at 2026-04-13T12:55:00Z
9
value 0.00861
scoring_system epss
scoring_elements 0.7508
published_at 2026-04-16T12:55:00Z
10
value 0.00861
scoring_system epss
scoring_elements 0.75088
published_at 2026-04-18T12:55:00Z
11
value 0.00861
scoring_system epss
scoring_elements 0.75078
published_at 2026-04-21T12:55:00Z
12
value 0.00861
scoring_system epss
scoring_elements 0.75116
published_at 2026-04-24T12:55:00Z
13
value 0.00861
scoring_system epss
scoring_elements 0.75121
published_at 2026-04-26T12:55:00Z
14
value 0.00861
scoring_system epss
scoring_elements 0.75124
published_at 2026-04-29T12:55:00Z
15
value 0.00861
scoring_system epss
scoring_elements 0.75133
published_at 2026-05-05T12:55:00Z
16
value 0.00861
scoring_system epss
scoring_elements 0.7516
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7116
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7116
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:S/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1346349
reference_id 1346349
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1346349
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=836502
reference_id 836502
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=836502
6
reference_url https://security.gentoo.org/glsa/201609-01
reference_id GLSA-201609-01
reference_type
scores
url https://security.gentoo.org/glsa/201609-01
7
reference_url https://usn.ubuntu.com/3125-1/
reference_id USN-3125-1
reference_type
scores
url https://usn.ubuntu.com/3125-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.7.0-r3
purl pkg:ebuild/app-emulation/qemu@2.7.0-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r3
aliases CVE-2016-7116
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6me7-srq7-6bfd
3
url VCID-7kwv-37jf-sfe9
vulnerability_id VCID-7kwv-37jf-sfe9
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7421.json
reference_id
reference_type
scores
0
value 3.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7421.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7421
reference_id
reference_type
scores
0
value 0.00111
scoring_system epss
scoring_elements 0.29517
published_at 2026-04-08T12:55:00Z
1
value 0.00111
scoring_system epss
scoring_elements 0.29584
published_at 2026-04-02T12:55:00Z
2
value 0.00111
scoring_system epss
scoring_elements 0.29633
published_at 2026-04-04T12:55:00Z
3
value 0.00111
scoring_system epss
scoring_elements 0.29455
published_at 2026-04-07T12:55:00Z
4
value 0.00111
scoring_system epss
scoring_elements 0.29557
published_at 2026-04-09T12:55:00Z
5
value 0.00111
scoring_system epss
scoring_elements 0.29559
published_at 2026-04-11T12:55:00Z
6
value 0.00111
scoring_system epss
scoring_elements 0.29514
published_at 2026-04-12T12:55:00Z
7
value 0.00111
scoring_system epss
scoring_elements 0.29462
published_at 2026-04-13T12:55:00Z
8
value 0.00111
scoring_system epss
scoring_elements 0.29481
published_at 2026-04-16T12:55:00Z
9
value 0.00111
scoring_system epss
scoring_elements 0.29453
published_at 2026-04-18T12:55:00Z
10
value 0.00111
scoring_system epss
scoring_elements 0.29407
published_at 2026-04-21T12:55:00Z
11
value 0.00111
scoring_system epss
scoring_elements 0.29291
published_at 2026-04-24T12:55:00Z
12
value 0.00111
scoring_system epss
scoring_elements 0.29179
published_at 2026-04-26T12:55:00Z
13
value 0.00111
scoring_system epss
scoring_elements 0.29113
published_at 2026-04-29T12:55:00Z
14
value 0.00111
scoring_system epss
scoring_elements 0.28965
published_at 2026-05-05T12:55:00Z
15
value 0.00111
scoring_system epss
scoring_elements 0.29027
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7421
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7421
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.5
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1376731
reference_id 1376731
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1376731
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838147
reference_id 838147
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838147
6
reference_url https://security.gentoo.org/glsa/201609-01
reference_id GLSA-201609-01
reference_type
scores
url https://security.gentoo.org/glsa/201609-01
7
reference_url https://usn.ubuntu.com/3125-1/
reference_id USN-3125-1
reference_type
scores
url https://usn.ubuntu.com/3125-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.7.0-r3
purl pkg:ebuild/app-emulation/qemu@2.7.0-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r3
aliases CVE-2016-7421
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7kwv-37jf-sfe9
4
url VCID-999y-j12v-97eu
vulnerability_id VCID-999y-j12v-97eu
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6888.json
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6888.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6888
reference_id
reference_type
scores
0
value 0.00098
scoring_system epss
scoring_elements 0.27057
published_at 2026-04-01T12:55:00Z
1
value 0.00098
scoring_system epss
scoring_elements 0.27097
published_at 2026-04-02T12:55:00Z
2
value 0.00098
scoring_system epss
scoring_elements 0.27133
published_at 2026-04-04T12:55:00Z
3
value 0.00098
scoring_system epss
scoring_elements 0.26925
published_at 2026-04-18T12:55:00Z
4
value 0.00098
scoring_system epss
scoring_elements 0.26993
published_at 2026-04-08T12:55:00Z
5
value 0.00098
scoring_system epss
scoring_elements 0.27039
published_at 2026-04-09T12:55:00Z
6
value 0.00098
scoring_system epss
scoring_elements 0.27042
published_at 2026-04-11T12:55:00Z
7
value 0.00098
scoring_system epss
scoring_elements 0.26998
published_at 2026-04-12T12:55:00Z
8
value 0.00098
scoring_system epss
scoring_elements 0.26941
published_at 2026-04-13T12:55:00Z
9
value 0.00098
scoring_system epss
scoring_elements 0.26951
published_at 2026-04-16T12:55:00Z
10
value 0.00098
scoring_system epss
scoring_elements 0.2689
published_at 2026-04-21T12:55:00Z
11
value 0.00098
scoring_system epss
scoring_elements 0.26842
published_at 2026-04-24T12:55:00Z
12
value 0.00098
scoring_system epss
scoring_elements 0.26835
published_at 2026-04-26T12:55:00Z
13
value 0.00098
scoring_system epss
scoring_elements 0.26769
published_at 2026-04-29T12:55:00Z
14
value 0.00098
scoring_system epss
scoring_elements 0.26621
published_at 2026-05-05T12:55:00Z
15
value 0.00098
scoring_system epss
scoring_elements 0.26689
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6888
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6888
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.5
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1369031
reference_id 1369031
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1369031
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834902
reference_id 834902
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834902
6
reference_url https://security.gentoo.org/glsa/201609-01
reference_id GLSA-201609-01
reference_type
scores
url https://security.gentoo.org/glsa/201609-01
7
reference_url https://access.redhat.com/errata/RHSA-2017:2392
reference_id RHSA-2017:2392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2392
8
reference_url https://access.redhat.com/errata/RHSA-2017:2408
reference_id RHSA-2017:2408
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2408
9
reference_url https://usn.ubuntu.com/3125-1/
reference_id USN-3125-1
reference_type
scores
url https://usn.ubuntu.com/3125-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.7.0-r3
purl pkg:ebuild/app-emulation/qemu@2.7.0-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r3
aliases CVE-2016-6888
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-999y-j12v-97eu
5
url VCID-9y9j-84tz-fbfy
vulnerability_id VCID-9y9j-84tz-fbfy
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183275.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183275.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183350.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183350.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184209.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184209.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4002.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4002.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4002
reference_id
reference_type
scores
0
value 0.11969
scoring_system epss
scoring_elements 0.93812
published_at 2026-05-07T12:55:00Z
1
value 0.11969
scoring_system epss
scoring_elements 0.93792
published_at 2026-04-29T12:55:00Z
2
value 0.11969
scoring_system epss
scoring_elements 0.93802
published_at 2026-05-05T12:55:00Z
3
value 0.11969
scoring_system epss
scoring_elements 0.93724
published_at 2026-04-01T12:55:00Z
4
value 0.11969
scoring_system epss
scoring_elements 0.93733
published_at 2026-04-02T12:55:00Z
5
value 0.11969
scoring_system epss
scoring_elements 0.93743
published_at 2026-04-04T12:55:00Z
6
value 0.11969
scoring_system epss
scoring_elements 0.93746
published_at 2026-04-07T12:55:00Z
7
value 0.11969
scoring_system epss
scoring_elements 0.93755
published_at 2026-04-08T12:55:00Z
8
value 0.11969
scoring_system epss
scoring_elements 0.93758
published_at 2026-04-09T12:55:00Z
9
value 0.11969
scoring_system epss
scoring_elements 0.93762
published_at 2026-04-12T12:55:00Z
10
value 0.11969
scoring_system epss
scoring_elements 0.93763
published_at 2026-04-13T12:55:00Z
11
value 0.11969
scoring_system epss
scoring_elements 0.93785
published_at 2026-04-16T12:55:00Z
12
value 0.11969
scoring_system epss
scoring_elements 0.9379
published_at 2026-04-18T12:55:00Z
13
value 0.11969
scoring_system epss
scoring_elements 0.93793
published_at 2026-04-21T12:55:00Z
14
value 0.11969
scoring_system epss
scoring_elements 0.93797
published_at 2026-04-24T12:55:00Z
15
value 0.11969
scoring_system epss
