{"url":"http://public2.vulnerablecode.io/api/packages/77947?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.0.0-r1","type":"ebuild","namespace":"app-emulation","name":"qemu","version":"2.0.0-r1","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"2.1.2-r1","latest_non_vulnerable_version":"8.0.0","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49760?format=json","vulnerability_id":"VCID-2xw8-382x-93gm","summary":"Multiple vulnerabilities have been found in QEMU, worst of which\n    allows local attackers to execute arbitrary code.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134053.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134053.html"},{"reference_url":"http://lists.nongnu.org/archive/html/qemu-stable/2014-07/msg00187.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.nongnu.org/archive/html/qemu-stable/2014-07/msg00187.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00021.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0223.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0223.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0223","reference_id":"","reference_type":"","scores":[{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25807","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26104","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26185","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26225","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25997","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26064","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26116","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26125","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26079","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.2602","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26024","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26001","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25967","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25906","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25903","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25855","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25748","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25806","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25864","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.2579","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0223"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0142","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0142"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0146","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0146"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640"},{"reference_url":"https://lists.gnu.org/archive/html/qemu-devel/2014-05/msg02156.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.gnu.org/archive/html/qemu-devel/2014-05/msg02156.html"},{"reference_url":"http://www.debian.org/security/2014/dsa-3044","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3044"},{"reference_url":"http://www.securityfocus.com/bid/67391","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/67391"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1097222","reference_id":"1097222","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1097222"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742730","reference_id":"742730","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742730"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.10.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.10.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.10.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.10.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.10.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.10.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.10.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.10.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.10.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.10.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.10.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.10.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.11.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.11.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.11.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.11.0-rc0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.11.0-rc0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.11.0-rc0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.11.0:rc0:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.11.0:rc0:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.11.0:rc0:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.11.0-rc1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.11.0-rc1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.11.0-rc1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.11.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.11.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.11.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.11.0-rc2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.11.0-rc2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.11.0-rc2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.11.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.11.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.11.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.12.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.12.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.12.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.12.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.12.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.12.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.12.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.12.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.12.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.12.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.12.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.12.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.13.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.13.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.13.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.13.0:rc0:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.13.0:rc0:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.13.0:rc0:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.13.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.13.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.13.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.14.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.14.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.14.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.14.0:rc0:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.14.0:rc0:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.14.0:rc0:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.14.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.14.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.14.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.14.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.14.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.14.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.15.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.15.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.15.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.15.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.15.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.15.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.15.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.15.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.15.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.5.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.5.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.5.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.9.1-5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.9.1-5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.9.1-5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.0:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.0:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.0:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.0:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.0:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.0:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.1:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.1:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.1:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.1:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.1:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.1:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.1:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.1:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.1:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.5.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.5.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.5.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.5.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.5.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.5.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.5.0:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.5.0:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.5.0:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.6.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.6.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.6.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.6.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.6.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.6.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.6.0:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.6.0:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.6.0:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11.0:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-0223","reference_id":"CVE-2014-0223","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-0223"},{"reference_url":"https://security.gentoo.org/glsa/201408-17","reference_id":"GLSA-201408-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201408-17"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0927","reference_id":"RHSA-2014:0927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1075","reference_id":"RHSA-2014:1075","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1075"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1076","reference_id":"RHSA-2014:1076","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1076"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1168","reference_id":"RHSA-2014:1168","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1168"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1187","reference_id":"RHSA-2014:1187","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1187"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1268","reference_id":"RHSA-2014:1268","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1268"},{"reference_url":"https://usn.ubuntu.com/2342-1/","reference_id":"USN-2342-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2342-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77947?