Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/app-emulation/qemu@2.5.0-r2
Typeebuild
Namespaceapp-emulation
Nameqemu
Version2.5.0-r2
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.7.0-r3
Latest_non_vulnerable_version8.0.0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1wst-y74g-gqb5
vulnerability_id VCID-1wst-y74g-gqb5
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2016-0081.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0081.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2016-0082.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0082.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-0083.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0083.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2016-0084.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0084.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-0085.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0085.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0086.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0086.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0087.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0087.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0088.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0088.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1714.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1714.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1714
reference_id
reference_type
scores
0
value 0.00343
scoring_system epss
scoring_elements 0.56839
published_at 2026-05-05T12:55:00Z
1
value 0.00343
scoring_system epss
scoring_elements 0.569
published_at 2026-04-26T12:55:00Z
2
value 0.00343
scoring_system epss
scoring_elements 0.56885
published_at 2026-05-07T12:55:00Z
3
value 0.00343
scoring_system epss
scoring_elements 0.5683
published_at 2026-04-01T12:55:00Z
4
value 0.00343
scoring_system epss
scoring_elements 0.56925
published_at 2026-04-02T12:55:00Z
5
value 0.00343
scoring_system epss
scoring_elements 0.56946
published_at 2026-04-04T12:55:00Z
6
value 0.00343
scoring_system epss
scoring_elements 0.56922
published_at 2026-04-07T12:55:00Z
7
value 0.00343
scoring_system epss
scoring_elements 0.56973
published_at 2026-04-08T12:55:00Z
8
value 0.00343
scoring_system epss
scoring_elements 0.56976
published_at 2026-04-09T12:55:00Z
9
value 0.00343
scoring_system epss
scoring_elements 0.56983
published_at 2026-04-11T12:55:00Z
10
value 0.00343
scoring_system epss
scoring_elements 0.56964
published_at 2026-04-12T12:55:00Z
11
value 0.00343
scoring_system epss
scoring_elements 0.5694
published_at 2026-04-13T12:55:00Z
12
value 0.00343
scoring_system epss
scoring_elements 0.56969
published_at 2026-04-16T12:55:00Z
13
value 0.00343
scoring_system epss
scoring_elements 0.56966
published_at 2026-04-18T12:55:00Z
14
value 0.00343
scoring_system epss
scoring_elements 0.56943
published_at 2026-04-21T12:55:00Z
15
value 0.00343
scoring_system epss
scoring_elements 0.56883
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1714
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
29
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:S/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
30
reference_url https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg00428.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg00428.html
31
reference_url http://www.debian.org/security/2016/dsa-3469
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3469
32
reference_url http://www.debian.org/security/2016/dsa-3470
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3470
33
reference_url http://www.debian.org/security/2016/dsa-3471
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3471
34
reference_url http://www.openwall.com/lists/oss-security/2016/01/11/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/01/11/7
35
reference_url http://www.openwall.com/lists/oss-security/2016/01/12/10
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/01/12/10
36
reference_url http://www.openwall.com/lists/oss-security/2016/01/12/11
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/01/12/11
37
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
38
reference_url http://www.securityfocus.com/bid/80250
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/80250
39
reference_url http://www.securitytracker.com/id/1034858
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034858
40
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1296060
reference_id 1296060
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1296060