scoring_elements 0.93794
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4002
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4002
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
8
reference_url https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01131.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01131.html
9
reference_url http://www.openwall.com/lists/oss-security/2016/04/11/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/04/11/6
10
reference_url http://www.openwall.com/lists/oss-security/2016/04/12/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/04/12/7
11
reference_url http://www.securityfocus.com/bid/85992
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/85992
12
reference_url http://www.ubuntu.com/usn/USN-2974-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2974-1
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1326082
reference_id 1326082
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1326082
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=821061
reference_id 821061
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=821061
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-4002
reference_id CVE-2016-4002
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-4002
25
reference_url https://security.gentoo.org/glsa/201609-01
reference_id GLSA-201609-01
reference_type
scores
url https://security.gentoo.org/glsa/201609-01
26
reference_url https://usn.ubuntu.com/2974-1/
reference_id USN-2974-1
reference_type
scores
url https://usn.ubuntu.com/2974-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.7.0-r3
purl pkg:ebuild/app-emulation/qemu@2.7.0-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r3
aliases CVE-2016-4002
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9y9j-84tz-fbfy
6
url VCID-9zeb-77t6-57cx
vulnerability_id VCID-9zeb-77t6-57cx
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=3a15cc0e1ee7168db0782133d2607a6bfa422d66
reference_id
reference_type
scores
url http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=3a15cc0e1ee7168db0782133d2607a6bfa422d66
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183275.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183275.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183350.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183350.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184209.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184209.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4001.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4001.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4001
reference_id
reference_type
scores
0
value 0.09366
scoring_system epss
scoring_elements 0.92815
published_at 2026-05-07T12:55:00Z
1
value 0.09366
scoring_system epss
scoring_elements 0.92792
published_at 2026-04-29T12:55:00Z
2
value 0.09366
scoring_system epss
scoring_elements 0.92802
published_at 2026-05-05T12:55:00Z
3
value 0.09366
scoring_system epss
scoring_elements 0.92748
published_at 2026-04-01T12:55:00Z
4
value 0.09366
scoring_system epss
scoring_elements 0.92754
published_at 2026-04-02T12:55:00Z
5
value 0.09366
scoring_system epss
scoring_elements 0.92759
published_at 2026-04-04T12:55:00Z
6
value 0.09366
scoring_system epss
scoring_elements 0.92757
published_at 2026-04-07T12:55:00Z
7
value 0.09366
scoring_system epss
scoring_elements 0.92766
published_at 2026-04-08T12:55:00Z
8
value 0.09366
scoring_system epss
scoring_elements 0.92771
published_at 2026-04-09T12:55:00Z
9
value 0.09366
scoring_system epss
scoring_elements 0.92776
published_at 2026-04-11T12:55:00Z
10
value 0.09366
scoring_system epss
scoring_elements 0.92775
published_at 2026-04-13T12:55:00Z
11
value 0.09366
scoring_system epss
scoring_elements 0.92786
published_at 2026-04-16T12:55:00Z
12
value 0.09366
scoring_system epss
scoring_elements 0.92787
published_at 2026-04-18T12:55:00Z
13
value 0.09366
scoring_system epss
scoring_elements 0.92791
published_at 2026-04-21T12:55:00Z
14
value 0.09366
scoring_system epss
scoring_elements 0.92797
published_at 2026-04-24T12:55:00Z
15
value 0.09366
scoring_system epss
scoring_elements 0.92798
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4001
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4001
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
9
reference_url https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01334.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01334.html
10
reference_url http://www.openwall.com/lists/oss-security/2016/04/11/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/04/11/4
11
reference_url http://www.openwall.com/lists/oss-security/2016/04/12/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/04/12/6
12
reference_url http://www.securityfocus.com/bid/85976
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/85976
13
reference_url http://www.ubuntu.com/usn/USN-2974-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2974-1
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1325884
reference_id 1325884
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1325884
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=821038
reference_id 821038
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=821038
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.6.0:rc0:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:2.6.0:rc0:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.6.0:rc0:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.6.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:2.6.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.6.0:rc1:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-4001
reference_id CVE-2016-4001
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-4001
28
reference_url https://security.gentoo.org/glsa/201609-01
reference_id GLSA-201609-01
reference_type
scores
url https://security.gentoo.org/glsa/201609-01
29
reference_url https://usn.ubuntu.com/2974-1/
reference_id USN-2974-1
reference_type
scores
url https://usn.ubuntu.com/2974-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.7.0-r3
purl pkg:ebuild/app-emulation/qemu@2.7.0-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r3
aliases CVE-2016-4001
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9zeb-77t6-57cx
7
url VCID-a243-xqn6-2ugc
vulnerability_id VCID-a243-xqn6-2ugc
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6490.json
reference_id
reference_type
scores
0
value 2.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6490.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6490
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22469
published_at 2026-04-01T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22644
published_at 2026-04-02T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22687
published_at 2026-04-04T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22477
published_at 2026-04-07T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22558
published_at 2026-04-08T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.22613
published_at 2026-04-09T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.22629
published_at 2026-04-11T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22587
published_at 2026-04-12T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22533
published_at 2026-04-13T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.22547
published_at 2026-04-16T12:55:00Z
10
value 0.00075
scoring_system epss
scoring_elements 0.22542
published_at 2026-04-18T12:55:00Z
11
value 0.00075
scoring_system epss
scoring_elements 0.22491
published_at 2026-04-21T12:55:00Z
12
value 0.00075
scoring_system epss
scoring_elements 0.22337
published_at 2026-04-24T12:55:00Z
13
value 0.00075
scoring_system epss
scoring_elements 0.22326
published_at 2026-04-26T12:55:00Z
14
value 0.00075
scoring_system epss
scoring_elements 0.22324
published_at 2026-04-29T12:55:00Z
15
value 0.00075
scoring_system epss
scoring_elements 0.22226
published_at 2026-05-05T12:55:00Z
16
value 0.00075
scoring_system epss
scoring_elements 0.22309
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6490
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6490
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.5
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1361427
reference_id 1361427
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1361427
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832767
reference_id 832767
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832767
6
reference_url https://security.gentoo.org/glsa/201609-01
reference_id GLSA-201609-01
reference_type
scores
url https://security.gentoo.org/glsa/201609-01
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.7.0-r3
purl pkg:ebuild/app-emulation/qemu@2.7.0-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r3
aliases CVE-2016-6490
risk_score 1.1
exploitability 0.5
weighted_severity 2.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a243-xqn6-2ugc
8
url VCID-a4jx-4hpe-3kcy
vulnerability_id VCID-a4jx-4hpe-3kcy
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6834.json
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6834.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6834
reference_id
reference_type
scores
0
value 0.00111
scoring_system epss
scoring_elements 0.29517
published_at 2026-04-08T12:55:00Z
1
value 0.00111
scoring_system epss
scoring_elements 0.29584
published_at 2026-04-02T12:55:00Z
2
value 0.00111
scoring_system epss
scoring_elements 0.29633
published_at 2026-04-04T12:55:00Z
3
value 0.00111
scoring_system epss
scoring_elements 0.29455
published_at 2026-04-07T12:55:00Z
4
value 0.00111
scoring_system epss
scoring_elements 0.29557
published_at 2026-04-09T12:55:00Z