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.0.0-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.0.0-r1"}],"aliases":["CVE-2014-0223"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2xw8-382x-93gm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49752?format=json","vulnerability_id":"VCID-3jeq-fwjy-c7gg","summary":"Multiple vulnerabilities have been found in QEMU, worst of which\n    allows local attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0142.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0142.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0142","reference_id":"","reference_type":"","scores":[{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29535","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29602","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29651","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29472","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29573","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29575","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.2953","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29477","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29496","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29469","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29423","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29308","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29194","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29129","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.28985","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29046","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29062","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.28984","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29004","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0142"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0142","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0142"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0146","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0146"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1078201","reference_id":"1078201","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1078201"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742730","reference_id":"742730","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742730"},{"reference_url":"https://security.gentoo.org/glsa/201408-17","reference_id":"GLSA-201408-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201408-17"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0420","reference_id":"RHSA-2014:0420","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0420"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0421","reference_id":"RHSA-2014:0421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0434","reference_id":"RHSA-2014:0434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0435","reference_id":"RHSA-2014:0435","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0435"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0674","reference_id":"RHSA-2014:0674","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0674"},{"reference_url":"https://usn.ubuntu.com/2342-1/","reference_id":"USN-2342-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2342-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77947?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.0.0-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.0.0-r1"}],"aliases":["CVE-2014-0142"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3jeq-fwjy-c7gg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49757?format=json","vulnerability_id":"VCID-5fe5-865e-qbhm","summary":"Multiple vulnerabilities have been found in QEMU, worst of which\n    allows local attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0147.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0147.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0147","reference_id":"","reference_type":"","scores":[{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31046","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31171","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31217","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31037","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31094","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31124","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31131","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31087","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31042","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31074","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31055","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31022","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.30866","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.30745","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.30661","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.30518","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.30586","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.30596","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.30541","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0142","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0142"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0146","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0146"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1078848","reference_id":"1078848","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1078848"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742730","reference_id":"742730","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742730"},{"reference_url":"https://security.gentoo.org/glsa/201408-17","reference_id":"GLSA-201408-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201408-17"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0420","reference_id":"RHSA-2014:0420","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0420"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0421","reference_id":"RHSA-2014:0421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0434","reference_id":"RHSA-2014:0434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0435","reference_id":"RHSA-2014:0435","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0435"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0674","reference_id":"RHSA-2014:0674","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0674"},{"reference_url":"https://usn.ubuntu.com/2342-1/","reference_id":"USN-2342-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2342-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77947?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.0.0-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.0.0-r1"}],"aliases":["CVE-2014-0147"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5fe5-865e-qbhm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49759?format=json","vulnerability_id":"VCID-6k55-s19q-2yfm","summary":"Multiple vulnerabilities have been found in QEMU, worst of which\n    allows local attackers to execute arbitrary code.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134053.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134053.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133345.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133345.html"},{"reference_url":"http://lists.nongnu.org/archive/html/qemu-stable/2014-07/msg00187.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.nongnu.org/archive/html/qemu-stable/2014-07/msg00187.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0222.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0222.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0222","reference_id":"","reference_type":"","scores":[{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.77171","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.77154","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.76953","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.76959","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.76988","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.76971","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.77003","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.77014","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.77042","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.77021","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.77017","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.77058","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.7706","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.77053","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.77087","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.77094","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.77107","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.77116","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.77145","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.77166","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0222"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0142","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0142"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0146","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0146"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:L/Au:S/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.gnu.org/archive/html/qemu-devel/2014-05/msg02155.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.gnu.org/archive/html/qemu-devel/2014-05/msg02155.html"},{"reference_url":"http://www.debian.org/security/2014/dsa-3044","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3044"},{"reference_url":"http://www.securityfocus.com/bid/67357","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/67357"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1097216","reference_id":"1097216","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1097216"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742730","reference_id":"742730","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742730"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.10.