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1714
reference_id CVE-2016-1714
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1714
46
reference_url https://security.gentoo.org/glsa/201604-01
reference_id GLSA-201604-01
reference_type
scores
url https://security.gentoo.org/glsa/201604-01
47
reference_url https://access.redhat.com/errata/RHSA-2016:0081
reference_id RHSA-2016:0081
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0081
48
reference_url https://access.redhat.com/errata/RHSA-2016:0082
reference_id RHSA-2016:0082
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0082
49
reference_url https://access.redhat.com/errata/RHSA-2016:0083
reference_id RHSA-2016:0083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0083
50
reference_url https://access.redhat.com/errata/RHSA-2016:0084
reference_id RHSA-2016:0084
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0084
51
reference_url https://access.redhat.com/errata/RHSA-2016:0085
reference_id RHSA-2016:0085
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0085
52
reference_url https://access.redhat.com/errata/RHSA-2016:0086
reference_id RHSA-2016:0086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0086
53
reference_url https://access.redhat.com/errata/RHSA-2016:0087
reference_id RHSA-2016:0087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0087
54
reference_url https://access.redhat.com/errata/RHSA-2016:0088
reference_id RHSA-2016:0088
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0088
55
reference_url https://usn.ubuntu.com/2891-1/
reference_id USN-2891-1
reference_type
scores
url https://usn.ubuntu.com/2891-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.5.0-r2
purl pkg:ebuild/app-emulation/qemu@2.5.0-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r2
aliases CVE-2016-1714
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1wst-y74g-gqb5
1
url VCID-4xv9-ahxv-tuh1
vulnerability_id VCID-4xv9-ahxv-tuh1
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=80eecda8e5d09c442c24307f340840a5b70ea3b9
reference_id
reference_type
scores
url http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=80eecda8e5d09c442c24307f340840a5b70ea3b9
1
reference_url http://lists.nongnu.org/archive/html/qemu-stable/2016-03/msg00064.html
reference_id
reference_type
scores
url http://lists.nongnu.org/archive/html/qemu-stable/2016-03/msg00064.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2392.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2392.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2392
reference_id
reference_type
scores
0
value 0.00086
scoring_system epss
scoring_elements 0.24637
published_at 2026-05-07T12:55:00Z
1
value 0.00086
scoring_system epss
scoring_elements 0.2456
published_at 2026-05-05T12:55:00Z
2
value 0.00086
scoring_system epss
scoring_elements 0.24887
published_at 2026-04-01T12:55:00Z
3
value 0.00086
scoring_system epss
scoring_elements 0.24966
published_at 2026-04-02T12:55:00Z
4
value 0.00086
scoring_system epss
scoring_elements 0.25006
published_at 2026-04-04T12:55:00Z
5
value 0.00086
scoring_system epss
scoring_elements 0.24781
published_at 2026-04-07T12:55:00Z
6
value 0.00086
scoring_system epss
scoring_elements 0.24849
published_at 2026-04-08T12:55:00Z
7
value 0.00086
scoring_system epss
scoring_elements 0.24893
published_at 2026-04-09T12:55:00Z
8
value 0.00086
scoring_system epss
scoring_elements 0.24908
published_at 2026-04-11T12:55:00Z
9
value 0.00086
scoring_system epss
scoring_elements 0.24869
published_at 2026-04-12T12:55:00Z
10
value 0.00086
scoring_system epss
scoring_elements 0.24814
published_at 2026-04-13T12:55:00Z
11
value 0.00086
scoring_system epss
scoring_elements 0.24826
published_at 2026-04-16T12:55:00Z
12
value 0.00086
scoring_system epss
scoring_elements 0.24818
published_at 2026-04-18T12:55:00Z
13
value 0.00086
scoring_system epss
scoring_elements 0.24797
published_at 2026-04-21T12:55:00Z
14
value 0.00086
scoring_system epss
scoring_elements 0.24736
published_at 2026-04-24T12:55:00Z
15
value 0.00086
scoring_system epss
scoring_elements 0.24725
published_at 2026-04-26T12:55:00Z
16
value 0.00086
scoring_system epss
scoring_elements 0.24681
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2392
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2392
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2392
5
reference_url https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
6
reference_url https://lists.gnu.org/archive/html/qemu-devel/2016-02/msg02553.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/qemu-devel/2016-02/msg02553.html
7