5
value 0.00111
scoring_system epss
scoring_elements 0.29559
published_at 2026-04-11T12:55:00Z
6
value 0.00111
scoring_system epss
scoring_elements 0.29514
published_at 2026-04-12T12:55:00Z
7
value 0.00111
scoring_system epss
scoring_elements 0.29462
published_at 2026-04-13T12:55:00Z
8
value 0.00111
scoring_system epss
scoring_elements 0.29481
published_at 2026-04-16T12:55:00Z
9
value 0.00111
scoring_system epss
scoring_elements 0.29453
published_at 2026-04-18T12:55:00Z
10
value 0.00111
scoring_system epss
scoring_elements 0.29407
published_at 2026-04-21T12:55:00Z
11
value 0.00111
scoring_system epss
scoring_elements 0.29291
published_at 2026-04-24T12:55:00Z
12
value 0.00111
scoring_system epss
scoring_elements 0.29179
published_at 2026-04-26T12:55:00Z
13
value 0.00111
scoring_system epss
scoring_elements 0.29113
published_at 2026-04-29T12:55:00Z
14
value 0.00111
scoring_system epss
scoring_elements 0.28965
published_at 2026-05-05T12:55:00Z
15
value 0.00111
scoring_system epss
scoring_elements 0.29027
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6834
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6834
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.5
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1368990
reference_id 1368990
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1368990
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834905
reference_id 834905
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834905
6
reference_url https://security.gentoo.org/glsa/201609-01
reference_id GLSA-201609-01
reference_type
scores
url https://security.gentoo.org/glsa/201609-01
7
reference_url https://usn.ubuntu.com/3125-1/
reference_id USN-3125-1
reference_type
scores
url https://usn.ubuntu.com/3125-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.7.0-r3
purl pkg:ebuild/app-emulation/qemu@2.7.0-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r3
aliases CVE-2016-6834
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a4jx-4hpe-3kcy
9
url VCID-ae2t-gh49-a7ea
vulnerability_id VCID-ae2t-gh49-a7ea
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6836.json
reference_id
reference_type
scores
0
value 2.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6836.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6836
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22498
published_at 2026-04-01T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22672
published_at 2026-04-02T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22716
published_at 2026-04-04T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22506
published_at 2026-04-07T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22585
published_at 2026-04-08T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.2264
published_at 2026-04-09T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.22657
published_at 2026-04-11T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22616
published_at 2026-04-12T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22561
published_at 2026-04-13T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.22575
published_at 2026-04-16T12:55:00Z
10
value 0.00075
scoring_system epss
scoring_elements 0.2257
published_at 2026-04-18T12:55:00Z
11
value 0.00075
scoring_system epss
scoring_elements 0.22519
published_at 2026-04-21T12:55:00Z
12
value 0.00075
scoring_system epss
scoring_elements 0.22366
published_at 2026-04-24T12:55:00Z
13
value 0.00075
scoring_system epss
scoring_elements 0.22357
published_at 2026-04-26T12:55:00Z
14
value 0.00075
scoring_system epss
scoring_elements 0.22355
published_at 2026-04-29T12:55:00Z
15
value 0.00075
scoring_system epss
scoring_elements 0.22257
published_at 2026-05-05T12:55:00Z
16
value 0.00075
scoring_system epss
scoring_elements 0.22341
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6836
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6836
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.5
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1366369
reference_id 1366369
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1366369
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834944
reference_id 834944
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834944
6
reference_url https://security.gentoo.org/glsa/201609-01
reference_id GLSA-201609-01
reference_type
scores
url https://security.gentoo.org/glsa/201609-01
7
reference_url https://usn.ubuntu.com/3125-1/
reference_id USN-3125-1
reference_type
scores
url https://usn.ubuntu.com/3125-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.7.0-r3
purl pkg:ebuild/app-emulation/qemu@2.7.0-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r3
aliases CVE-2016-6836
risk_score 1.1
exploitability 0.5
weighted_severity 2.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ae2t-gh49-a7ea
10
url VCID-cfuf-q9r3-bbab
vulnerability_id VCID-cfuf-q9r3-bbab
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5107.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5107.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5107
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.188
published_at 2026-05-07T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.19087
published_at 2026-04-01T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19222
published_at 2026-04-02T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.19274
published_at 2026-04-04T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.18989
published_at 2026-04-07T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.19068
published_at 2026-04-08T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.19121
published_at 2026-04-09T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.19128
published_at 2026-04-11T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.19081
published_at 2026-04-12T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.19029
published_at 2026-04-13T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.18985
published_at 2026-04-16T12:55:00Z
11
value 0.00061
scoring_system epss
scoring_elements 0.18997
published_at 2026-04-18T12:55:00Z
12
value 0.00061
scoring_system epss
scoring_elements 0.19005
published_at 2026-04-21T12:55:00Z
13
value 0.00061
scoring_system epss
scoring_elements 0.18897
published_at 2026-04-24T12:55:00Z
14
value 0.00061
scoring_system epss
scoring_elements 0.1888
published_at 2026-04-26T12:55:00Z
15
value 0.00061
scoring_system epss
scoring_elements 0.18838
published_at 2026-04-29T12:55:00Z
16
value 0.00061
scoring_system epss
scoring_elements 0.18715
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5107
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5107
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.5
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1336461
reference_id 1336461
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1336461
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=825616
reference_id 825616
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=825616
6
reference_url https://security.gentoo.org/glsa/201609-01
reference_id GLSA-201609-01
reference_type
scores
url https://security.gentoo.org/glsa/201609-01
7
reference_url https://usn.ubuntu.com/3047-1/
reference_id USN-3047-1
reference_type
scores
url https://usn.ubuntu.com/3047-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.7.0-r3
purl pkg:ebuild/app-emulation/qemu@2.7.0-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r3
aliases CVE-2016-5107
risk_score 0.4
exploitability 0.5
weighted_severity 0.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cfuf-q9r3-bbab
11
url VCID-fuec-b5hj-s3e8
vulnerability_id VCID-fuec-b5hj-s3e8
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6833.json
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6833.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6833
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22474
published_at 2026-04-01T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22648
published_at 2026-04-02T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22691
published_at 2026-04-04T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22482
published_at 2026-04-07T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22563
published_at 2026-04-08T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.22618
published_at 2026-04-09T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.22634
published_at 2026-04-11T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22592
published_at 2026-04-12T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22537
published_at 2026-04-13T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.22552
published_at 2026-04-16T12:55:00Z
10
value 0.00075
scoring_system epss
scoring_elements 0.22546
published_at 2026-04-18T12:55:00Z
11
value 0.00075
scoring_system epss
scoring_elements 0.22496
published_at 2026-04-21T12:55:00Z
12
value 0.00075
scoring_system epss
scoring_elements 0.22341
published_at 2026-04-24T12:55:00Z
13
value 0.00075
scoring_system epss
scoring_elements 0.22331
published_at 2026-04-26T12:55:00Z
14
value 0.00075
scoring_system epss
scoring_elements 0.22328
published_at 2026-04-29T12:55:00Z
15
value 0.00075
scoring_system epss
scoring_elements 0.22231
published_at 2026-05-05T12:55:00Z
16
value 0.00075
scoring_system epss
scoring_elements 0.22314
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6833
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6833
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1368980
reference_id 1368980
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1368980
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834904
reference_id 834904
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834904
6