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.10.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.10.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.10.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.10.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.10.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.10.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.10.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.10.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.10.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.10.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.10.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.11.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.11.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.11.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.11.0-rc0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.11.0-rc0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.11.0-rc0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.11.0:rc0:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.11.0:rc0:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.11.0:rc0:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.11.0-rc1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.11.0-rc1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.11.0-rc1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.11.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.11.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.11.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.11.0-rc2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.11.0-rc2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.11.0-rc2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.11.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.11.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.11.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.12.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.12.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.12.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.12.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.12.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.12.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.12.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.12.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.12.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.12.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.12.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.12.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.13.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.13.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.13.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.13.0:rc0:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.13.0:rc0:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.13.0:rc0:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.13.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.13.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.13.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.14.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.14.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.14.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.14.0:rc0:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.14.0:rc0:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.14.0:rc0:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.14.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.14.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.14.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.14.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.14.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.14.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.15.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.15.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.15.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.15.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.15.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.15.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.15.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.15.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.15.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.5.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.5.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.5.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.9.1-5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:0.9.1-5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:0.9.1-5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.0:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.0:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.0:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.0:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.0:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.0:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.1:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.1:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.1:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.1:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.1:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.1:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.1:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.1:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.1:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.5.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.5.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.5.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.5.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.5.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.5.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.5.0:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.5.0:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.5.0:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.6.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.6.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.6.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.6.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.6.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.6.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.6.0:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.6.0:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.6.0:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11.0:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-0222","reference_id":"CVE-2014-0222","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-0222"},{"reference_url":"https://security.gentoo.org/glsa/201408-17","reference_id":"GLSA-201408-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201408-17"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0927","reference_id":"RHSA-2014:0927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1075","reference_id":"RHSA-2014:1075","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1075"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1076","reference_id":"RHSA-2014:1076","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1076"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1168","reference_id":"RHSA-2014:1168","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1168"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1187","reference_id":"RHSA-2014:1187","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1187"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1268","reference_id":"RHSA-2014:1268","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1268"},{"reference_url":"https://usn.ubuntu.com/2342-1/","reference_id":"USN-2342-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2342-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77947?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.0.0-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.0.0-r1"}],"aliases":["CVE-2014-0222"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6k55-s19q-2yfm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49761?format=json","vulnerability_id":"VCID-6u6t-75dg-xybn","summary":"Multiple vulnerabilities have been found in QEMU, worst of which\n    allows local attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2894.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2894.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-2894","reference_id":"","reference_type":"","scores":[{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18571","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.1871","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18764","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18481","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18561","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18614","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18616","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18569","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18517","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18459","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18469","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18491","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18391","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18374","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18334","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18198","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18283","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18387","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18355","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18385","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-2894"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4344","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4344"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2894","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2894"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1087971","reference_id":"1087971","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1087971"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=745157","reference_id":"745157","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=745157"},{"reference_url":"https://security.gentoo.org/glsa/201408-17","reference_id":"GLSA-201408-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201408-17"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0674","reference_id":"RHSA-2014:0674","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0674"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0704","reference_id":"RHSA-2014:0704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0743","reference_id":"RHSA-2014:0743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0743"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0744","reference_id":"RHSA-2014:0744","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0744"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0888","reference_id":"RHSA-2014:0888","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0888"},{"reference_url":"https://usn.ubuntu.com/2182-1/","reference_id":"USN-2182-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2182-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77947?