reference_url http://www.openwall.com/lists/oss-security/2016/02/16/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/02/16/7
8
reference_url http://www.securityfocus.com/bid/83274
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/83274
9
reference_url http://www.ubuntu.com/usn/USN-2974-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2974-1
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1302299
reference_id 1302299
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1302299
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815008
reference_id 815008
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815008
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:2.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-2392
reference_id CVE-2016-2392
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-2392
18
reference_url https://security.gentoo.org/glsa/201604-01
reference_id GLSA-201604-01
reference_type
scores
url https://security.gentoo.org/glsa/201604-01
19
reference_url https://usn.ubuntu.com/2974-1/
reference_id USN-2974-1
reference_type
scores
url https://usn.ubuntu.com/2974-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.5.0-r2
purl pkg:ebuild/app-emulation/qemu@2.5.0-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r2
aliases CVE-2016-2392
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4xv9-ahxv-tuh1
2
url VCID-7rh3-6w55-sqat
vulnerability_id VCID-7rh3-6w55-sqat
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1981.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1981.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1981
reference_id
reference_type
scores
0
value 0.00062
scoring_system epss
scoring_elements 0.19181
published_at 2026-05-07T12:55:00Z
1
value 0.00062
scoring_system epss
scoring_elements 0.19448
published_at 2026-04-01T12:55:00Z
2
value 0.00062
scoring_system epss
scoring_elements 0.19581
published_at 2026-04-02T12:55:00Z
3
value 0.00062
scoring_system epss
scoring_elements 0.19628
published_at 2026-04-04T12:55:00Z
4
value 0.00062
scoring_system epss
scoring_elements 0.19349
published_at 2026-04-07T12:55:00Z
5
value 0.00062
scoring_system epss
scoring_elements 0.19427
published_at 2026-04-08T12:55:00Z
6
value 0.00062
scoring_system epss
scoring_elements 0.19479
published_at 2026-04-09T12:55:00Z
7
value 0.00062
scoring_system epss
scoring_elements 0.19483
published_at 2026-04-11T12:55:00Z
8
value 0.00062
scoring_system epss
scoring_elements 0.19435
published_at 2026-04-12T12:55:00Z
9
value 0.00062
scoring_system epss
scoring_elements 0.19378
published_at 2026-04-13T12:55:00Z
10
value 0.00062
scoring_system epss
scoring_elements 0.19338
published_at 2026-04-16T12:55:00Z
11
value 0.00062
scoring_system epss
scoring_elements 0.19345
published_at 2026-04-18T12:55:00Z
12
value 0.00062
scoring_system epss
scoring_elements 0.19359
published_at 2026-04-21T12:55:00Z
13
value 0.00062
scoring_system epss
scoring_elements 0.19258
published_at 2026-04-24T12:55:00Z
14
value 0.00062
scoring_system epss
scoring_elements 0.19247
published_at 2026-04-26T12:55:00Z
15
value 0.00062
scoring_system epss
scoring_elements 0.19207
published_at 2026-04-29T12:55:00Z
16
value 0.00062
scoring_system epss
scoring_elements 0.191
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1981
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
21
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1298570
reference_id 1298570
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1298570
23
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812307
reference_id 812307
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812307
24
reference_url https://security.gentoo.org/glsa/201604-01
reference_id GLSA-201604-01
reference_type
scores
url https://security.gentoo.org/glsa/201604-01
25
reference_url https://access.redhat.com/errata/RHSA-2016:2585
reference_id RHSA-2016:2585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2585
26
reference_url https://usn.ubuntu.com/2891-1/
reference_id USN-2891-1
reference_type
scores
url https://usn.ubuntu.com/2891-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.5.0-r2
purl pkg:ebuild/app-emulation/qemu@2.5.0-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r2
aliases CVE-2016-1981
risk_score 0.6
exploitability 0.5
weighted_severity 1.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7rh3-6w55-sqat
3
url VCID-aa98-tyaq-3kew
vulnerability_id VCID-aa98-tyaq-3kew
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2197.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2197.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2197