reference_url https://security.gentoo.org/glsa/201609-01
reference_id GLSA-201609-01
reference_type
scores
url https://security.gentoo.org/glsa/201609-01
7
reference_url https://usn.ubuntu.com/3125-1/
reference_id USN-3125-1
reference_type
scores
url https://usn.ubuntu.com/3125-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.7.0-r3
purl pkg:ebuild/app-emulation/qemu@2.7.0-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r3
aliases CVE-2016-6833
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fuec-b5hj-s3e8
12
url VCID-ghre-ztj1-nbhh
vulnerability_id VCID-ghre-ztj1-nbhh
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=415ab35a441eca767d033a2702223e785b9d5190
reference_id
reference_type
scores
url http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=415ab35a441eca767d033a2702223e785b9d5190
1
reference_url http://lists.nongnu.org/archive/html/qemu-stable/2016-03/msg00064.html
reference_id
reference_type
scores
url http://lists.nongnu.org/archive/html/qemu-stable/2016-03/msg00064.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2841.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2841.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2841
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.1873
published_at 2026-05-07T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.18766
published_at 2026-04-29T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.18646
published_at 2026-05-05T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.19017
published_at 2026-04-01T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.19152
published_at 2026-04-02T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.19204
published_at 2026-04-04T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.1892
published_at 2026-04-07T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.18999
published_at 2026-04-08T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.19053
published_at 2026-04-09T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.19059
published_at 2026-04-11T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.19013
published_at 2026-04-12T12:55:00Z
11
value 0.00061
scoring_system epss
scoring_elements 0.18961
published_at 2026-04-13T12:55:00Z
12
value 0.00061
scoring_system epss
scoring_elements 0.18914
published_at 2026-04-16T12:55:00Z
13
value 0.00061
scoring_system epss
scoring_elements 0.18928
published_at 2026-04-18T12:55:00Z
14
value 0.00061
scoring_system epss
scoring_elements 0.18939
published_at 2026-04-21T12:55:00Z
15
value 0.00061
scoring_system epss
scoring_elements 0.18831
published_at 2026-04-24T12:55:00Z
16
value 0.00061
scoring_system epss
scoring_elements 0.1881
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2841
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2841
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2841
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
7
reference_url https://lists.gnu.org/archive/html/qemu-devel/2016-02/msg06126.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/qemu-devel/2016-02/msg06126.html
8
reference_url http://www.openwall.com/lists/oss-security/2016/03/02/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/03/02/8
9
reference_url http://www.securityfocus.com/bid/84028
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/84028
10
reference_url http://www.ubuntu.com/usn/USN-2974-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2974-1
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1303106
reference_id 1303106
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1303106
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=817181
reference_id 817181
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=817181
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-2841
reference_id CVE-2016-2841
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
1
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-2841
19
reference_url https://security.gentoo.org/glsa/201609-01
reference_id GLSA-201609-01
reference_type
scores
url https://security.gentoo.org/glsa/201609-01
20
reference_url https://usn.ubuntu.com/2974-1/
reference_id USN-2974-1
reference_type
scores
url https://usn.ubuntu.com/2974-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.7.0-r3
purl pkg:ebuild/app-emulation/qemu@2.7.0-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r3
aliases CVE-2016-2841
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ghre-ztj1-nbhh
13
url VCID-gkjb-rfp5-eye6
vulnerability_id VCID-gkjb-rfp5-eye6
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4453.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4453.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4453
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07521
published_at 2026-05-07T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.07384
published_at 2026-04-12T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.07371
published_at 2026-04-13T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.073
published_at 2026-04-16T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.07292
published_at 2026-04-18T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.0742
published_at 2026-04-21T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.0738
published_at 2026-04-24T12:55:00Z
7
value 0.00026
scoring_system epss
scoring_elements 0.07387
published_at 2026-04-26T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.0736
published_at 2026-04-29T12:55:00Z
9
value 0.00026
scoring_system epss
scoring_elements 0.07373
published_at 2026-05-05T12:55:00Z
10
value 0.00026
scoring_system epss
scoring_elements 0.07397
published_at 2026-04-11T12:55:00Z
11
value 0.00068
scoring_system epss
scoring_elements 0.20925
published_at 2026-04-01T12:55:00Z
12
value 0.00068
scoring_system epss
scoring_elements 0.20842
published_at 2026-04-07T12:55:00Z
13
value 0.00068
scoring_system epss
scoring_elements 0.20923
published_at 2026-04-08T12:55:00Z
14
value 0.00068
scoring_system epss
scoring_elements 0.20984
published_at 2026-04-09T12:55:00Z
15
value 0.00068
scoring_system epss
scoring_elements 0.21075
published_at 2026-04-02T12:55:00Z
16
value 0.00068
scoring_system epss
scoring_elements 0.21128
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4453
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4453
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
5
reference_url https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg05270.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg05270.html
6
reference_url http://www.openwall.com/lists/oss-security/2016/05/30/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/05/30/2
7
reference_url http://www.securityfocus.com/bid/90928
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/90928
8
reference_url http://www.ubuntu.com/usn/USN-3047-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3047-1
9
reference_url http://www.ubuntu.com/usn/USN-3047-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3047-2
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1336650
reference_id 1336650
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1336650
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-4453
reference_id CVE-2016-4453
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-4453
17
reference_url https://security.gentoo.org/glsa/201609-01
reference_id GLSA-201609-01
reference_type
scores
url https://security.gentoo.org/glsa/201609-01
18
reference_url https://usn.ubuntu.com/3047-1/
reference_id USN-3047-1
reference_type
scores
url https://usn.ubuntu.com/3047-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.7.0-r3
purl pkg:ebuild/app-emulation/qemu@2.7.0-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r3
aliases CVE-2016-4453
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gkjb-rfp5-eye6
14
url VCID-h8p1-s41k-t3dd
vulnerability_id VCID-h8p1-s41k-t3dd
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4441.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4441.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4441
reference_id
reference_type
scores
0
value 0.00099
scoring_system epss
scoring_elements 0.26816
published_at 2026-05-07T12:55:00Z
1
value 0.00099
scoring_system epss
scoring_elements 0.26893
published_at 2026-04-29T12:55:00Z
2
value 0.00099
scoring_system epss
scoring_elements 0.26747
published_at 2026-05-05T12:55:00Z
3
value 0.00099
scoring_system epss
scoring_elements 0.27176
published_at 2026-04-01T12:55:00Z
4
value 0.00099
scoring_system epss
scoring_elements 0.27216
published_at 2026-04-02T12:55:00Z
5
value 0.00099
scoring_system epss
scoring_elements 0.27254
published_at 2026-04-04T12:55:00Z
6
value 0.00099
scoring_system epss
scoring_elements 0.27047
published_at 2026-04-07T12:55:00Z
7
value 0.00099
scoring_system epss
scoring_elements 0.27116
published_at 2026-04-08T12:55:00Z
8
value 0.00099
scoring_system epss
scoring_elements 0.27162
published_at 2026-04-09T12:55:00Z
9
value 0.00099
scoring_system epss
scoring_elements 0.27168
published_at 2026-04-11T12:55:00Z
10
value 0.00099
scoring_system epss
scoring_elements 0.27124
published_at 2026-04-12T12:55:00Z
11
value 0.00099
scoring_system epss
scoring_elements 0.27066
published_at 2026-04-13T12:55:00Z
12
value 0.00099
scoring_system epss
scoring_elements 0.27075
published_at 2026-04-16T12:55:00Z
13
value 0.00099
scoring_system epss
scoring_elements 0.27048
published_at 2026-04-18T12:55:00Z
14
value 0.00099
scoring_system epss
scoring_elements 0.2701
published_at 2026-04-21T12:55:00Z
15
value 0.00099
scoring_system epss
scoring_elements 0.26965
published_at 2026-04-24T12:55:00Z
16
value 0.00099
scoring_system epss
scoring_elements 0.26958
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4441