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.0.0-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.0.0-r1"}],"aliases":["CVE-2014-2894"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6u6t-75dg-xybn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49756?format=json","vulnerability_id":"VCID-6u8x-4sqe-ckbp","summary":"Multiple vulnerabilities have been found in QEMU, worst of which\n    allows local attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0146.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0146.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0146","reference_id":"","reference_type":"","scores":[{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30058","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30095","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30143","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29957","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30017","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30052","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30057","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30013","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29963","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29979","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29958","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29912","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29838","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29725","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29662","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29519","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.2958","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29594","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29518","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.2954","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0146"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0142","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0142"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0146","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0146"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1078232","reference_id":"1078232","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1078232"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742730","reference_id":"742730","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742730"},{"reference_url":"https://security.gentoo.org/glsa/201408-17","reference_id":"GLSA-201408-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201408-17"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0420","reference_id":"RHSA-2014:0420","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0420"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0421","reference_id":"RHSA-2014:0421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0434","reference_id":"RHSA-2014:0434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0435","reference_id":"RHSA-2014:0435","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0435"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0674","reference_id":"RHSA-2014:0674","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0674"},{"reference_url":"https://usn.ubuntu.com/2342-1/","reference_id":"USN-2342-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2342-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77947?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.0.0-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.0.0-r1"}],"aliases":["CVE-2014-0146"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6u8x-4sqe-ckbp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49762?format=json","vulnerability_id":"VCID-8mht-ekbe-kfaz","summary":"Multiple vulnerabilities have been found in QEMU, worst of which\n    allows local attackers to execute arbitrary code.","references":[{"reference_url":"http://article.gmane.org/gmane.comp.emulators.qemu/272092","reference_id":"","reference_type":"","scores":[],"url":"http://article.gmane.org/gmane.comp.emulators.qemu/272092"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134053.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134053.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-0743.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-0743.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-0744.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-0744.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3461.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3461.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3461","reference_id":"","reference_type":"","scores":[{"value":"0.03335","scoring_system":"epss","scoring_elements":"0.87388","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03335","scoring_system":"epss","scoring_elements":"0.8724","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03335","scoring_system":"epss","scoring_elements":"0.87249","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03335","scoring_system":"epss","scoring_elements":"0.87265","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03335","scoring_system":"epss","scoring_elements":"0.87262","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03335","scoring_system":"epss","scoring_elements":"0.87282","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03335","scoring_system":"epss","scoring_elements":"0.8729","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03335","scoring_system":"epss","scoring_elements":"0.87303","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03335","scoring_system":"epss","scoring_elements":"0.87297","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03335","scoring_system":"epss","scoring_elements":"0.87293","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03335","scoring_system":"epss","scoring_elements":"0.87307","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03335","scoring_system":"epss","scoring_elements":"0.87312","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03335","scoring_system":"epss","scoring_elements":"0.87305","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03335","scoring_system":"epss","scoring_elements":"0.87322","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03335","scoring_system":"epss","scoring_elements":"0.87328","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03335","scoring_system":"epss","scoring_elements":"0.87331","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03335","scoring_system":"epss","scoring_elements":"0.87348","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03335","scoring_system":"epss","scoring_elements":"0.87361","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03335","scoring_system":"epss","scoring_elements":"0.87379","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03335","scoring_system":"epss","scoring_elements":"0.87374","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3461"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3461","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3461"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1096821","reference_id":"1096821","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1096821"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=739589","reference_id":"739589","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=739589"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:1.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:1.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3461","reference_id":"CVE-2014-3461","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3461"},{"reference_url":"https://security.gentoo.org/glsa/201408-17","reference_id":"GLSA-201408-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201408-17"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0674","reference_id":"RHSA-2014:0674","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0674"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0743","reference_id":"RHSA-2014:0743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0743"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0744","reference_id":"RHSA-2014:0744","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0744"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0888","reference_id":"RHSA-2014:0888","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0888"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0927","reference_id":"RHSA-2014:0927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1268","reference_id":"RHSA-2014:1268","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1268"},{"reference_url":"https://usn.ubuntu.com/2342-1/","reference_id":"USN-2342-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2342-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77947?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.0.0-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.0.0-r1"}],"aliases":["CVE-2014-3461"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8mht-ekbe-kfaz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49751?format=json","vulnerability_id":"VCID-8xrw-2nz9-wkap","summary":"Multiple vulnerabilities have been found in QEMU, worst of which\n    allows local attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4544.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4544.