reference_id
reference_type
scores
0
value 0.00111
scoring_system epss
scoring_elements 0.29138
published_at 2026-05-07T12:55:00Z
1
value 0.00111
scoring_system epss
scoring_elements 0.29626
published_at 2026-04-08T12:55:00Z
2
value 0.00111
scoring_system epss
scoring_elements 0.29693
published_at 2026-04-02T12:55:00Z
3
value 0.00111
scoring_system epss
scoring_elements 0.29744
published_at 2026-04-04T12:55:00Z
4
value 0.00111
scoring_system epss
scoring_elements 0.29563
published_at 2026-04-07T12:55:00Z
5
value 0.00111
scoring_system epss
scoring_elements 0.29664
published_at 2026-04-09T12:55:00Z
6
value 0.00111
scoring_system epss
scoring_elements 0.29666
published_at 2026-04-11T12:55:00Z
7
value 0.00111
scoring_system epss
scoring_elements 0.29622
published_at 2026-04-12T12:55:00Z
8
value 0.00111
scoring_system epss
scoring_elements 0.29571
published_at 2026-04-13T12:55:00Z
9
value 0.00111
scoring_system epss
scoring_elements 0.2959
published_at 2026-04-16T12:55:00Z
10
value 0.00111
scoring_system epss
scoring_elements 0.29564
published_at 2026-04-18T12:55:00Z
11
value 0.00111
scoring_system epss
scoring_elements 0.29519
published_at 2026-04-21T12:55:00Z
12
value 0.00111
scoring_system epss
scoring_elements 0.29403
published_at 2026-04-24T12:55:00Z
13
value 0.00111
scoring_system epss
scoring_elements 0.29289
published_at 2026-04-26T12:55:00Z
14
value 0.00111
scoring_system epss
scoring_elements 0.29224
published_at 2026-04-29T12:55:00Z
15
value 0.00111
scoring_system epss
scoring_elements 0.29077
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2197
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2197
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1302057
reference_id 1302057
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1302057
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813194
reference_id 813194
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813194
6
reference_url https://security.gentoo.org/glsa/201604-01
reference_id GLSA-201604-01
reference_type
scores
url https://security.gentoo.org/glsa/201604-01
7
reference_url https://usn.ubuntu.com/2891-1/
reference_id USN-2891-1
reference_type
scores
url https://usn.ubuntu.com/2891-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.5.0-r2
purl pkg:ebuild/app-emulation/qemu@2.5.0-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r2
aliases CVE-2016-2197
risk_score 0.6
exploitability 0.5
weighted_severity 1.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aa98-tyaq-3kew
4
url VCID-gn2n-q1pj-3qcg
vulnerability_id VCID-gn2n-q1pj-3qcg
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8619.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8619.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8619
reference_id
reference_type
scores
0
value 0.03318
scoring_system epss
scoring_elements 0.87337
published_at 2026-05-07T12:55:00Z
1
value 0.03318
scoring_system epss
scoring_elements 0.87325
published_at 2026-05-05T12:55:00Z
2
value 0.03318
scoring_system epss
scoring_elements 0.87214
published_at 2026-04-01T12:55:00Z
3
value 0.03318
scoring_system epss
scoring_elements 0.87224
published_at 2026-04-02T12:55:00Z
4
value 0.03318
scoring_system epss
scoring_elements 0.8724
published_at 2026-04-04T12:55:00Z
5
value 0.03318
scoring_system epss
scoring_elements 0.87237
published_at 2026-04-07T12:55:00Z
6
value 0.03318
scoring_system epss
scoring_elements 0.87257
published_at 2026-04-08T12:55:00Z
7
value 0.03318
scoring_system epss
scoring_elements 0.87264
published_at 2026-04-09T12:55:00Z
8
value 0.03318
scoring_system epss
scoring_elements 0.87277
published_at 2026-04-11T12:55:00Z
9
value 0.03318
scoring_system epss
scoring_elements 0.87271
published_at 2026-04-12T12:55:00Z
10
value 0.03318
scoring_system epss
scoring_elements 0.87267
published_at 2026-04-13T12:55:00Z
11
value 0.03318
scoring_system epss
scoring_elements 0.87282
published_at 2026-04-16T12:55:00Z
12
value 0.03318
scoring_system epss
scoring_elements 0.87286
published_at 2026-04-18T12:55:00Z
13
value 0.03318
scoring_system epss
scoring_elements 0.8728
published_at 2026-04-21T12:55:00Z
14
value 0.03318
scoring_system epss
scoring_elements 0.87298
published_at 2026-04-24T12:55:00Z
15
value 0.03318
scoring_system epss
scoring_elements 0.87304
published_at 2026-04-26T12:55:00Z
16
value 0.03318
scoring_system epss
scoring_elements 0.87307
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8619
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
21
reference_url https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02930.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02930.html