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4441
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
5
reference_url https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03274.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03274.html
6
reference_url http://www.openwall.com/lists/oss-security/2016/05/19/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/05/19/4
7
reference_url http://www.securityfocus.com/bid/90762
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/90762
8
reference_url http://www.ubuntu.com/usn/USN-3047-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3047-1
9
reference_url http://www.ubuntu.com/usn/USN-3047-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3047-2
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1337505
reference_id 1337505
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1337505
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=824856
reference_id 824856
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=824856
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-4441
reference_id CVE-2016-4441
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
1
value 6.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-4441
18
reference_url https://security.gentoo.org/glsa/201609-01
reference_id GLSA-201609-01
reference_type
scores
url https://security.gentoo.org/glsa/201609-01
19
reference_url https://usn.ubuntu.com/3047-1/
reference_id USN-3047-1
reference_type
scores
url https://usn.ubuntu.com/3047-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.7.0-r3
purl pkg:ebuild/app-emulation/qemu@2.7.0-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r3
aliases CVE-2016-4441
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h8p1-s41k-t3dd
15
url VCID-j8b1-ua84-nufe
vulnerability_id VCID-j8b1-ua84-nufe
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=a6b3167fa0e825aebb5a7cd8b437b6d41584a196
reference_id
reference_type
scores
url http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=a6b3167fa0e825aebb5a7cd8b437b6d41584a196
1
reference_url http://rhn.redhat.com/errata/RHSA-2016-1606.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1606.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-1607.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1607.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2016-1653.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1653.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-1654.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1654.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-1655.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1655.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-1756.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1756.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1763.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1763.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5126.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5126.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5126
reference_id
reference_type
scores
0
value 0.00263
scoring_system epss
scoring_elements 0.49548
published_at 2026-04-01T12:55:00Z
1
value 0.00263
scoring_system epss
scoring_elements 0.49544
published_at 2026-05-07T12:55:00Z
2
value 0.00263
scoring_system epss
scoring_elements 0.49601
published_at 2026-04-24T12:55:00Z
3
value 0.00263
scoring_system epss
scoring_elements 0.49569
published_at 2026-04-29T12:55:00Z
4
value 0.00263
scoring_system epss
scoring_elements 0.49485
published_at 2026-05-05T12:55:00Z
5
value 0.00263
scoring_system epss
scoring_elements 0.49577
published_at 2026-04-02T12:55:00Z
6
value 0.00263
scoring_system epss
scoring_elements 0.49605
published_at 2026-04-09T12:55:00Z
7
value 0.00263
scoring_system epss
scoring_elements 0.49556
published_at 2026-04-07T12:55:00Z
8
value 0.00263
scoring_system epss
scoring_elements 0.49611
published_at 2026-04-26T12:55:00Z
9
value 0.00263
scoring_system epss
scoring_elements 0.49623
published_at 2026-04-11T12:55:00Z
10
value 0.00263
scoring_system epss
scoring_elements 0.49593
published_at 2026-04-12T12:55:00Z
11
value 0.00263
scoring_system epss
scoring_elements 0.49595
published_at 2026-04-13T12:55:00Z
12
value 0.00263
scoring_system epss
scoring_elements 0.49642
published_at 2026-04-16T12:55:00Z
13
value 0.00263
scoring_system epss
scoring_elements 0.4964
published_at 2026-04-18T12:55:00Z
14
value 0.00263
scoring_system epss
scoring_elements 0.4961
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5126
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5126
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5126
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://lists.debian.org/debian-lts-announce/2019/09/msg00021.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/09/msg00021.html
13
reference_url https://lists.gnu.org/archive/html/qemu-block/2016-05/msg00779.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/qemu-block/2016-05/msg00779.html
14
reference_url http://www.openwall.com/lists/oss-security/2016/05/30/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/05/30/6
15
reference_url http://www.openwall.com/lists/oss-security/2016/05/30/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/05/30/7
16
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
17
reference_url http://www.securityfocus.com/bid/90948
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/90948
18
reference_url http://www.ubuntu.com/usn/USN-3047-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3047-1
19
reference_url http://www.ubuntu.com/usn/USN-3047-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3047-2
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1340924
reference_id 1340924
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1340924
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=826151
reference_id 826151
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=826151
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-5126
reference_id CVE-2016-5126
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-5126
54
reference_url https://security.gentoo.org/glsa/201609-01
reference_id GLSA-201609-01
reference_type
scores
url https://security.gentoo.org/glsa/201609-01
55
reference_url https://access.redhat.com/errata/RHSA-2016:1606
reference_id RHSA-2016:1606
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1606
56
reference_url https://access.redhat.com/errata/RHSA-2016:1607
reference_id RHSA-2016:1607
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1607
57
reference_url https://access.redhat.com/errata/RHSA-2016:1653
reference_id RHSA-2016:1653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1653
58
reference_url https://access.redhat.com/errata/RHSA-2016:1654
reference_id RHSA-2016:1654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1654
59
reference_url https://access.redhat.com/errata/RHSA-2016:1655
reference_id RHSA-2016:1655
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1655
60
reference_url https://access.redhat.com/errata/RHSA-2016:1756
reference_id RHSA-2016:1756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1756
61
reference_url https://access.redhat.com/errata/RHSA-2016:1763
reference_id RHSA-2016:1763
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1763
62
reference_url https://usn.ubuntu.com/3047-1/
reference_id USN-3047-1
reference_type
scores
url https://usn.ubuntu.com/3047-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.7.0-r3
purl pkg:ebuild/app-emulation/qemu@2.7.0-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r3
aliases CVE-2016-5126
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j8b1-ua84-nufe
16
url VCID-jhdu-5znk-cffu
vulnerability_id VCID-jhdu-5znk-cffu
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=844864fbae66935951529408831c2f22367a57b6
reference_id
reference_type
scores
url http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=844864fbae66935951529408831c2f22367a57b6
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5337.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5337.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5337
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16565
published_at 2026-05-07T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16579
published_at 2026-04-29T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16445
published_at 2026-05-05T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16715
published_at 2026-04-01T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16884
published_at 2026-04-02T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.16941
published_at 2026-04-04T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.16724
published_at 2026-04-07T12:55:00Z
7
value 0.00053
scoring_system epss
scoring_elements 0.16809
published_at 2026-04-08T12:55:00Z
8
value 0.00053
scoring_system epss
scoring_elements 0.16865
published_at 2026-04-09T12:55:00Z
9
value 0.00053
scoring_system epss
scoring_elements 0.16843
published_at 2026-04-11T12:55:00Z
10
value 0.00053
scoring_system epss
scoring_elements 0.16798
published_at 2026-04-12T12:55:00Z
11
value 0.00053
scoring_system epss
scoring_elements 0.16739
published_at 2026-04-13T12:55:00Z
12
value 0.00053
scoring_system epss
scoring_elements 0.16675
published_at 2026-04-16T12:55:00Z
13
value 0.00053
scoring_system epss
scoring_elements 0.16683
published_at 2026-04-18T12:55:00Z
14
value 0.00053
scoring_system epss
scoring_elements 0.1672
published_at 2026-04-21T12:55:00Z
15
value 0.00053
scoring_system epss
scoring_elements 0.16625
published_at 2026-04-24T12:55:00Z
16
value 0.00053
scoring_system epss
scoring_elements 0.16614
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5337