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4544","reference_id":"","reference_type":"","scores":[{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29658","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29726","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29772","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.2959","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29653","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.2969","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29692","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29648","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29597","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29616","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29592","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29546","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29431","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29316","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29253","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29106","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29166","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.2918","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29104","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29124","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4544"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4544","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4544"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1087513","reference_id":"1087513","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1087513"},{"reference_url":"https://security.gentoo.org/glsa/201408-17","reference_id":"GLSA-201408-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201408-17"},{"reference_url":"https://usn.ubuntu.com/2182-1/","reference_id":"USN-2182-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2182-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77947?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.0.0-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.0.0-r1"}],"aliases":["CVE-2013-4544"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8xrw-2nz9-wkap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49755?format=json","vulnerability_id":"VCID-bx3b-281e-wfb2","summary":"Multiple vulnerabilities have been found in QEMU, worst of which\n    allows local attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0145.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0145.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0145","reference_id":"","reference_type":"","scores":[{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32566","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32702","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32736","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32557","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32605","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32631","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32633","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32595","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39361","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39413","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39384","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39298","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39101","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39083","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39002","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.38876","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.38949","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.38965","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.38875","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.38897","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0142","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0142"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0146","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0146"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1078885","reference_id":"1078885","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1078885"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742730","reference_id":"742730","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742730"},{"reference_url":"https://security.gentoo.org/glsa/201408-17","reference_id":"GLSA-201408-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201408-17"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0420","reference_id":"RHSA-2014:0420","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0420"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0421","reference_id":"RHSA-2014:0421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0434","reference_id":"RHSA-2014:0434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0435","reference_id":"RHSA-2014:0435","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0435"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0674","reference_id":"RHSA-2014:0674","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0674"},{"reference_url":"https://usn.ubuntu.com/2342-1/","reference_id":"USN-2342-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2342-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77947?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.0.0-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.0.0-r1"}],"aliases":["CVE-2014-0145"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bx3b-281e-wfb2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49758?format=json","vulnerability_id":"VCID-fenu-d57d-cbgj","summary":"Multiple vulnerabilities have been found in QEMU, worst of which\n    allows local attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0150.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0150.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0150","reference_id":"","reference_type":"","scores":[{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64728","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64749","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.67965","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.67944","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.67996","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.68009","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.68033","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.68019","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.67984","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.68021","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.67924","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.68017","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.6806","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.68068","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.68074","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.68047","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.68089","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.68131","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.68035","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.67946","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0150"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0150","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0150"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1078846","reference_id":"1078846","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1078846"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=744221","reference_id":"744221","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=744221"},{"reference_url":"https://security.gentoo.org/glsa/201408-17","reference_id":"GLSA-201408-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201408-17"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0420","reference_id":"RHSA-2014:0420","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0420"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0421","reference_id":"RHSA-2014:0421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0434","reference_id":"RHSA-2014:0434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0435","reference_id":"RHSA-2014:0435","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0435"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0674","reference_id":"RHSA-2014:0674","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0674"},{"reference_url":"https://usn.ubuntu.com/2182-1/","reference_id":"USN-2182-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2182-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77947?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.0.0-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.0.0-r1"}],"aliases":["CVE-2014-0150"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fenu-d57d-cbgj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49753?format=json","vulnerability_id":"VCID-fzn9-nn4a-3ffj","summary":"Multiple vulnerabilities have been found in QEMU, worst of which\n    allows local attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0143.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0143.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0143","reference_id":"","reference_type":"","scores":[{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.2875","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.2883","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28879","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28686","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28753","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28792","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28796","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28752","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28703","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28723","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28699","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.2865","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28538","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28426","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28352","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28192","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28247","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28271","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28188","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28208","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0142","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0142"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0146","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0146"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1079140","reference_id":"1079140","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1079140"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742730","reference_id":"742730","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742730"},{"reference_url":"https://security.gentoo.org/glsa/201408-17","reference_id":"GLSA-201408-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201408-17"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0420","reference_id":"RHSA-2014:0420","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0420"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0421","reference_id":"RHSA-2014:0421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0434","reference_id":"RHSA-2014:0434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0435","reference_id":"RHSA-2014:0435","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0435"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0674","reference_id":"RHSA-2014:0674","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0674"},{"reference_url":"https://usn.ubuntu.com/2342-1/","reference_id":"USN-2342-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2342-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77947?