22
reference_url http://www.debian.org/security/2016/dsa-3471
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3471
23
reference_url http://www.openwall.com/lists/oss-security/2015/12/23/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/12/23/1
24
reference_url http://www.securityfocus.com/bid/79668
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79668
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1283926
reference_id 1283926
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1283926
26
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809237
reference_id 809237
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809237
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8619
reference_id CVE-2015-8619
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-8619
30
reference_url https://security.gentoo.org/glsa/201604-01
reference_id GLSA-201604-01
reference_type
scores
url https://security.gentoo.org/glsa/201604-01
31
reference_url https://usn.ubuntu.com/2891-1/
reference_id USN-2891-1
reference_type
scores
url https://usn.ubuntu.com/2891-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.5.0-r2
purl pkg:ebuild/app-emulation/qemu@2.5.0-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r2
aliases CVE-2015-8619
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gn2n-q1pj-3qcg
5
url VCID-m549-2ra5-2fct
vulnerability_id VCID-m549-2ra5-2fct
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2198.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2198.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2198
reference_id
reference_type
scores
0
value 0.00104
scoring_system epss
scoring_elements 0.27971
published_at 2026-05-07T12:55:00Z
1
value 0.00104
scoring_system epss
scoring_elements 0.28482
published_at 2026-04-01T12:55:00Z
2
value 0.00104
scoring_system epss
scoring_elements 0.28577
published_at 2026-04-02T12:55:00Z
3
value 0.00104
scoring_system epss
scoring_elements 0.2862
published_at 2026-04-04T12:55:00Z
4
value 0.00104
scoring_system epss
scoring_elements 0.28423
published_at 2026-04-07T12:55:00Z
5
value 0.00104
scoring_system epss
scoring_elements 0.2849
published_at 2026-04-12T12:55:00Z
6
value 0.00104
scoring_system epss
scoring_elements 0.28531
published_at 2026-04-09T12:55:00Z
7
value 0.00104
scoring_system epss
scoring_elements 0.28533
published_at 2026-04-11T12:55:00Z
8
value 0.00104
scoring_system epss
scoring_elements 0.28441
published_at 2026-04-13T12:55:00Z
9
value 0.00104
scoring_system epss
scoring_elements 0.28458
published_at 2026-04-16T12:55:00Z
10
value 0.00104
scoring_system epss
scoring_elements 0.28435
published_at 2026-04-18T12:55:00Z
11
value 0.00104
scoring_system epss
scoring_elements 0.28383
published_at 2026-04-21T12:55:00Z
12
value 0.00104
scoring_system epss
scoring_elements 0.28258
published_at 2026-04-24T12:55:00Z
13
value 0.00104
scoring_system epss
scoring_elements 0.28146
published_at 2026-04-26T12:55:00Z
14
value 0.00104
scoring_system epss
scoring_elements 0.28068
published_at 2026-04-29T12:55:00Z
15
value 0.00104
scoring_system epss
scoring_elements 0.27909
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2198
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2198
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1301643
reference_id 1301643
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1301643
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813193
reference_id 813193
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813193
6
reference_url https://security.gentoo.org/glsa/201604-01
reference_id GLSA-201604-01
reference_type
scores
url https://security.gentoo.org/glsa/201604-01
7
reference_url https://usn.ubuntu.com/2891-1/
reference_id USN-2891-1
reference_type
scores
url https://usn.ubuntu.com/2891-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.5.0-r2
purl pkg:ebuild/app-emulation/qemu@2.5.0-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r2
aliases CVE-2016-2198
risk_score 0.6
exploitability 0.5
weighted_severity 1.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m549-2ra5-2fct
6
url VCID-nhc4-1zw4-mfgq
vulnerability_id VCID-nhc4-1zw4-mfgq
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=fe3c546c5ff2a6210f9a4d8561cc64051ca8603e
reference_id
reference_type
scores
url http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=fe3c546c5ff2a6210f9a4d8561cc64051ca8603e
1
reference_url http://lists.nongnu.org/archive/html/qemu-stable/2016-03/msg00064.html
reference_id
reference_type
scores