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5337
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5337
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.5
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
6
reference_url https://lists.gnu.org/archive/html/qemu-devel/2016-06/msg01969.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/qemu-devel/2016-06/msg01969.html
7
reference_url http://www.openwall.com/lists/oss-security/2016/06/08/13
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/06/08/13
8
reference_url http://www.openwall.com/lists/oss-security/2016/06/08/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/06/08/3
9
reference_url http://www.securityfocus.com/bid/91097
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91097
10
reference_url http://www.ubuntu.com/usn/USN-3047-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3047-1
11
reference_url http://www.ubuntu.com/usn/USN-3047-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3047-2
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1343909
reference_id 1343909
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1343909
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827026
reference_id 827026
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827026
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-5337
reference_id CVE-2016-5337
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-5337
20
reference_url https://security.gentoo.org/glsa/201609-01
reference_id GLSA-201609-01
reference_type
scores
url https://security.gentoo.org/glsa/201609-01
21
reference_url https://usn.ubuntu.com/3047-1/
reference_id USN-3047-1
reference_type
scores
url https://usn.ubuntu.com/3047-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.7.0-r3
purl pkg:ebuild/app-emulation/qemu@2.7.0-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r3
aliases CVE-2016-5337
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jhdu-5znk-cffu
17
url VCID-q63s-qmb1-4yd8
vulnerability_id VCID-q63s-qmb1-4yd8
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7156.json
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7156.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7156
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22474
published_at 2026-04-01T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22648
published_at 2026-04-02T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22691
published_at 2026-04-04T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22482
published_at 2026-04-07T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22563
published_at 2026-04-08T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.22618
published_at 2026-04-09T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.22634
published_at 2026-04-11T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22592
published_at 2026-04-12T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22537
published_at 2026-04-13T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.22552
published_at 2026-04-16T12:55:00Z
10
value 0.00075
scoring_system epss
scoring_elements 0.22546
published_at 2026-04-18T12:55:00Z
11
value 0.00075
scoring_system epss
scoring_elements 0.22496
published_at 2026-04-21T12:55:00Z
12
value 0.00075
scoring_system epss
scoring_elements 0.22341
published_at 2026-04-24T12:55:00Z
13
value 0.00075
scoring_system epss
scoring_elements 0.22331
published_at 2026-04-26T12:55:00Z
14
value 0.00075
scoring_system epss
scoring_elements 0.22328
published_at 2026-04-29T12:55:00Z
15
value 0.00075
scoring_system epss
scoring_elements 0.22231
published_at 2026-05-05T12:55:00Z
16
value 0.00075
scoring_system epss
scoring_elements 0.22314
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7156
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7156
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1373478
reference_id 1373478
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1373478
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837339
reference_id 837339
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837339
6
reference_url https://security.gentoo.org/glsa/201609-01
reference_id GLSA-201609-01
reference_type
scores
url https://security.gentoo.org/glsa/201609-01
7
reference_url https://usn.ubuntu.com/3125-1/
reference_id USN-3125-1
reference_type
scores
url https://usn.ubuntu.com/3125-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.7.0-r3
purl pkg:ebuild/app-emulation/qemu@2.7.0-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r3
aliases CVE-2016-7156
risk_score 1.1
exploitability 0.5
weighted_severity 2.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q63s-qmb1-4yd8
18
url VCID-rc5s-peqy-z3ag
vulnerability_id VCID-rc5s-peqy-z3ag
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5238.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5238.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5238
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.188
published_at 2026-05-07T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.18838
published_at 2026-04-29T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.18715
published_at 2026-05-05T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.19087
published_at 2026-04-01T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.19222
published_at 2026-04-02T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.19274
published_at 2026-04-04T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.18989
published_at 2026-04-07T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.19068
published_at 2026-04-08T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.19121
published_at 2026-04-09T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.19128
published_at 2026-04-11T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.19081
published_at 2026-04-12T12:55:00Z
11
value 0.00061
scoring_system epss
scoring_elements 0.19029
published_at 2026-04-13T12:55:00Z
12
value 0.00061
scoring_system epss
scoring_elements 0.18985
published_at 2026-04-16T12:55:00Z
13
value 0.00061
scoring_system epss
scoring_elements 0.18997
published_at 2026-04-18T12:55:00Z
14
value 0.00061
scoring_system epss
scoring_elements 0.19005
published_at 2026-04-21T12:55:00Z
15
value 0.00061
scoring_system epss
scoring_elements 0.18897
published_at 2026-04-24T12:55:00Z
16
value 0.00061
scoring_system epss
scoring_elements 0.1888
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5238
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5238
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
5
reference_url https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg05691.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg05691.html
6
reference_url https://lists.gnu.org/archive/html/qemu-devel/2016-06/msg00150.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/qemu-devel/2016-06/msg00150.html
7
reference_url http://www.openwall.com/lists/oss-security/2016/06/02/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/06/02/2
8
reference_url http://www.openwall.com/lists/oss-security/2016/06/02/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/06/02/9
9
reference_url http://www.securityfocus.com/bid/90995
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/90995
10
reference_url http://www.ubuntu.com/usn/USN-3047-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3047-1
11
reference_url http://www.ubuntu.com/usn/USN-3047-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3047-2
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1341931
reference_id 1341931
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1341931
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=826152
reference_id 826152
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=826152
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-5238
reference_id CVE-2016-5238
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
1
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-5238
20
reference_url https://security.gentoo.org/glsa/201609-01
reference_id GLSA-201609-01
reference_type
scores
url https://security.gentoo.org/glsa/201609-01
21
reference_url https://usn.ubuntu.com/3047-1/
reference_id USN-3047-1
reference_type
scores
url https://usn.ubuntu.com/3047-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.7.0-r3
purl pkg:ebuild/app-emulation/qemu@2.7.0-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r3
aliases CVE-2016-5238
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rc5s-peqy-z3ag
19
url VCID-sbgh-r39n-6fdm
vulnerability_id VCID-sbgh-r39n-6fdm
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=691a02e2ce0c413236a78dee6f2651c937b09fb0
reference_id
reference_type
scores
url http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=691a02e2ce0c413236a78dee6f2651c937b09fb0
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4020.json
reference_id
reference_type
scores
0
value 3.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4020.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4020
reference_id
reference_type
scores
0
value 0.00085
scoring_system epss
scoring_elements 0.24635
published_at 2026-04-01T12:55:00Z
1
value 0.00085
scoring_system epss
scoring_elements 0.2438
published_at 2026-05-07T12:55:00Z
2
value 0.00085
scoring_system epss
scoring_elements 0.24469
published_at 2026-04-26T12:55:00Z
3
value 0.00085
scoring_system epss
scoring_elements 0.24429
published_at 2026-04-29T12:55:00Z
4
value 0.00085
scoring_system epss
scoring_elements 0.24301
published_at 2026-05-05T12:55:00Z
5
value 0.00085
scoring_system epss
scoring_elements 0.24712
published_at 2026-04-02T12:55:00Z
6
value 0.00085
scoring_system epss
scoring_elements 0.24751
published_at 2026-04-04T12:55:00Z