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.0.0-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.0.0-r1"}],"aliases":["CVE-2014-0143"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fzn9-nn4a-3ffj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49750?format=json","vulnerability_id":"VCID-g9zx-1a2t-w7ae","summary":"Multiple vulnerabilities have been found in QEMU, worst of which\n    allows local attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4377.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4377.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4377","reference_id":"","reference_type":"","scores":[{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27831","published_at":"2026-04-11T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27882","published_at":"2026-04-02T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27924","published_at":"2026-04-04T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27716","published_at":"2026-04-07T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27783","published_at":"2026-04-08T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27826","published_at":"2026-04-09T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.2779","published_at":"2026-04-12T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27733","published_at":"2026-04-13T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27739","published_at":"2026-04-16T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27714","published_at":"2026-04-18T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27675","published_at":"2026-04-21T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27623","published_at":"2026-04-24T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27515","published_at":"2026-04-26T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27443","published_at":"2026-04-29T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27271","published_at":"2026-05-05T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27331","published_at":"2026-05-07T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27353","published_at":"2026-05-09T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27269","published_at":"2026-05-11T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27283","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4377"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1012633","reference_id":"1012633","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1012633"},{"reference_url":"https://security.gentoo.org/glsa/201408-17","reference_id":"GLSA-201408-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201408-17"},{"reference_url":"https://usn.ubuntu.com/2092-1/","reference_id":"USN-2092-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2092-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77947?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.0.0-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.0.0-r1"}],"aliases":["CVE-2013-4377"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g9zx-1a2t-w7ae"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49754?format=json","vulnerability_id":"VCID-r7hp-ht55-5qgr","summary":"Multiple vulnerabilities have been found in QEMU, worst of which\n    allows local attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0144.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0144.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0144","reference_id":"","reference_type":"","scores":[{"value":"0.00642","scoring_system":"epss","scoring_elements":"0.70529","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00642","scoring_system":"epss","scoring_elements":"0.70543","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00642","scoring_system":"epss","scoring_elements":"0.7056","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00642","scoring_system":"epss","scoring_elements":"0.70538","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00642","scoring_system":"epss","scoring_elements":"0.70583","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00642","scoring_system":"epss","scoring_elements":"0.70598","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00642","scoring_system":"epss","scoring_elements":"0.70621","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00642","scoring_system":"epss","scoring_elements":"0.70606","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00642","scoring_system":"epss","scoring_elements":"0.70593","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00642","scoring_system":"epss","scoring_elements":"0.70637","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00642","scoring_system":"epss","scoring_elements":"0.70646","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00642","scoring_system":"epss","scoring_elements":"0.70625","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00642","scoring_system":"epss","scoring_elements":"0.70676","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00642","scoring_system":"epss","scoring_elements":"0.70686","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00642","scoring_system":"epss","scoring_elements":"0.70663","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00642","scoring_system":"epss","scoring_elements":"0.70704","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00642","scoring_system":"epss","scoring_elements":"0.70737","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00642","scoring_system":"epss","scoring_elements":"0.70707","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00642","scoring_system":"epss","scoring_elements":"0.70735","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0142","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0142"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0146","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0146"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1079240","reference_id":"1079240","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1079240"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742730","reference_id":"742730","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742730"},{"reference_url":"https://security.gentoo.org/glsa/201408-17","reference_id":"GLSA-201408-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201408-17"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0420","reference_id":"RHSA-2014:0420","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0420"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0421","reference_id":"RHSA-2014:0421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0434","reference_id":"RHSA-2014:0434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0435","reference_id":"RHSA-2014:0435","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0435"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0674","reference_id":"RHSA-2014:0674","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0674"},{"reference_url":"https://usn.ubuntu.com/2342-1/","reference_id":"USN-2342-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2342-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77947?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.0.0-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.0.0-r1"}],"aliases":["CVE-2014-0144"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r7hp-ht55-5qgr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49749?format=json","vulnerability_id":"VCID-zvub-u3fh-aua6","summary":"Multiple vulnerabilities have been found in QEMU, worst of which\n    allows local attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6227.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6227.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6227","reference_id":"","reference_type":"","scores":[{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52795","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52819","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52845","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52813","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52865","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52859","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52909","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52893","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52878","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52914","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52922","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52904","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52873","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52883","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52796","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52847","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.5289","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52857","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6227"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=414741","reference_id":"414741","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=414741"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/30837.txt","reference_id":"CVE-2007-6227;OSVDB-42984","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/30837.txt"},{"reference_url":"https://www.securityfocus.com/bid/26666/info","reference_id":"CVE-2007-6227;OSVDB-42984","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/26666/info"},{"reference_url":"https://security.gentoo.org/glsa/201408-17","reference_id":"GLSA-201408-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201408-17"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77947?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.0.0-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.0.0-r1"}],"aliases":["CVE-2007-6227"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zvub-u3fh-aua6"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.0.0-r1"}