url http://lists.nongnu.org/archive/html/qemu-stable/2016-03/msg00064.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2538.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2538.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2538
reference_id
reference_type
scores
0
value 0.00088
scoring_system epss
scoring_elements 0.24891
published_at 2026-05-07T12:55:00Z
1
value 0.00088
scoring_system epss
scoring_elements 0.2482
published_at 2026-05-05T12:55:00Z
2
value 0.00088
scoring_system epss
scoring_elements 0.25159
published_at 2026-04-01T12:55:00Z
3
value 0.00088
scoring_system epss
scoring_elements 0.25239
published_at 2026-04-02T12:55:00Z
4
value 0.00088
scoring_system epss
scoring_elements 0.25278
published_at 2026-04-04T12:55:00Z
5
value 0.00088
scoring_system epss
scoring_elements 0.25052
published_at 2026-04-07T12:55:00Z
6
value 0.00088
scoring_system epss
scoring_elements 0.25121
published_at 2026-04-08T12:55:00Z
7
value 0.00088
scoring_system epss
scoring_elements 0.25165
published_at 2026-04-09T12:55:00Z
8
value 0.00088
scoring_system epss
scoring_elements 0.25178
published_at 2026-04-11T12:55:00Z
9
value 0.00088
scoring_system epss
scoring_elements 0.25136
published_at 2026-04-12T12:55:00Z
10
value 0.00088
scoring_system epss
scoring_elements 0.25083
published_at 2026-04-13T12:55:00Z
11
value 0.00088
scoring_system epss
scoring_elements 0.25094
published_at 2026-04-16T12:55:00Z
12
value 0.00088
scoring_system epss
scoring_elements 0.25085
published_at 2026-04-18T12:55:00Z
13
value 0.00088
scoring_system epss
scoring_elements 0.25057
published_at 2026-04-21T12:55:00Z
14
value 0.00088
scoring_system epss
scoring_elements 0.24997
published_at 2026-04-24T12:55:00Z
15
value 0.00088
scoring_system epss
scoring_elements 0.24986
published_at 2026-04-26T12:55:00Z
16
value 0.00088
scoring_system epss
scoring_elements 0.24941
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2538
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2538
5
reference_url https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
6
reference_url https://lists.gnu.org/archive/html/qemu-devel/2016-02/msg03658.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/qemu-devel/2016-02/msg03658.html
7
reference_url http://www.openwall.com/lists/oss-security/2016/02/22/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/02/22/3
8
reference_url http://www.securityfocus.com/bid/83336
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/83336
9
reference_url http://www.ubuntu.com/usn/USN-2974-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2974-1
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1303120
reference_id 1303120
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1303120
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815680
reference_id 815680
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815680
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-2538
reference_id CVE-2016-2538
reference_type
scores
0
value 3.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:P
1
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-2538
14
reference_url https://security.gentoo.org/glsa/201604-01
reference_id GLSA-201604-01
reference_type
scores
url https://security.gentoo.org/glsa/201604-01
15
reference_url https://usn.ubuntu.com/2974-1/
reference_id USN-2974-1
reference_type
scores
url https://usn.ubuntu.com/2974-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.5.0-r2
purl pkg:ebuild/app-emulation/qemu@2.5.0-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r2
aliases CVE-2016-2538
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nhc4-1zw4-mfgq
7
url VCID-rfgr-472m-kues
vulnerability_id VCID-rfgr-472m-kues
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1922.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1922.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1922
reference_id
reference_type
scores
0
value 0.00082
scoring_system epss
scoring_elements 0.23876
published_at 2026-05-07T12:55:00Z
1
value 0.00082
scoring_system epss
scoring_elements 0.24126
published_at 2026-04-01T12:55:00Z
2
value 0.00082
scoring_system epss
scoring_elements 0.24256
published_at 2026-04-02T12:55:00Z
3
value 0.00082
scoring_system epss
scoring_elements 0.24289
published_at 2026-04-04T12:55:00Z
4
value 0.00082
scoring_system epss
scoring_elements 0.24075
published_at 2026-04-07T12:55:00Z
5
value 0.00082
scoring_system epss
scoring_elements 0.24142
published_at 2026-04-08T12:55:00Z
6
value 0.00082
scoring_system epss
scoring_elements 0.24187
published_at 2026-04-09T12:55:00Z
7
value 0.00082
scoring_system epss