7
value 0.00085
scoring_system epss
scoring_elements 0.24523
published_at 2026-04-07T12:55:00Z
8
value 0.00085
scoring_system epss
scoring_elements 0.24594
published_at 2026-04-08T12:55:00Z
9
value 0.00085
scoring_system epss
scoring_elements 0.24641
published_at 2026-04-09T12:55:00Z
10
value 0.00085
scoring_system epss
scoring_elements 0.24657
published_at 2026-04-11T12:55:00Z
11
value 0.00085
scoring_system epss
scoring_elements 0.24616
published_at 2026-04-12T12:55:00Z
12
value 0.00085
scoring_system epss
scoring_elements 0.24559
published_at 2026-04-13T12:55:00Z
13
value 0.00085
scoring_system epss
scoring_elements 0.24573
published_at 2026-04-16T12:55:00Z
14
value 0.00085
scoring_system epss
scoring_elements 0.24563
published_at 2026-04-18T12:55:00Z
15
value 0.00085
scoring_system epss
scoring_elements 0.24539
published_at 2026-04-21T12:55:00Z
16
value 0.00085
scoring_system epss
scoring_elements 0.24483
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4020
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4020
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.5
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
6
reference_url https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01106.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01106.html
7
reference_url https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01118.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01118.html
8
reference_url http://www.securityfocus.com/bid/86067
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/86067
9
reference_url http://www.ubuntu.com/usn/USN-2974-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2974-1
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1313686
reference_id 1313686
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1313686
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=821062
reference_id 821062
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=821062
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:11:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-4020
reference_id CVE-2016-4020
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-4020
39
reference_url https://security.gentoo.org/glsa/201609-01
reference_id GLSA-201609-01
reference_type
scores
url https://security.gentoo.org/glsa/201609-01
40
reference_url https://access.redhat.com/errata/RHSA-2017:1856
reference_id RHSA-2017:1856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1856
41
reference_url https://access.redhat.com/errata/RHSA-2017:2392
reference_id RHSA-2017:2392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2392
42
reference_url https://access.redhat.com/errata/RHSA-2017:2408
reference_id RHSA-2017:2408
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2408
43
reference_url https://usn.ubuntu.com/2974-1/
reference_id USN-2974-1
reference_type
scores
url https://usn.ubuntu.com/2974-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.7.0-r3
purl pkg:ebuild/app-emulation/qemu@2.7.0-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r3
aliases CVE-2016-4020
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sbgh-r39n-6fdm
20
url VCID-snv6-47g2-4qcc
vulnerability_id VCID-snv6-47g2-4qcc
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7422.json
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7422.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7422
reference_id
reference_type
scores
0
value 0.00094
scoring_system epss
scoring_elements 0.26229
published_at 2026-04-01T12:55:00Z
1
value 0.00094
scoring_system epss
scoring_elements 0.26312
published_at 2026-04-02T12:55:00Z
2
value 0.00094
scoring_system epss
scoring_elements 0.26353
published_at 2026-04-04T12:55:00Z
3
value 0.00094
scoring_system epss
scoring_elements 0.26126
published_at 2026-04-07T12:55:00Z
4
value 0.00094
scoring_system epss
scoring_elements 0.26193
published_at 2026-04-08T12:55:00Z
5
value 0.00094
scoring_system epss
scoring_elements 0.26241
published_at 2026-04-09T12:55:00Z
6
value 0.00094
scoring_system epss
scoring_elements 0.26248
published_at 2026-04-11T12:55:00Z
7
value 0.00094
scoring_system epss
scoring_elements 0.26203
published_at 2026-04-12T12:55:00Z
8
value 0.00094
scoring_system epss
scoring_elements 0.26144
published_at 2026-04-13T12:55:00Z
9
value 0.00094
scoring_system epss
scoring_elements 0.26149
published_at 2026-04-16T12:55:00Z
10
value 0.00094
scoring_system epss
scoring_elements 0.26124
published_at 2026-04-18T12:55:00Z
11
value 0.00094
scoring_system epss
scoring_elements 0.26086
published_at 2026-04-21T12:55:00Z
12
value 0.00094
scoring_system epss
scoring_elements 0.26024
published_at 2026-04-24T12:55:00Z
13
value 0.00094
scoring_system epss
scoring_elements 0.26021
published_at 2026-04-26T12:55:00Z
14
value 0.00094
scoring_system epss
scoring_elements 0.25972
published_at 2026-04-29T12:55:00Z
15
value 0.00094
scoring_system epss
scoring_elements 0.25863
published_at 2026-05-05T12:55:00Z
16
value 0.00094
scoring_system epss
scoring_elements 0.25923
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7422
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7422
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7422
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1376755
reference_id 1376755
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1376755
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838146
reference_id 838146
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838146
6
reference_url https://security.gentoo.org/glsa/201609-01
reference_id GLSA-201609-01
reference_type
scores
url https://security.gentoo.org/glsa/201609-01
7
reference_url https://access.redhat.com/errata/RHSA-2017:2392
reference_id RHSA-2017:2392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2392
8
reference_url https://access.redhat.com/errata/RHSA-2017:2408
reference_id RHSA-2017:2408
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2408
9
reference_url https://usn.ubuntu.com/3125-1/
reference_id USN-3125-1
reference_type
scores
url https://usn.ubuntu.com/3125-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.7.0-r3
purl pkg:ebuild/app-emulation/qemu@2.7.0-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r3
aliases CVE-2016-7422
risk_score 1.1
exploitability 0.5
weighted_severity 2.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-snv6-47g2-4qcc
21
url VCID-uza6-bqkx-hugw
vulnerability_id VCID-uza6-bqkx-hugw
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7157.json
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7157.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7157
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22474
published_at 2026-04-01T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22648
published_at 2026-04-02T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22691
published_at 2026-04-04T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22482
published_at 2026-04-07T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22563
published_at 2026-04-08T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.22618
published_at 2026-04-09T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.22634
published_at 2026-04-11T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22592
published_at 2026-04-12T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22537
published_at 2026-04-13T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.22552
published_at 2026-04-16T12:55:00Z
10
value 0.00075
scoring_system epss
scoring_elements 0.22546
published_at 2026-04-18T12:55:00Z
11
value 0.00075
scoring_system epss
scoring_elements 0.22496
published_at 2026-04-21T12:55:00Z
12
value 0.00075
scoring_system epss
scoring_elements 0.22341
published_at 2026-04-24T12:55:00Z
13
value 0.00075
scoring_system epss
scoring_elements 0.22331
published_at 2026-04-26T12:55:00Z
14
value 0.00075
scoring_system epss
scoring_elements 0.22328
published_at 2026-04-29T12:55:00Z
15
value 0.00075
scoring_system epss
scoring_elements 0.22231
published_at 2026-05-05T12:55:00Z
16
value 0.00075
scoring_system epss
scoring_elements 0.22314
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7157
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7157
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7157
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1373504
reference_id 1373504
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1373504
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837603
reference_id 837603
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837603
5
reference_url https://security.gentoo.org/glsa/201609-01
reference_id GLSA-201609-01
reference_type
scores
url https://security.gentoo.org/glsa/201609-01
6
reference_url https://usn.ubuntu.com/3125-1/
reference_id USN-3125-1
reference_type
scores
url https://usn.ubuntu.com/3125-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.7.0-r3
purl pkg:ebuild/app-emulation/qemu@2.7.0-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r3
aliases CVE-2016-7157
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uza6-bqkx-hugw
22
url VCID-v9sz-kcrs-qqeu
vulnerability_id VCID-v9sz-kcrs-qqeu
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4964.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4964.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4964
reference_id
reference_type
scores
0
value 0.0006
scoring_system epss
scoring_elements 0.18753
published_at 2026-04-01T12:55:00Z
1
value 0.0006
scoring_system epss
scoring_elements 0.18889
published_at 2026-04-02T12:55:00Z
2
value 0.0006
scoring_system epss
scoring_elements 0.18941
published_at 2026-04-04T12:55:00Z
3
value 0.0006
scoring_system epss
scoring_elements 0.18665
published_at 2026-04-07T12:55:00Z