scoring_elements 0.24205
published_at 2026-04-11T12:55:00Z
8
value 0.00082
scoring_system epss
scoring_elements 0.24163
published_at 2026-04-12T12:55:00Z
9
value 0.00082
scoring_system epss
scoring_elements 0.24106
published_at 2026-04-13T12:55:00Z
10
value 0.00082
scoring_system epss
scoring_elements 0.2412
published_at 2026-04-16T12:55:00Z
11
value 0.00082
scoring_system epss
scoring_elements 0.24107
published_at 2026-04-18T12:55:00Z
12
value 0.00082
scoring_system epss
scoring_elements 0.24084
published_at 2026-04-21T12:55:00Z
13
value 0.00082
scoring_system epss
scoring_elements 0.23958
published_at 2026-04-24T12:55:00Z
14
value 0.00082
scoring_system epss
scoring_elements 0.23946
published_at 2026-04-26T12:55:00Z
15
value 0.00082
scoring_system epss
scoring_elements 0.23905
published_at 2026-04-29T12:55:00Z
16
value 0.00082
scoring_system epss
scoring_elements 0.23792
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1922
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
21
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1283934
reference_id 1283934
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1283934
23
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=811201
reference_id 811201
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=811201
24
reference_url https://security.gentoo.org/glsa/201604-01
reference_id GLSA-201604-01
reference_type
scores
url https://security.gentoo.org/glsa/201604-01
25
reference_url https://usn.ubuntu.com/2891-1/
reference_id USN-2891-1
reference_type
scores
url https://usn.ubuntu.com/2891-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.5.0-r2
purl pkg:ebuild/app-emulation/qemu@2.5.0-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r2
aliases CVE-2016-1922
risk_score 0.7
exploitability 0.5
weighted_severity 1.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rfgr-472m-kues
8
url VCID-vgab-s8sr-53d9
vulnerability_id VCID-vgab-s8sr-53d9
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=60253ed1e6ec6d8e5ef2efe7bf755f475dce9956
reference_id
reference_type
scores
url http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=60253ed1e6ec6d8e5ef2efe7bf755f475dce9956
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2858.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2858.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2858
reference_id
reference_type
scores
0
value 0.00124
scoring_system epss
scoring_elements 0.31153
published_at 2026-05-07T12:55:00Z
1
value 0.00124
scoring_system epss
scoring_elements 0.31235
published_at 2026-04-29T12:55:00Z
2
value 0.00124
scoring_system epss
scoring_elements 0.31083
published_at 2026-05-05T12:55:00Z
3
value 0.00124
scoring_system epss
scoring_elements 0.31637
published_at 2026-04-01T12:55:00Z
4
value 0.00124
scoring_system epss
scoring_elements 0.31769
published_at 2026-04-02T12:55:00Z
5
value 0.00124
scoring_system epss
scoring_elements 0.31813
published_at 2026-04-04T12:55:00Z
6
value 0.00124
scoring_system epss
scoring_elements 0.31631
published_at 2026-04-07T12:55:00Z
7
value 0.00124
scoring_system epss
scoring_elements 0.31683
published_at 2026-04-08T12:55:00Z
8
value 0.00124
scoring_system epss
scoring_elements 0.31712
published_at 2026-04-09T12:55:00Z
9
value 0.00124
scoring_system epss
scoring_elements 0.31716
published_at 2026-04-11T12:55:00Z
10
value 0.00124
scoring_system epss
scoring_elements 0.31675
published_at 2026-04-12T12:55:00Z
11
value 0.00124
scoring_system epss
scoring_elements 0.31639
published_at 2026-04-13T12:55:00Z
12
value 0.00124
scoring_system epss
scoring_elements 0.31673
published_at 2026-04-16T12:55:00Z
13
value 0.00124
scoring_system epss
scoring_elements 0.31651
published_at 2026-04-18T12:55:00Z
14
value 0.00124
scoring_system epss
scoring_elements 0.31619
published_at 2026-04-21T12:55:00Z
15
value 0.00124
scoring_system epss
scoring_elements 0.31442
published_at 2026-04-24T12:55:00Z
16
value 0.00124
scoring_system epss
scoring_elements 0.31316
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2858
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2858
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.5
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
6
reference_url http://www.openwall.com/lists/oss-security/2016/03/04/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/03/04/1
7
reference_url http://www.openwall.com/lists/oss-security/2016/03/07/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/03/07/4
8
reference_url http://www.securityfocus.com/bid/84134
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/84134