4
value 0.0006
scoring_system epss
scoring_elements 0.18745
published_at 2026-04-08T12:55:00Z
5
value 0.0006
scoring_system epss
scoring_elements 0.18798
published_at 2026-04-09T12:55:00Z
6
value 0.0006
scoring_system epss
scoring_elements 0.18803
published_at 2026-04-11T12:55:00Z
7
value 0.0006
scoring_system epss
scoring_elements 0.18757
published_at 2026-04-12T12:55:00Z
8
value 0.0006
scoring_system epss
scoring_elements 0.18707
published_at 2026-04-13T12:55:00Z
9
value 0.0006
scoring_system epss
scoring_elements 0.18656
published_at 2026-04-16T12:55:00Z
10
value 0.0006
scoring_system epss
scoring_elements 0.18667
published_at 2026-04-18T12:55:00Z
11
value 0.0006
scoring_system epss
scoring_elements 0.18687
published_at 2026-04-21T12:55:00Z
12
value 0.0006
scoring_system epss
scoring_elements 0.18578
published_at 2026-04-24T12:55:00Z
13
value 0.0006
scoring_system epss
scoring_elements 0.18556
published_at 2026-04-26T12:55:00Z
14
value 0.0006
scoring_system epss
scoring_elements 0.18515
published_at 2026-04-29T12:55:00Z
15
value 0.0006
scoring_system epss
scoring_elements 0.18388
published_at 2026-05-05T12:55:00Z
16
value 0.0006
scoring_system epss
scoring_elements 0.18473
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4964
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4964
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4964
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1339155
reference_id 1339155
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1339155
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=825207
reference_id 825207
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=825207
5
reference_url https://security.gentoo.org/glsa/201609-01
reference_id GLSA-201609-01
reference_type
scores
url https://security.gentoo.org/glsa/201609-01
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.7.0-r3
purl pkg:ebuild/app-emulation/qemu@2.7.0-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r3
aliases CVE-2016-4964
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v9sz-kcrs-qqeu
23
url VCID-vawn-m828-47fe
vulnerability_id VCID-vawn-m828-47fe
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4454.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4454.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4454
reference_id
reference_type
scores
0
value 0.00062
scoring_system epss
scoring_elements 0.19084
published_at 2026-05-07T12:55:00Z
1
value 0.00062
scoring_system epss
scoring_elements 0.19111
published_at 2026-04-29T12:55:00Z
2
value 0.00062
scoring_system epss
scoring_elements 0.19003
published_at 2026-05-05T12:55:00Z
3
value 0.00062
scoring_system epss
scoring_elements 0.19352
published_at 2026-04-01T12:55:00Z
4
value 0.00062
scoring_system epss
scoring_elements 0.19489
published_at 2026-04-02T12:55:00Z
5
value 0.00062
scoring_system epss
scoring_elements 0.19536
published_at 2026-04-04T12:55:00Z
6
value 0.00062
scoring_system epss
scoring_elements 0.19254
published_at 2026-04-18T12:55:00Z
7
value 0.00062
scoring_system epss
scoring_elements 0.19332
published_at 2026-04-08T12:55:00Z
8
value 0.00062
scoring_system epss
scoring_elements 0.19385
published_at 2026-04-09T12:55:00Z
9
value 0.00062
scoring_system epss
scoring_elements 0.19389
published_at 2026-04-11T12:55:00Z
10
value 0.00062
scoring_system epss
scoring_elements 0.19341
published_at 2026-04-12T12:55:00Z
11
value 0.00062
scoring_system epss
scoring_elements 0.19285
published_at 2026-04-13T12:55:00Z
12
value 0.00062
scoring_system epss
scoring_elements 0.19246
published_at 2026-04-16T12:55:00Z
13
value 0.00062
scoring_system epss
scoring_elements 0.19264
published_at 2026-04-21T12:55:00Z
14
value 0.00062
scoring_system epss
scoring_elements 0.19164
published_at 2026-04-24T12:55:00Z
15
value 0.00062
scoring_system epss
scoring_elements 0.19153
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4454
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4454
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:S/C:P/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
5
reference_url https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg05271.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg05271.html
6
reference_url http://www.openwall.com/lists/oss-security/2016/05/30/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/05/30/3
7
reference_url http://www.securityfocus.com/bid/90927
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/90927
8
reference_url http://www.ubuntu.com/usn/USN-3047-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3047-1
9
reference_url http://www.ubuntu.com/usn/USN-3047-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3047-2
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1336429
reference_id 1336429
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1336429
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-4454
reference_id CVE-2016-4454
reference_type
scores
0
value 3.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:P
1
value 6.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-4454
17
reference_url https://security.gentoo.org/glsa/201609-01
reference_id GLSA-201609-01
reference_type
scores
url https://security.gentoo.org/glsa/201609-01
18
reference_url https://usn.ubuntu.com/3047-1/
reference_id USN-3047-1
reference_type
scores
url https://usn.ubuntu.com/3047-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.7.0-r3
purl pkg:ebuild/app-emulation/qemu@2.7.0-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r3
aliases CVE-2016-4454
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vawn-m828-47fe
24
url VCID-zawc-752b-9bh6
vulnerability_id VCID-zawc-752b-9bh6
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=ff589551c8e8e9e95e211b9d8daafb4ed39f1aec
reference_id
reference_type
scores
url http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=ff589551c8e8e9e95e211b9d8daafb4ed39f1aec
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5338.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5338.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5338
reference_id
reference_type
scores
0
value 0.00083
scoring_system epss
scoring_elements 0.24039
published_at 2026-05-07T12:55:00Z
1
value 0.00083
scoring_system epss
scoring_elements 0.24071
published_at 2026-04-29T12:55:00Z
2
value 0.00083
scoring_system epss
scoring_elements 0.23956
published_at 2026-05-05T12:55:00Z
3
value 0.00083
scoring_system epss
scoring_elements 0.24299
published_at 2026-04-01T12:55:00Z
4
value 0.00083
scoring_system epss
scoring_elements 0.24426
published_at 2026-04-02T12:55:00Z
5
value 0.00083
scoring_system epss
scoring_elements 0.24459
published_at 2026-04-04T12:55:00Z
6
value 0.00083
scoring_system epss
scoring_elements 0.24241
published_at 2026-04-07T12:55:00Z
7
value 0.00083
scoring_system epss
scoring_elements 0.24307
published_at 2026-04-08T12:55:00Z
8
value 0.00083
scoring_system epss
scoring_elements 0.24351
published_at 2026-04-09T12:55:00Z
9
value 0.00083
scoring_system epss
scoring_elements 0.24368
published_at 2026-04-11T12:55:00Z
10
value 0.00083
scoring_system epss
scoring_elements 0.24326
published_at 2026-04-12T12:55:00Z
11
value 0.00083
scoring_system epss
scoring_elements 0.24269
published_at 2026-04-13T12:55:00Z
12
value 0.00083
scoring_system epss
scoring_elements 0.24286
published_at 2026-04-16T12:55:00Z
13
value 0.00083
scoring_system epss
scoring_elements 0.24276
published_at 2026-04-18T12:55:00Z
14
value 0.00083
scoring_system epss
scoring_elements 0.24251
published_at 2026-04-21T12:55:00Z
15
value 0.00083
scoring_system epss
scoring_elements 0.24126
published_at 2026-04-24T12:55:00Z
16
value 0.00083
scoring_system epss
scoring_elements 0.24112
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5338
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5338
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5338
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
6
reference_url https://lists.gnu.org/archive/html/qemu-devel/2016-06/msg01507.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/qemu-devel/2016-06/msg01507.html
7
reference_url http://www.openwall.com/lists/oss-security/2016/06/07/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/06/07/3
8
reference_url http://www.openwall.com/lists/oss-security/2016/06/08/14
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/06/08/14
9
reference_url http://www.securityfocus.com/bid/91079
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91079
10
reference_url http://www.ubuntu.com/usn/USN-3047-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3047-1
11
reference_url http://www.ubuntu.com/usn/USN-3047-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3047-2
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1343323
reference_id 1343323
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1343323
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827024
reference_id 827024
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827024
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-5338
reference_id CVE-2016-5338
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-5338
20
reference_url https://security.gentoo.org/glsa/201609-01
reference_id GLSA-201609-01
reference_type
scores
url https://security.gentoo.org/glsa/201609-01
21
reference_url https://usn.ubuntu.com/3047-1/
reference_id USN-3047-1
reference_type
scores
url https://usn.ubuntu.com/3047-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.7.0-r3
purl pkg:ebuild/app-emulation/qemu@2.7.0-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r3
aliases CVE-2016-5338
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zawc-752b-9bh6
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r3