9
reference_url http://www.ubuntu.com/usn/USN-2974-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2974-1
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1314676
reference_id 1314676
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1314676
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=817183
reference_id 817183
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=817183
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-2858
reference_id CVE-2016-2858
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-2858
19
reference_url https://security.gentoo.org/glsa/201604-01
reference_id GLSA-201604-01
reference_type
scores
url https://security.gentoo.org/glsa/201604-01
20
reference_url https://usn.ubuntu.com/2974-1/
reference_id USN-2974-1
reference_type
scores
url https://usn.ubuntu.com/2974-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.5.0-r2
purl pkg:ebuild/app-emulation/qemu@2.5.0-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r2
aliases CVE-2016-2858
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vgab-s8sr-53d9
9
url VCID-yxet-nzmk-rkdf
vulnerability_id VCID-yxet-nzmk-rkdf
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8613.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8613.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8613
reference_id
reference_type
scores
0
value 0.00101
scoring_system epss
scoring_elements 0.27364
published_at 2026-05-07T12:55:00Z
1
value 0.00101
scoring_system epss
scoring_elements 0.27307
published_at 2026-05-05T12:55:00Z
2
value 0.00101
scoring_system epss
scoring_elements 0.27875
published_at 2026-04-01T12:55:00Z
3
value 0.00101
scoring_system epss
scoring_elements 0.27929
published_at 2026-04-02T12:55:00Z
4
value 0.00101
scoring_system epss
scoring_elements 0.27971
published_at 2026-04-04T12:55:00Z
5
value 0.00101
scoring_system epss
scoring_elements 0.27762
published_at 2026-04-07T12:55:00Z
6
value 0.00101
scoring_system epss
scoring_elements 0.27829
published_at 2026-04-08T12:55:00Z
7
value 0.00101
scoring_system epss
scoring_elements 0.27871
published_at 2026-04-09T12:55:00Z
8
value 0.00101
scoring_system epss
scoring_elements 0.27877
published_at 2026-04-11T12:55:00Z
9
value 0.00101
scoring_system epss
scoring_elements 0.27834
published_at 2026-04-12T12:55:00Z
10
value 0.00101
scoring_system epss
scoring_elements 0.27777
published_at 2026-04-13T12:55:00Z
11
value 0.00101
scoring_system epss
scoring_elements 0.27783
published_at 2026-04-16T12:55:00Z
12
value 0.00101
scoring_system epss
scoring_elements 0.27758
published_at 2026-04-18T12:55:00Z
13
value 0.00101
scoring_system epss
scoring_elements 0.27715
published_at 2026-04-21T12:55:00Z
14
value 0.00101
scoring_system epss
scoring_elements 0.2766
published_at 2026-04-24T12:55:00Z
15
value 0.00101
scoring_system epss
scoring_elements 0.27552
published_at 2026-04-26T12:55:00Z
16
value 0.00101
scoring_system epss
scoring_elements 0.2748
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8613
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
21
reference_url https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg03737.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg03737.html
22
reference_url http://www.debian.org/security/2016/dsa-3471
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3471
23
reference_url http://www.openwall.com/lists/oss-security/2015/12/22/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/12/22/1
24
reference_url http://www.securityfocus.com/bid/79719
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79719
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1284008
reference_id 1284008
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1284008
26
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809232
reference_id 809232
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809232
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8613
reference_id CVE-2015-8613
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-8613
30
reference_url https://security.gentoo.org/glsa/201604-01
reference_id GLSA-201604-01
reference_type
scores
url https://security.gentoo.org/glsa/201604-01
31
reference_url https://usn.ubuntu.com/2891-1/
reference_id USN-2891-1
reference_type
scores
url https://usn.ubuntu.com/2891-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@2.5.0-r2
purl pkg:ebuild/app-emulation/qemu@2.5.0-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r2
aliases CVE-2015-8613
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yxet-nzmk-rkdf
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r2